CN115277192B - Information encryption method, device and electronic equipment - Google Patents
Information encryption method, device and electronic equipment Download PDFInfo
- Publication number
- CN115277192B CN115277192B CN202210890457.9A CN202210890457A CN115277192B CN 115277192 B CN115277192 B CN 115277192B CN 202210890457 A CN202210890457 A CN 202210890457A CN 115277192 B CN115277192 B CN 115277192B
- Authority
- CN
- China
- Prior art keywords
- ultrasonic
- data
- electronic device
- information
- text
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 76
- 238000012545 processing Methods 0.000 claims abstract description 30
- 238000006073 displacement reaction Methods 0.000 claims description 14
- 238000006243 chemical reaction Methods 0.000 claims description 11
- 230000011218 segmentation Effects 0.000 claims description 7
- 238000004891 communication Methods 0.000 abstract description 14
- 238000012790 confirmation Methods 0.000 description 14
- 230000006870 function Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 7
- 230000001360 synchronised effect Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 238000005265 energy consumption Methods 0.000 description 4
- 230000004931 aggregating effect Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 238000002604 ultrasonography Methods 0.000 description 2
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 1
- 241000699670 Mus sp. Species 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 208000008918 voyeurism Diseases 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
技术领域Technical field
本申请属于通信技术领域,具体涉及一种信息加密方法、装置及电子设备。This application belongs to the field of communication technology, and specifically relates to an information encryption method, device and electronic equipment.
背景技术Background technique
目前,在移动终端发送的文本信息通常都以明文形式发送给接受方,其中很多文本信息都涉及个人隐私,若以明文的形式发送存在被拦截或者窃取的风险。现有技术中通常采用MD5或者SHA1等散列算法对文本信息进行加密。但是上述加密方式存在安全性差的问题,文本信息虽然被加密,由于加密方式安全性差,文本信息仍然存在被拦截或者窃取的风险。Currently, text information sent from mobile terminals is usually sent to the recipient in clear text. Much of the text information involves personal privacy. If sent in clear text, there is a risk of being intercepted or stolen. In the prior art, hash algorithms such as MD5 or SHA1 are usually used to encrypt text information. However, the above encryption method has the problem of poor security. Although the text information is encrypted, there is still a risk of the text information being intercepted or stolen due to the poor security of the encryption method.
发明内容Contents of the invention
本申请实施例的目的是提供一种信息加密方法、装置及电子设备,能够解决现有文本加密方式安全性差的问题。The purpose of the embodiments of the present application is to provide an information encryption method, device and electronic equipment, which can solve the problem of poor security of existing text encryption methods.
第一方面,本申请实施例提供了一种信息加密方法,包括:In the first aspect, embodiments of the present application provide an information encryption method, including:
获取第一超声波信息和第一文本,所述第一超声波信息包括超声波振幅值和超声波频率值;Obtain first ultrasonic information and first text, where the first ultrasonic information includes an ultrasonic amplitude value and an ultrasonic frequency value;
对所述第一文本进行数据处理,获得第一数据;Perform data processing on the first text to obtain first data;
利用所述超声波振幅值和所述超声波频率值,对所述第一数据进行移位加密,获得加密文本。Using the ultrasonic amplitude value and the ultrasonic frequency value, shift encryption is performed on the first data to obtain encrypted text.
第二方面,本申请实施例提供了一种信息加密装置,包括:In a second aspect, embodiments of the present application provide an information encryption device, including:
获取模块,用于获取第一超声波信息和第一文本,所述第一超声波信息包括超声波振幅值和超声波频率值;An acquisition module, configured to acquire first ultrasonic information and first text, where the first ultrasonic information includes ultrasonic amplitude values and ultrasonic frequency values;
数据处理模块,用于对所述第一文本进行数据处理,获得第一数据;A data processing module, used to perform data processing on the first text to obtain first data;
加密模块,用于利用所述超声波振幅值和所述超声波频率值,对所述第一数据进行移位加密,获得加密文本。An encryption module, configured to use the ultrasonic amplitude value and the ultrasonic frequency value to perform shift encryption on the first data to obtain encrypted text.
第三方面,本申请实施例提供了一种电子设备,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的信息加密方法的步骤。In a third aspect, embodiments of the present application provide an electronic device, including a processor and a memory. The memory stores programs or instructions that can be run on the processor. When the program or instructions are executed by the processor, The steps of implementing the information encryption method described in the first aspect.
第四方面,本申请实施例提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的信息加密方法的步骤。In the fourth aspect, embodiments of the present application provide a readable storage medium. Programs or instructions are stored on the readable storage medium. When the programs or instructions are executed by a processor, the information encryption method as described in the first aspect is implemented. A step of.
第五方面,本申请实施例提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的信息加密方法。In a fifth aspect, embodiments of the present application provide a chip. The chip includes a processor and a communication interface. The communication interface is coupled to the processor. The processor is used to run programs or instructions to implement the first aspect. The information encryption method.
第六方面,本申请实施例提供一种计算机程序产品,该程序产品被存储在存储介质中,该程序产品被至少一个处理器执行以实现如第一方面所述的信息加密方法。In a sixth aspect, embodiments of the present application provide a computer program product, the program product is stored in a storage medium, and the program product is executed by at least one processor to implement the information encryption method as described in the first aspect.
在本申请实施例中,通过获取第一超声波信息和第一文本,第一超声波信息包括超声波振幅值和超声波频率值;然后对第一文本进行数据处理,获得第一数据;最后利用超声波振幅值和超声波频率值,对第一数据进行移位加密,获得加密文本,如此,基于超声波信息对文本进行加密处理,能够提升文本加密的安全性,从而有效解决用户在使用电子设备传输文本时文本被拦截或窃取的风险的问题。In the embodiment of the present application, the first ultrasonic information and the first text are obtained. The first ultrasonic information includes an ultrasonic amplitude value and an ultrasonic frequency value; then data processing is performed on the first text to obtain the first data; and finally the ultrasonic amplitude value is used and the ultrasonic frequency value, perform shift encryption on the first data, and obtain the encrypted text. In this way, encrypting the text based on the ultrasonic information can improve the security of text encryption, thereby effectively solving the problem of text being blocked when users use electronic devices to transmit text. Issues of risk of interception or theft.
附图说明Description of the drawings
图1是本申请实施例提供的信息加密方法的流程示意图;Figure 1 is a schematic flow chart of an information encryption method provided by an embodiment of the present application;
图2是本申请实施例提供的信息解密方法的流程示意图;Figure 2 is a schematic flow chart of the information decryption method provided by the embodiment of the present application;
图3是本申请一示例中的两个设备进行配对的示意图;Figure 3 is a schematic diagram of two devices pairing in an example of this application;
图4是本申请一示例中的两个设备在超声波配对成功后进行信息交互的流程示意图;Figure 4 is a schematic flow chart of information exchange between two devices in an example of this application after ultrasonic pairing is successful;
图5是本申请另一示例中的两个设备在超声波配对成功后进行信息交互的流程示意图;Figure 5 is a schematic flow chart of information exchange between two devices after successful ultrasonic pairing in another example of this application;
图6是本申请实施例提供的信息加密装置的模块示意图;Figure 6 is a schematic module diagram of an information encryption device provided by an embodiment of the present application;
图7是本申请实施例提供的电子设备的结构示意图;Figure 7 is a schematic structural diagram of an electronic device provided by an embodiment of the present application;
图8是本申请实施例提供的电子设备的硬件结构示意图。FIG. 8 is a schematic diagram of the hardware structure of an electronic device provided by an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be clearly described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art fall within the scope of protection of this application.
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”等所区分的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”,一般表示前后关联对象是一种“或”的关系。The terms "first", "second", etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the figures so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in orders other than those illustrated or described herein, and that "first," "second," etc. are distinguished Objects are usually of one type, and the number of objects is not limited. For example, the first object can be one or multiple. In addition, "and/or" in the description and claims indicates at least one of the connected objects, and the character "/" generally indicates that the related objects are in an "or" relationship.
下面结合附图,通过具体的实施例及其应用场景对本申请实施例提供的信息传输方法进行详细地说明。The information transmission method provided by the embodiments of the present application will be described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios.
如图1所示,为本申请实施例提供的信息加密方法的流程示意图。其中,该方法可包括:As shown in Figure 1, it is a schematic flow chart of an information encryption method provided by an embodiment of the present application. Among them, the method may include:
步骤101,获取第一超声波信息和第一文本,第一超声波信息包括超声波振幅值和超声波频率值。Step 101: Obtain first ultrasonic information and first text. The first ultrasonic information includes ultrasonic amplitude value and ultrasonic frequency value.
本申请实施例的方法可由第一电子设备执行,第一文本是第一电子设备的用户A与第二电子设备的用户B之间的通信文本,比如日常聊天文本、商务沟通文本等。The method of the embodiment of the present application can be executed by the first electronic device. The first text is a communication text between user A of the first electronic device and user B of the second electronic device, such as daily chat text, business communication text, etc.
具体的,第一文本可以是存储在第一电子设备本地的文本或者是第一电子设备的用户A通过使用安装在第一电子设备上的输入法程序编辑的文本。Specifically, the first text may be text stored locally on the first electronic device or text edited by user A of the first electronic device by using an input method program installed on the first electronic device.
步骤102,对第一文本进行数据处理,获得第一数据;Step 102: Perform data processing on the first text to obtain first data;
这里,对第一文本进行数据处理,其目的是为了将第一文本转换为能够被计算机所识别的数据,即第一数据。Here, the purpose of performing data processing on the first text is to convert the first text into data that can be recognized by the computer, that is, first data.
步骤103,利用超声波振幅值和超声波频率值,对第一数据进行移位加密,获得加密文本。Step 103: Use the ultrasonic amplitude value and the ultrasonic frequency value to perform shift encryption on the first data to obtain the encrypted text.
其中,在超声波振幅值与超声波频率值不相等的情况下,可以利用超声波振幅值对第一数据左移加密,利用超声波频率值对左移加密后的数据再进行右移加密;也可以利用超声波振幅值对第一数据右移加密,利用超声波频率值右移加密后的数据再进行左移加密。Wherein, when the ultrasonic amplitude value is not equal to the ultrasonic frequency value, the ultrasonic amplitude value can be used to shift left to encrypt the first data, and the ultrasonic frequency value can be used to perform right shift encryption on the left-shifted encrypted data; ultrasonic waves can also be used The first data is encrypted by right-shifting the amplitude value, and the encrypted data is encrypted by right-shifting the ultrasonic frequency value and then is encrypted by left-shifting.
这里,还可以对第一数据左移加密或右移加密,左移或者右移的位数为超声波振幅值与超声波频率值的和。Here, the first data can also be encrypted by left shift or right shift, and the number of bits shifted left or right is the sum of the ultrasonic amplitude value and the ultrasonic frequency value.
需要说明的是,对第一数据进行移位加密包括但不限于上述情况。将超声波信息作为密钥对数据进行移位加密,能够提升文本加密的安全性,从而有效解决用户在使用电子设备传输文本时文本被拦截或窃取的风险的问题。It should be noted that performing shift encryption on the first data includes but is not limited to the above situations. Using ultrasonic information as a key to shift-encrypt data can improve the security of text encryption, thereby effectively solving the problem of the risk of text being intercepted or stolen when users use electronic devices to transmit text.
作为一可选地实现方式,上述步骤102可具体包括:As an optional implementation manner, the above step 102 may specifically include:
步骤1021,对第一文本进行二进制转换,获得第一数据。Step 1021: Perform binary conversion on the first text to obtain first data.
即第一数据为二进制数据,可以被计算机识别到。That is, the first data is binary data and can be recognized by the computer.
作为一可选地实现方式,上述步骤103可具体包括:As an optional implementation manner, the above step 103 may specifically include:
步骤1031,将第一数据进行分段处理,得到第一分段数据和第二分段数据。Step 1031: Perform segmentation processing on the first data to obtain first segmented data and second segmented data.
这里,将第一数据进行分段处理可以是将第一数据按照预设规则进行分段处理,比如将第一数据按照数据长度进行预设比例的分段处理,比如将第一数据进行平分(1:1)分段处理、将第一数据进行非等分(如1:2或2:3)分段处理。Here, segmenting the first data may be segmenting the first data according to preset rules, such as segmenting the first data at a preset ratio according to the data length, such as dividing the first data equally ( 1:1) segmentation processing, the first data is divided into non-equal segments (such as 1:2 or 2:3) for segmentation processing.
步骤1032,利用超声波振幅值对第一分段数据进行第一位移操作,获得第三分段数据。Step 1032: Use the ultrasonic amplitude value to perform a first displacement operation on the first segmented data to obtain the third segmented data.
可选地,第一位移操作为左移或者右移操作。Optionally, the first shift operation is a left shift or a right shift operation.
步骤1033,利用超声波频率值对第二分段数据进行第二位移操作,获得第四分段数据。Step 1033: Use the ultrasonic frequency value to perform a second displacement operation on the second segmented data to obtain the fourth segmented data.
可选地,第二位移操作为左移或右移操作。Optionally, the second shift operation is a left shift or a right shift operation.
步骤1034,根据第三分段数据和第四分段数据,获得加密文本。Step 1034: Obtain the encrypted text based on the third segment data and the fourth segment data.
在一可选地实现方式中,步骤1034可以具体包括:In an optional implementation, step 1034 may specifically include:
a)将第三分段数据和第四分段数据聚合,得到第二数据;a) Aggregate the third segment data and the fourth segment data to obtain the second data;
这里,对第三分段数据和第四分段数据进行聚合也可理解为对第三分段数据和第四分段数据进行拼接。Here, aggregating the third segment data and the fourth segment data can also be understood as splicing the third segment data and the fourth segment data.
b)对第二数据进行十六进制转换,获得加密文本。b) Perform hexadecimal conversion on the second data to obtain encrypted text.
下面通过一示例,具体说明本申请实施例的加密过程。The following uses an example to specifically describe the encryption process in the embodiment of the present application.
在一示例中,字符串“C”的在计算机中二进制ASCII码值为01000011,前后分段后为0100,0011。若超声波振幅值为3、超声波频率值为5,则可以将“0100”分段左移3位,得到的值为0010;将“0011”分段右移5位,得到的值为1001。之后,将得到的“0010”和“1001”聚合,得到0010,1001。最后,将得到的0010,1001转化为对应的十六进制数,则得到文本值为“29”,将该文本值“29”作为加密文本。In an example, the binary ASCII code value of the string "C" in the computer is 01000011, which is 0100,0011 after segmentation. If the ultrasonic amplitude value is 3 and the ultrasonic frequency value is 5, you can shift "0100" to the left by 3 bits in segments, and the resulting value is 0010; shift "0011" to the right in segments by 5 bits, and the value is 1001. After that, the obtained "0010" and "1001" are aggregated to obtain 0010,1001. Finally, the obtained 0010,1001 is converted into the corresponding hexadecimal number, and the text value "29" is obtained, and the text value "29" is used as the encrypted text.
可选地,第一超声波信息为与本端电子设备配对成功的对端电子设备发送的超声波信息。Optionally, the first ultrasonic information is ultrasonic information sent by the peer electronic device that is successfully paired with the local electronic device.
其中,令本端电子设备为第一电子设备,对端电子设备为第二电子设备。具体的,第一电子设备与第二电子设备通过超声波配对成功,其中,第一电子设备与第二电子设备通过超声波成功配对指的是第一电子设备和第二电子设备双方分别记录对方的超声波信息,并确认彼此已收到对方的超声波信息。Wherein, let the local electronic device be the first electronic device, and the peer electronic device be the second electronic device. Specifically, the first electronic device and the second electronic device are successfully paired through ultrasonic waves. The successful pairing of the first electronic device and the second electronic device through ultrasonic waves means that the first electronic device and the second electronic device respectively record each other's ultrasonic waves. information and confirm that each other has received the other party’s ultrasound information.
基于此,具体的,在步骤103之后,本申请实施例的方法还可包括:Based on this, specifically, after step 103, the method in the embodiment of the present application may also include:
步骤104a,向对端电子设备发送加密文本。Step 104a: Send the encrypted text to the peer electronic device.
在本端电子设备(第一电子设备)与通信对端电子设备(第二电子设备)进行文本通信的场景下,利用第一超声波信息(即第二电子设备发送的超声波信息)对第一文本进行加密,一是为了避免第一文本被拦截或窃取,二是为了避免第一文本显示在电子设备的屏幕上时被偷窥泄露,三是为了便于后续加密文本被对端电子设备(第二电子设备)接收后,对端电子设备利用自身发送的第一超声波信息对加密文本进行解密。In a scenario where the local electronic device (first electronic device) and the communication peer electronic device (second electronic device) perform text communication, the first ultrasonic information (that is, the ultrasonic information sent by the second electronic device) is used to Encryption is performed, firstly, to prevent the first text from being intercepted or stolen, secondly, to prevent the first text from being leaked by prying eyes when it is displayed on the screen of the electronic device, and thirdly, to facilitate subsequent encryption of the text by the peer electronic device (the second electronic device). After the device) receives it, the peer electronic device uses the first ultrasonic information sent by itself to decrypt the encrypted text.
在一可选地实现方式中,在步骤103之后,本申请实施例的方法还可包括:In an optional implementation, after step 103, the method in the embodiment of the present application may further include:
步骤104b,向对端电子设备发送第二超声波信息,第二超声波信息为本端电子设备发送的超声波信息。Step 104b: Send second ultrasonic information to the peer electronic device. The second ultrasonic information is the ultrasonic information sent by the local electronic device.
这里,第二超声波信息发送的目的是为了使对端电子设备(第二电子设备)验证与之通信的对象是本端电子设备(第一电子设备),这样可以避免对端电子设备(第二电子设备)对不相关的加密文本进行解密,进而避免不必要的功耗。Here, the purpose of sending the second ultrasonic information is to enable the peer electronic device (second electronic device) to verify that the object of communication with it is the local electronic device (first electronic device). This can avoid the peer electronic device (second electronic device) Electronic devices) decrypt irrelevant encrypted text to avoid unnecessary power consumption.
在第一电子设备与第二电子设备通过超声波配对成功的情况下,利用第一超声波信息对第一文本进行加密,获得加密文本,第一超声波信息为第一电子设备记录的、第二电子设备发送的超声波信息;向第二电子设备分别发送加密文本和第二超声波信息,第二超声波信息为第一电子设备发送的超声波信息,如此,基于超声波信息对文本进行加密处理,不仅能够提升文本加密的安全性,从而有效解决用户在使用电子设备传输文本时文本被拦截或窃取的风险的问题,还能够有效解决用户在使用电子设备传输文本时隐私被偷窥及泄露的风险,达到保护用户隐私的目的。When the first electronic device and the second electronic device are successfully paired through ultrasonic waves, the first ultrasonic information is used to encrypt the first text to obtain the encrypted text. The first ultrasonic information is recorded by the first electronic device and recorded by the second electronic device. The sent ultrasonic information; sending the encrypted text and the second ultrasonic information to the second electronic device respectively. The second ultrasonic information is the ultrasonic information sent by the first electronic device. In this way, encrypting the text based on the ultrasonic information can not only improve text encryption security, thereby effectively solving the problem of the risk of text being intercepted or stolen when users use electronic devices to transmit text. It can also effectively solve the risk of users' privacy being peeped and leaked when using electronic devices to transmit text, achieving the goal of protecting user privacy. Purpose.
作为一可选地实现方式,本申请实施例的方法还可包括:As an optional implementation manner, the method in the embodiment of this application may also include:
S1,向第二电子设备发送第二超声波信息。S1: Send second ultrasonic information to the second electronic device.
其中,第一电子设备向第二电子设备发送第二超声波信息,其目的是为了与第二电子设备建立超声波配对关系,以使后续配对成功后,第二电子设备能够基于该第二超声波信息验证通信对象是否是第一电子设备。The purpose of the first electronic device sending the second ultrasonic information to the second electronic device is to establish an ultrasonic pairing relationship with the second electronic device, so that after subsequent pairing is successful, the second electronic device can verify based on the second ultrasonic information. Whether the communication object is the first electronic device.
S2,若接收到第二电子设备发送的第一超声波信息,则向第二电子设备发送第一确认信息,并在接收到第二电子设备发送的第二确认信息的情况下,确定第一电子设备与第二电子设备配对成功,其中,第一确认信息用于表示第一电子设备已收到第一超声波信息,第二确认信息用于表示第二电子设备已收到第二超声波信息。S2, if the first ultrasonic information sent by the second electronic device is received, the first confirmation information is sent to the second electronic device, and when the second confirmation information sent by the second electronic device is received, it is determined that the first electronic device The device and the second electronic device are paired successfully, where the first confirmation information is used to indicate that the first electronic device has received the first ultrasonic information, and the second confirmation information is used to indicate that the second electronic device has received the second ultrasonic information.
第一电子设备在接收到第二电子设备发送的第一超声波信息后,向第二电子设备发送第一确认信息,其目的是为了通知第二电子设备,与之通信的第一电子设备已经收到了第一超声波信息;另外,第二电子设备在收到第一电子设备发送的第二超声波信息后,也会向第一电子设备发送第二确认信息,其目的是为了通知第一电子设备,与之通信的第二电子设备已经收到了第二超声波信息。这样,在第一电子设备和第二电子设备双方分别记录对方的超声波信息,并确认彼此已收到对方的超声波信息的情况下,确定第一电子设备与第二电子设备通过超声波成功配对。After receiving the first ultrasonic information sent by the second electronic device, the first electronic device sends the first confirmation information to the second electronic device. The purpose is to notify the second electronic device that the first electronic device communicating with it has received the first ultrasonic information. When the first ultrasonic information is received; in addition, after receiving the second ultrasonic information sent by the first electronic device, the second electronic device will also send the second confirmation information to the first electronic device, with the purpose of notifying the first electronic device. The second electronic device with which it communicates has received the second ultrasonic information. In this way, when the first electronic device and the second electronic device respectively record each other's ultrasonic information and confirm that each other has received the other's ultrasonic information, it is determined that the first electronic device and the second electronic device are successfully paired through ultrasonic waves.
需要说明的是,第一电子设备在接收第二电子设备发送的超声波信息时,其他电子设备也可能向第一电子设备发送超声波信息,为了使第一电子设备区分出超声波信息的发送对象是否是第二电子设备,本申请实施例中,其他电子设备(包括第二电子设备)在向第一电子设备发送超声波信息时,还需要发送设备标识信息,用于标识设备,所以作为一可选地实现方式,步骤S2中接收到第二电子设备发送的第一超声波信息具体包括以下步骤:It should be noted that when the first electronic device receives the ultrasonic information sent by the second electronic device, other electronic devices may also send ultrasonic information to the first electronic device. In order for the first electronic device to distinguish whether the ultrasonic information is sent to the Second electronic device. In this embodiment of the present application, when other electronic devices (including the second electronic device) send ultrasonic information to the first electronic device, they also need to send device identification information for identifying the device, so as an option Implementation, receiving the first ultrasonic information sent by the second electronic device in step S2 specifically includes the following steps:
S21,接收目标电子设备发送的目标超声波信息和设备标识信息。S21. Receive target ultrasonic information and device identification information sent by the target electronic device.
这里,目标电子设备可以是一个也可以是多个。当目标电子设备为多个时,每个电子设备均发送一个超声波信息和一个设备标识信息。Here, the target electronic device may be one or multiple. When there are multiple target electronic devices, each electronic device sends an ultrasonic wave information and a device identification information.
S22,若根据设备标识信息验证目标电子设备为对端电子设备,则将目标超声波信息记录为第一超声波信息。S22: If the target electronic device is verified to be the peer electronic device according to the device identification information, record the target ultrasonic information as the first ultrasonic information.
通过上述步骤S21~S22的实施过程,确定本端电子设备(第一电子设备)接收到对端电子设备(第二电子设备)发送的第一超声波信息。Through the implementation process of the above-mentioned steps S21 to S22, it is determined that the local electronic device (first electronic device) receives the first ultrasonic information sent by the peer electronic device (second electronic device).
需要说明的是,在第一电子设备与第二电子设备之间结束会话后,可以解除双方的配对关系,因此,作为一可选地实现方式,本申请实施例还可包括:It should be noted that after the session between the first electronic device and the second electronic device ends, the pairing relationship between the two parties can be terminated. Therefore, as an optional implementation manner, the embodiment of the present application may also include:
S31,在触发第一事件的情况下,停止发送第二超声波信息,并删除本地记录的第一超声波信息;S31, when the first event is triggered, stop sending the second ultrasonic information and delete the locally recorded first ultrasonic information;
其中,第一事件包括下述中的一者:Among them, the first event includes one of the following:
向第二电子设备发送配对解除请求;Send a pairing release request to the second electronic device;
接收到第二电子设备发送的配对解除请求。A pairing release request sent by the second electronic device is received.
也就是说,第一电子设备和第二电子设备任一一方发送配对解除请求后,对于第一电子设备,第一电子设备解除配对,即停止发送第二超声波信息,并删除之前记录的第二电子设备发送的第一超声波信息。对于第二电子设备,第二电子设备也解除配对,即停止发送第一超声波信息,并删除之前记录的第一电子设备发送的第二超声波信息。这样,能够避免电子设备一直发送超声波信息而造成的能耗,达到节约能耗的问题。That is to say, after either the first electronic device or the second electronic device sends a pairing unpairing request, the first electronic device unpairs the first electronic device, that is, stops sending the second ultrasonic information, and deletes the previously recorded third Two electronic devices send the first ultrasonic information. For the second electronic device, the second electronic device also unpairs, that is, stops sending the first ultrasonic information, and deletes the previously recorded second ultrasonic information sent by the first electronic device. In this way, the energy consumption caused by the electronic equipment continuously sending ultrasonic information can be avoided, thereby saving energy consumption.
如图2所示,为本申请实施例提供的信息解密方法的流程示意图。该信息解密方法由第二电子设备执行,这里,第二电子设备即为图1所示的方法中所述的对端电子设备,即与第一电子设备进行通信的第二电子设备,其中,该方法可包括:As shown in Figure 2, it is a schematic flow chart of the information decryption method provided by the embodiment of the present application. The information decryption method is executed by a second electronic device. Here, the second electronic device is the peer electronic device described in the method shown in Figure 1, that is, the second electronic device that communicates with the first electronic device, where, This method may include:
步骤201,接收第一电子设备发送的加密文本;其中,加密文本由第一电子设备利用第一超声波信息的超声波振幅值和超声波频率值加密第一文本后获得的,第一超声波信息为与第一电子设备配对成功的第二电子设备发送的超声波信息。Step 201: Receive the encrypted text sent by the first electronic device; wherein the encrypted text is obtained by the first electronic device using the ultrasonic amplitude value and the ultrasonic frequency value of the first ultrasonic information to encrypt the first text, and the first ultrasonic information is the same as the first ultrasonic information. Ultrasonic information sent by a second electronic device when one electronic device is successfully paired.
步骤202,利用超声波振幅值和超声波频率值,对加密文本进行反向移位解密,得到第一数据。Step 202: Use the ultrasonic amplitude value and the ultrasonic frequency value to perform reverse shift decryption on the encrypted text to obtain the first data.
需要说明的是,第二电子设备本地存储有第一超声波信息。It should be noted that the second electronic device locally stores the first ultrasound information.
步骤203,将第一数据转换为第一文本。Step 203: Convert the first data into first text.
本申请实施例的信息解密方法,通过接收第一电子设备发送的加密文本;其中,加密文本由第一电子设备利用第一超声波信息的超声波振幅值和超声波频率值加密第一文本后获得的,第一超声波信息为第二电子设备在与第一电子设备配对过程中发送的超声波信息;之后,利用超声波振幅值和超声波频率值,对加密文本进行反向移位解密,得到第一数据;最后将第一数据转换为第一文本,如此,接收到的加密文本能够避免文本中的隐私信息被窃取,之后对利用超声波信息对加密文本进行解密,获得第一文本,达到解密的目的。The information decryption method of the embodiment of the present application receives the encrypted text sent by the first electronic device; wherein the encrypted text is obtained by the first electronic device using the ultrasonic amplitude value and ultrasonic frequency value of the first ultrasonic information to encrypt the first text, The first ultrasonic information is the ultrasonic information sent by the second electronic device during the pairing process with the first electronic device; then, the ultrasonic amplitude value and the ultrasonic frequency value are used to perform reverse shift decryption of the encrypted text to obtain the first data; finally Convert the first data into the first text, so that the received encrypted text can prevent the private information in the text from being stolen, and then use the ultrasonic information to decrypt the encrypted text to obtain the first text, thereby achieving the purpose of decryption.
在一可选地实现方式中,上述步骤202可具体包括:In an optional implementation, the above step 202 may specifically include:
步骤2021,对加密文本进行二进制转换,获得第二数据。Step 2021: Perform binary conversion on the encrypted text to obtain second data.
步骤2022,将第二数据进行分段处理,得到第三分段数据和第四分段数据。Step 2022: Perform segmentation processing on the second data to obtain third segmented data and fourth segmented data.
这里,将第二数据进行分段处理与上述图1所示方法中将第一数据进行分段处理的方式相同。Here, the second data is segmented in the same manner as the first data is segmented in the method shown in FIG. 1 .
步骤2023,利用超声波振幅值对第三分段数据进行反向第一位移操作,获得第一分段数据。Step 2023: Use the ultrasonic amplitude value to perform a reverse first displacement operation on the third segment data to obtain the first segment data.
可选地,反向第一位移操作为右移或左移操作。具体的,与步骤1032中的第一位移操作相反。若第一位移操作为左移操作,则反向第一位移操作为右移操作;若第一位移操作为右移操作,则反向第一位移操作为左移操作。Optionally, the first reverse shift operation is a right shift or a left shift operation. Specifically, it is opposite to the first displacement operation in step 1032. If the first shift operation is a left shift operation, the reverse first shift operation is a right shift operation; if the first shift operation is a right shift operation, the reverse first shift operation is a left shift operation.
步骤2024,利用超声波频率值对第三分段数据进行反向第二位移操作,获得第二分段数据。Step 2024: Use the ultrasonic frequency value to perform a reverse second displacement operation on the third segment data to obtain the second segment data.
可选地,反向第二位移操作为右移或左移操作。具体的,与步骤1033中的第二位移操作相反。若第二位移操作为左移操作,则反向第二位移操作为右移操作;若第二位移操作为右移操作,则反向第二位移操作为左移操作。Optionally, the reverse second shift operation is a right shift or a left shift operation. Specifically, it is opposite to the second displacement operation in step 1033. If the second shift operation is a left shift operation, the reverse second shift operation is a right shift operation; if the second shift operation is a right shift operation, the reverse second shift operation is a left shift operation.
步骤2025,根据第一分段数据和第二分段数据,获得第一数据。Step 2025: Obtain first data based on the first segmented data and the second segmented data.
在一可选地实现方式中,步骤2025可以具体包括:In an optional implementation, step 2025 may specifically include:
A)将第一分段数据和第二分段数据进行聚合,得到第一数据。A) Aggregate the first segmented data and the second segmented data to obtain the first data.
这里,对第一分段数据和第二分段数据进行聚合也可理解为对第一分段数据和第二分段数据进行拼接。Here, aggregating the first segmented data and the second segmented data can also be understood as splicing the first segmented data and the second segmented data.
通过上述解密处理,能够达到解密与第二电子设备通信的第一电子设备发送的加密文本的目的。Through the above decryption process, the purpose of decrypting the encrypted text sent by the first electronic device communicating with the second electronic device can be achieved.
具体的,第一电子设备与第二电子设备通过超声波配对成功。这里,第一电子设备与第二电子设备通过超声波成功配对指的是第一电子设备和第二电子设备双方分别记录对方的超声波信息,并确认彼此已收到对方的超声波信息。Specifically, the first electronic device and the second electronic device are successfully paired through ultrasonic waves. Here, the successful pairing of the first electronic device and the second electronic device through ultrasonic waves means that the first electronic device and the second electronic device respectively record the other party's ultrasonic information and confirm that each other has received the other party's ultrasonic information.
作为一可选地实现方式,本申请实施例的方法还可包括:As an optional implementation manner, the method in the embodiment of this application may also include:
i,接收到第一电子设备的第二超声波信息;i. Receive the second ultrasonic information from the first electronic device;
这里,第二电子设备利用该第二超声波信息可验证与之通信的对象是否是第一电子设备,这样可以避免后续第二电子设备对不相关的加密文本进行解密,进而避免不必要的功耗。Here, the second electronic device can use the second ultrasonic information to verify whether the object it communicates with is the first electronic device. This can avoid subsequent decryption of irrelevant encrypted text by the second electronic device, thereby avoiding unnecessary power consumption. .
ii,在对第二超声波信息检测成功的情况下,执行步骤202,即利用超声波振幅值和超声波频率值,对加密文本进行反向移位解密,得到第一数据。ii. If the detection of the second ultrasonic information is successful, step 202 is performed, that is, using the ultrasonic amplitude value and the ultrasonic frequency value to perform reverse shift decryption of the encrypted text to obtain the first data.
对第二超声波信息检测成功指的是第二超声波信息与之前记录的第一电子设备发送的超声波信息匹配成功。Successfully detecting the second ultrasonic information means that the second ultrasonic information successfully matches the previously recorded ultrasonic information sent by the first electronic device.
由于第一电子设备端利用的第一超声波信息(即第二电子设备发送的超声波信息)对第一文本进行加密得到的加密文本,所以,利用第一超声波信息对加密文本进行解密,可获得第一文本。Since the first electronic device uses the first ultrasonic information (that is, the ultrasonic information sent by the second electronic device) to encrypt the first text to obtain the encrypted text, therefore, the first ultrasonic information is used to decrypt the encrypted text to obtain the third A text.
本申请实施例的信息解密方法,还可以是在第一电子设备与第二电子设备通过超声波配对成功的情况下,接收第一电子设备分别发送的加密文本和第二超声波信息,这样接收到的加密文本能够避免文本中隐私信息被窃取、被偷窥泄露,达到保护用户隐私的目的;然后,通过验证第二超声波信息可以避免第二电子设备对不相关的加密文本进行解密,进而避免不必要的功耗,最后在对第二超声波信息检测成功的情况下,根据第一超声波信息对加密文本进行解密,获得第一文本,达到解密与第二电子设备通信的第一电子设备发送的加密文本的目的。The information decryption method in the embodiment of the present application may also include receiving the encrypted text and the second ultrasonic information respectively sent by the first electronic device when the first electronic device and the second electronic device are successfully paired through ultrasonic waves, so that the received The encrypted text can prevent the private information in the text from being stolen, leaked by peeping, and achieve the purpose of protecting user privacy; then, by verifying the second ultrasonic information, it can prevent the second electronic device from decrypting the irrelevant encrypted text, thereby avoiding unnecessary Power consumption. Finally, when the second ultrasonic information is successfully detected, the encrypted text is decrypted according to the first ultrasonic information to obtain the first text, achieving the goal of decrypting the encrypted text sent by the first electronic device communicating with the second electronic device. Purpose.
作为一可选地实现方式,本申请实施例的方法还可包括:As an optional implementation manner, the method in the embodiment of this application may also include:
S41,接收第一电子设备发送的第二超声波信息,并记录第二超声波信息。S41. Receive the second ultrasonic information sent by the first electronic device, and record the second ultrasonic information.
在第二电子设备接收到第一电子设备发送的第二超声波信息后,即可确定第一电子设备想要与第二电子设备建立超声波配对关系,于是记录第二超声波信息,以便于后续配对成功后,第二电子设备能够基于该第二超声波信息验证通信对象是否是第一电子设备。After the second electronic device receives the second ultrasonic information sent by the first electronic device, it can determine that the first electronic device wants to establish an ultrasonic pairing relationship with the second electronic device, and then records the second ultrasonic information to facilitate subsequent successful pairing. Finally, the second electronic device can verify whether the communication object is the first electronic device based on the second ultrasonic information.
S42,向第一电子设备发送第一超声波信息和第二电子设备的设备标识信息。S42. Send the first ultrasonic information and the device identification information of the second electronic device to the first electronic device.
为了建立第一电子设备与第二电子设备超声波配对关系,设备双方均需要发送各自的超声波信息给对方,所以,第二电子设备执行步骤S42。In order to establish an ultrasonic pairing relationship between the first electronic device and the second electronic device, both devices need to send their own ultrasonic information to the other party. Therefore, the second electronic device executes step S42.
这里,第二电子设备发送第二电子设备(即自身)的设备标识信息,其目的是为了使第一电子设备区分出超声波信息的发送对象是第二电子设备,提升设备配对效率和成功率。Here, the purpose of the second electronic device sending the device identification information of the second electronic device (that is, itself) is to enable the first electronic device to distinguish that the ultrasonic information is sent to the second electronic device, thereby improving device pairing efficiency and success rate.
S43,向第一电子设备发送第二确认信息,并在接收到第一电子设备发送的第一确认信息的情况下,确定述第一电子设备与第二电子设备配对成功,其中,第一确认信息用于表示第一电子设备已收到第一超声波信息,第二确认信息用于表示第二电子设备已收到第二超声波信息。S43, send the second confirmation information to the first electronic device, and upon receiving the first confirmation information sent by the first electronic device, determine that the first electronic device and the second electronic device are successfully paired, wherein the first confirmation The information is used to indicate that the first electronic device has received the first ultrasonic information, and the second confirmation information is used to indicate that the second electronic device has received the second ultrasonic information.
这里,第二电子设备向第一电子设备发送第二确认信息,其目的是为了通知第一电子设备,与之通信的第二电子设备已经收到了第二超声波信息;另外,第二电子设备接收到第一电子设备发送的第一确认信息,其目的是获知到与之通信的第一电子设备已经收到了第一超声波信息。这样,在第一电子设备和第二电子设备双方分别记录对方的超声波信息,并确认彼此已收到对方的超声波信息的情况下,确定第一电子设备与第二电子设备通过超声波成功配对。Here, the second electronic device sends the second confirmation information to the first electronic device, the purpose of which is to notify the first electronic device that the second electronic device communicating with it has received the second ultrasonic information; in addition, the second electronic device receives The purpose of the first confirmation information sent to the first electronic device is to learn that the first electronic device communicating with it has received the first ultrasonic information. In this way, when the first electronic device and the second electronic device respectively record each other's ultrasonic information and confirm that each other has received the other's ultrasonic information, it is determined that the first electronic device and the second electronic device are successfully paired through ultrasonic waves.
作为一可选地实现方式,本申请实施例的方法还可包括:As an optional implementation manner, the method in the embodiment of this application may also include:
S51,将本地记录的第一电子设备发送的超声波信息与第二超声波信息进行匹配,得到匹配结果。S51. Match the locally recorded ultrasonic information sent by the first electronic device with the second ultrasonic information to obtain a matching result.
需要说明的是,在第一电子设备与第二电子设备通过超声波配对成功时,第二电子设备在本地记录了第一电子设备发送的超声波信息。It should be noted that when the first electronic device and the second electronic device are successfully paired through ultrasonic waves, the second electronic device locally records the ultrasonic information sent by the first electronic device.
第一电子设备在发送加密文本时,还发送第一电子设备的第二超声波信息给第二电子设备,为了避免第二电子设备对不相关的加密文本进行解密,进而避免不必要的功耗,第二电子设备可以将本地记录的第一电子设备发送的超声波信息与第二超声波信息进行匹配,进而验证与第二电子设备通信的对象是否是第一电子设备,若匹配结果表示匹配成功,说明验证通过,则可执行后续的解密步骤;否则,则不做处理。When sending the encrypted text, the first electronic device also sends the second ultrasonic information of the first electronic device to the second electronic device. In order to prevent the second electronic device from decrypting irrelevant encrypted text and thus avoid unnecessary power consumption, The second electronic device can match the locally recorded ultrasonic information sent by the first electronic device with the second ultrasonic information, and then verify whether the object communicating with the second electronic device is the first electronic device. If the matching result indicates that the matching is successful, it means If the verification is passed, subsequent decryption steps can be performed; otherwise, no processing will be performed.
S52,若匹配结果表示匹配成功,则确定对第二超声波信息检测成功。S52, if the matching result indicates that the matching is successful, it is determined that the second ultrasonic information is successfully detected.
通过下述示例一说明第一电子设备与第二电子设备通过超声波配对的过程。The following example 1 illustrates the process of pairing the first electronic device and the second electronic device through ultrasonic waves.
示例一Example 1
该示例一中,第一电子设备为设备A,第二电子设备为设备B。具体的配对过程如下:In this example one, the first electronic device is device A, and the second electronic device is device B. The specific pairing process is as follows:
S301,设备A向设备B发送超声波信息1进行请求配对。S301: Device A sends ultrasonic information 1 to device B to request pairing.
这里,设备A向设备B发送超声波信息1进行请求配对时,设备A的屏幕上显示表示两个设备正在进行配对的示意图,如图3左侧所示。Here, when device A sends ultrasonic information 1 to device B to request pairing, a schematic diagram showing that the two devices are pairing is displayed on the screen of device A, as shown on the left side of Figure 3.
S302,设备B接收到超声波信息1后,记录超声波信息1;之后,设备B向设备A发送超声波信息2和设备B的设备标识。S302: After receiving the ultrasonic information 1, the device B records the ultrasonic information 1; after that, the device B sends the ultrasonic information 2 and the device identification of the device B to the device A.
其中,设备B接收到超声波信息1后,设备B的屏幕上也会显示表示两个设备正在进行配对的示意图,如图3右侧所示。Among them, after device B receives the ultrasonic information 1, a schematic diagram indicating that the two devices are pairing will also be displayed on the screen of device B, as shown on the right side of Figure 3.
S303,设备A接收到设备B的设备标识和超声波信息2,基于设备B的设备标识验证与设备A通信的对象为设备B后,记录超声波信息2。S303. Device A receives the device identification and ultrasonic information 2 of device B. After verifying that the object communicating with device A is device B based on the device identification of device B, it records the ultrasonic information 2.
S304,在设备A与设备B彼此之间都收到对方发送给自己的确认信息后,确定设备A与设备B通过超声波成功配对,否则则持续发送超声波信息直至双方配对成功。S304. After both device A and device B receive the confirmation information sent to them by the other party, it is determined that device A and device B are successfully paired through ultrasonic waves. Otherwise, the ultrasonic wave information is continued to be sent until both parties are successfully paired.
这里,超声波信息可包括超声波振幅值、频率值和峰值等。Here, the ultrasonic wave information may include ultrasonic wave amplitude values, frequency values, peak values, etc.
需要说明的是,在设备A与设备B彼此之间都收到对方发送给自己的确认信息后,设备A和设备B的屏幕上均会为用户显示配对成功的第一提示信息,另外还会显示第二提示信息,第二提示信息用于指示用户可以向配对方发送信息。It should be noted that after both device A and device B receive the confirmation information sent to them by the other party, the first prompt message of successful pairing will be displayed to the user on the screen of both device A and device B. In addition, Second prompt information is displayed, and the second prompt information is used to indicate that the user can send information to the paired party.
通过下述示例二说明第一电子设备与第二电子设备在通过超声波配对成功后的信息交互过程。The following example 2 illustrates the information interaction process between the first electronic device and the second electronic device after successful pairing through ultrasonic waves.
示例二Example 2
该示例二承接示例一,第一电子设备为设备A,第二电子设备为设备B。且设备A作为信息发送方,设备B作为信息接收方。参见图4,具体的交互过程如下:This Example 2 follows Example 1. The first electronic device is device A, and the second electronic device is device B. And device A serves as the information sender, and device B serves as the information receiver. See Figure 4. The specific interaction process is as follows:
S401,设备A通过输入法编辑得到文本m。S401. Device A obtains text m through input method editing.
S402,设备A利用超声波信息2对文本m进行加密,得到加密文本m’。S402: Device A uses ultrasonic information 2 to encrypt text m and obtains encrypted text m’.
具体的,设备A可利用超声波信息2中的超声波振幅值和频率值对文本m左移或者右移加密。Specifically, device A can use the ultrasonic amplitude value and frequency value in the ultrasonic information 2 to move the text m left or right to encrypt.
其中,加密算法可设计如下:Among them, the encryption algorithm can be designed as follows:
将每位字母或者数字的二进制ASCII编码进行前后平分分段,对前段二进制ASCII进行左移超声波振幅值,对后段二进制ASCII码右移位超声波频率值,然后再将进行位移操作后的二进制ASCII码转化为16进制作为加密后的密文文本,以达到加密的目的。Divide the binary ASCII code of each letter or number into equal segments, shift the former binary ASCII left by the ultrasonic amplitude value, shift the latter binary ASCII code right by the ultrasonic frequency value, and then shift the binary ASCII The code is converted into hexadecimal as the encrypted ciphertext text to achieve the purpose of encryption.
S403,设备A向设备B发送加密文本m’,并发送超声波信息1。S403. Device A sends the encrypted text m’ to device B and sends ultrasonic information 1.
S404,设备B接收加密文本m’和超声波信息1,并在设备B的屏幕上显示加密文本m’。S404: Device B receives the encrypted text m’ and the ultrasonic information 1, and displays the encrypted text m’ on the screen of device B.
S405,设备B将之前本地记录的设备A发送的超声波信息1与当前接收到的超声波信息1进行匹配,获得匹配结果。S405: Device B matches the previously locally recorded ultrasonic information 1 sent by device A with the currently received ultrasonic information 1 to obtain a matching result.
S406,若匹配结果表示匹配成功,则设备B利用超声波信息2对加密文本m’进行解密,得到文本m并显示于设备B的屏幕上。S406, if the matching result indicates that the match is successful, device B uses the ultrasonic information 2 to decrypt the encrypted text m', obtain the text m and display it on the screen of device B.
这里,文本m可通过单独弹框的形式显示在设备B的屏幕上。Here, text m can be displayed on the screen of device B in the form of a separate pop-up box.
S407,若匹配结果表示匹配失败,则设备B的屏幕上显示用于提示匹配失败的第三提示信息,且继续显示加密文本m’。S407, if the matching result indicates that the matching fails, the third prompt message for prompting the matching failure is displayed on the screen of device B, and the encrypted text m' is continued to be displayed.
例如,参见图5,设备A与设备B进行超声波配对后,设备A向设备B发送消息“你今天在干什么”,此时点击发送后,设备A会根据当前配对的设备B发送的超声波信息对“你今天在干什么”进行加密,得到密文”897873TF8A”,同时设备A发送自己的超声波信息;当设备B接收到设备A发送的密文”897873TF8A”后,此时同时验证设备A发送的超声波信息,通过验证确定当前接收到的设备A发送的超声波信息与之前已配对的超声波信息匹配后,将密文使用已配对的超声波信息进行解码,并展示解码结果给用户。For example, see Figure 5. After device A and device B perform ultrasonic pairing, device A sends a message "What are you doing today" to device B. After clicking Send, device A will send a message to device B based on the ultrasonic information sent by the currently paired device B. "What are you doing today" is encrypted and the ciphertext "897873TF8A" is obtained. At the same time, device A sends its own ultrasonic information; when device B receives the ciphertext "897873TF8A" sent by device A, it also verifies the ultrasonic wave sent by device A. Information, after verifying that the currently received ultrasonic information sent by device A matches the previously paired ultrasonic information, the ciphertext is decoded using the paired ultrasonic information, and the decoding result is displayed to the user.
在第一电子设备与第二电子设备之间结束会话后,可以解除双方的配对关系,因此,作为一可选地实现方式,本申请实施例的方法还包括:After the session between the first electronic device and the second electronic device ends, the pairing relationship between the two parties can be terminated. Therefore, as an optional implementation manner, the method in the embodiment of the present application also includes:
S71,在触发第二事件的情况下,停止发送第一超声波信息,并删除本地记录的第二超声波信息;S71, when the second event is triggered, stop sending the first ultrasonic information and delete the locally recorded second ultrasonic information;
其中,第二事件包括下述中的一者:Among them, the second event includes one of the following:
接收到第一电子设备发送的配对解除请求;Receive a pairing release request sent by the first electronic device;
向第一电子设备发送配对解除请求。Send a pairing release request to the first electronic device.
也就是说,第一电子设备和第二电子设备任一一方发送配对解除请求后,对于第一电子设备,第一电子设备解除配对,即停止发送第二超声波信息,并删除之前记录的第二电子设备发送的第一超声波信息。对于第二电子设备,第二电子设备也解除配对,即停止发送第一超声波信息,并删除之前记录的第一电子设备发送的第二超声波信息。这样,能够避免电子设备一直发送超声波信息而造成的能耗,达到节约能耗的问题。That is to say, after either the first electronic device or the second electronic device sends a pairing unpairing request, the first electronic device unpairs the first electronic device, that is, stops sending the second ultrasonic information, and deletes the previously recorded third Two electronic devices send the first ultrasonic information. For the second electronic device, the second electronic device also unpairs, that is, stops sending the first ultrasonic information, and deletes the previously recorded second ultrasonic information sent by the first electronic device. In this way, the energy consumption caused by the electronic equipment continuously sending ultrasonic information can be avoided, thereby saving energy consumption.
本申请实施例提供的信息加密方法,执行主体可以为信息加密输装置。本申请实施例中以信息加密装置执行信息加密方法为例,说明本申请实施例提供的信息加密装置。For the information encryption method provided by the embodiments of the present application, the execution subject may be an information encryption input device. In the embodiment of the present application, an information encryption device performing an information encryption method is used as an example to illustrate the information encryption device provided by the embodiment of the present application.
如图6所示,本申请实施例还提供一种信息加密装置,该装置600可包括:As shown in Figure 6, this embodiment of the present application also provides an information encryption device. The device 600 may include:
获取模块610,用于获取第一超声波信息和第一文本,第一超声波信息包括超声波振幅值和超声波频率值;The acquisition module 610 is used to acquire the first ultrasonic information and the first text. The first ultrasonic information includes ultrasonic amplitude value and ultrasonic frequency value;
数据处理模块620,用于对第一文本进行数据处理,获得第一数据;The data processing module 620 is used to perform data processing on the first text to obtain the first data;
加密模块630,用于利用超声波振幅值和超声波频率值,对第一数据进行移位加密,获得加密文本。The encryption module 630 is used to perform shift encryption on the first data using the ultrasonic amplitude value and the ultrasonic frequency value to obtain the encrypted text.
可选地,数据处理模块620包括:Optionally, the data processing module 620 includes:
第一数据处理单元,用于对第一文本进行二进制转换,获得第一数据。The first data processing unit is used to perform binary conversion on the first text to obtain the first data.
可选地,加密模块630包括:Optionally, encryption module 630 includes:
第二数据处理单元,用于将第一数据进行分段处理,得到第一分段数据和第二分段数据;The second data processing unit is used to segment the first data to obtain first segmented data and second segmented data;
第一加密单元,用于利用超声波振幅值对第一分段数据进行第一位移操作,获得第三分段数据;The first encryption unit is used to perform a first displacement operation on the first segmented data using the ultrasonic amplitude value to obtain the third segmented data;
第二加密单元,用于利用超声波频率值对第二分段数据进行第二位移操作,获得第四分段数据;a second encryption unit, configured to perform a second displacement operation on the second segmented data using the ultrasonic frequency value to obtain the fourth segmented data;
第三加密单元,用于根据第三分段数据和第四分段数据,获得加密文本。The third encryption unit is used to obtain the encrypted text based on the third segment data and the fourth segment data.
可选地,第三加密单元具体用于:Optionally, the third encryption unit is specifically used for:
将第三分段数据和第四分段数据聚合,得到第二数据;Aggregate the third segment data and the fourth segment data to obtain the second data;
对第二数据进行十六进制转换,获得加密文本。Perform hexadecimal conversion on the second data to obtain encrypted text.
可选地,第一超声波信息为与本端电子设备配对成功的对端电子设备发送的超声波信息。Optionally, the first ultrasonic information is ultrasonic information sent by the peer electronic device that is successfully paired with the local electronic device.
可选地,本申请实施例的信息加密装置600还包括:Optionally, the information encryption device 600 in this embodiment of the present application also includes:
发送模块,用于向对端电子设备发送加密文本。The sending module is used to send encrypted text to the peer electronic device.
可选地,本申请实施例的信息加密装置600还包括:Optionally, the information encryption device 600 in this embodiment of the present application also includes:
接收模块,用于接收目标电子设备发送的目标超声波信息和设备标识信息;The receiving module is used to receive the target ultrasonic information and device identification information sent by the target electronic device;
记录模块,用于在根据设备标识信息验证目标电子设备为对端电子设备的情况下,将目标超声波信息记录为第一超声波信息。The recording module is configured to record the target ultrasonic information as the first ultrasonic information when the target electronic device is verified to be the peer electronic device according to the device identification information.
本发明实施例的信息加密装置,通过获取第一超声波信息和第一文本,第一超声波信息包括超声波振幅值和超声波频率值;然后对第一文本进行数据处理,获得第一数据;最后利用超声波振幅值和超声波频率值,对第一数据进行移位加密,获得加密文本,如此,基于超声波信息对文本进行加密处理,能够提升文本加密的安全性,从而有效解决用户在使用电子设备传输文本时文本被拦截或窃取的风险的问题。The information encryption device according to the embodiment of the present invention obtains the first ultrasonic information and the first text. The first ultrasonic information includes the ultrasonic amplitude value and the ultrasonic frequency value; then performs data processing on the first text to obtain the first data; and finally uses ultrasonic waves. The amplitude value and the ultrasonic frequency value are used to perform shift encryption on the first data to obtain the encrypted text. In this way, encrypting the text based on the ultrasonic information can improve the security of text encryption, thereby effectively solving the problem when users use electronic devices to transmit text. Issues with the risk of text being intercepted or stolen.
本申请实施例中的信息加密装置可以是电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,电子设备可以为手机、平板电脑、笔记本电脑、掌上电脑、车载电子设备、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtualreality,VR)设备、机器人、可穿戴设备、超级移动个人计算机(ultra-mobile personalcomputer,UMPC)、上网本或者个人数字助理(personal digital assistant,PDA)等,还可以为服务器、网络附属存储器(Network Attached Storage,NAS)、个人计算机(personalcomputer,PC)、电视机(television,TV)、柜员机或者自助机等,本申请实施例不作具体限定。The information encryption device in the embodiment of the present application may be an electronic device or a component in the electronic device, such as an integrated circuit or chip. The electronic device may be a terminal or other devices other than the terminal. For example, the electronic device may be a mobile phone, a tablet computer, a notebook computer, a handheld computer, a vehicle-mounted electronic device, a mobile Internet device (MID), or augmented reality (AR)/virtual reality (VR) Devices, robots, wearable devices, ultra-mobile personal computers (UMPC), netbooks or personal digital assistants (PDA), etc., can also be servers, network attached storage (Network Attached Storage, NAS) , personal computer (PC), television (TV), teller machine or self-service machine, etc., the embodiments of this application are not specifically limited.
本申请实施例中的信息加密装置可以为具有操作系统的装置。该操作系统可以为安卓(Android)操作系统,可以为IOS操作系统,还可以为其他可能的操作系统,本申请实施例不作具体限定。The information encryption device in the embodiment of the present application may be a device with an operating system. The operating system may be an Android operating system, an IOS operating system, or other possible operating systems, which are not specifically limited in the embodiments of this application.
本申请实施例提供的信息加密装置能够实现图1的方法实施例实现的各个过程,为避免重复,这里不再赘述。The information encryption device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 1. To avoid repetition, details will not be described here.
如图7所示,本申请实施例还提供一种电子设备700,包括处理器701和存储器702,存储器702上存储有可在所述处理器701上运行的程序或指令,该程序或指令被处理器701执行时实现上述信息加密方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。As shown in Figure 7, the embodiment of the present application also provides an electronic device 700, including a processor 701 and a memory 702. The memory 702 stores programs or instructions that can be run on the processor 701. The program or instructions are When executed, the processor 701 implements each step of the above-mentioned information encryption method embodiment and can achieve the same technical effect. To avoid duplication, the details are not repeated here.
需要说明的是,本申请实施例中的电子设备包括上述所述的移动电子设备和非移动电子设备。It should be noted that the electronic devices in the embodiments of the present application include the above-mentioned mobile electronic devices and non-mobile electronic devices.
图8为实现本申请实施例的一种电子设备的硬件结构示意图。FIG. 8 is a schematic diagram of the hardware structure of an electronic device implementing an embodiment of the present application.
该电子设备800包括但不限于:射频单元801、网络模块802、音频输出单元803、输入单元804、传感器805、显示单元806、用户输入单元807、接口单元808、存储器809、以及处理器810等部件。The electronic device 800 includes but is not limited to: radio frequency unit 801, network module 802, audio output unit 803, input unit 804, sensor 805, display unit 806, user input unit 807, interface unit 808, memory 809, processor 810, etc. part.
本领域技术人员可以理解,电子设备800还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器810逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图8中示出的电子设备结构并不构成对电子设备的限定,电子设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。Those skilled in the art can understand that the electronic device 800 may also include a power supply (such as a battery) that supplies power to various components. The power supply may be logically connected to the processor 810 through a power management system, thereby managing charging, discharging, and function through the power management system. Consumption management and other functions. The structure of the electronic device shown in Figure 8 does not constitute a limitation on the electronic device. The electronic device may include more or less components than shown in the figure, or combine certain components, or arrange different components, which will not be described again here. .
其中,处理器810,用于获取第一超声波信息和第一文本,第一超声波信息包括超声波振幅值和超声波频率值;对第一文本进行数据处理,获得第一数据;利用超声波振幅值和超声波频率值,对第一数据进行移位加密,获得加密文本。Among them, the processor 810 is used to obtain the first ultrasonic information and the first text. The first ultrasonic information includes the ultrasonic amplitude value and the ultrasonic frequency value; perform data processing on the first text to obtain the first data; use the ultrasonic amplitude value and the ultrasonic frequency value. frequency value, perform shift encryption on the first data, and obtain the encrypted text.
基于超声波信息对文本进行加密处理,能够提升文本加密的安全性,从而有效解决用户在使用电子设备传输文本时文本被拦截或窃取的风险的问题。Encrypting text based on ultrasonic information can improve the security of text encryption, thereby effectively solving the problem of the risk of text being intercepted or stolen when users use electronic devices to transmit text.
可选地,处理器810还用于:Optionally, processor 810 is also used to:
对所述第一文本进行二进制转换,获得所述第一数据。Perform binary conversion on the first text to obtain the first data.
可选地,处理器810还用于:Optionally, processor 810 is also used to:
将所述第一数据进行分段处理,得到第一分段数据和第二分段数据;Perform segmentation processing on the first data to obtain first segmented data and second segmented data;
利用所述超声波振幅值对所述第一分段数据进行第一位移操作,获得第三分段数据;Using the ultrasonic amplitude value to perform a first displacement operation on the first segmented data, obtain third segmented data;
利用所述超声波频率值对所述第二分段数据进行第二位移操作,获得第四分段数据;Using the ultrasonic frequency value to perform a second displacement operation on the second segmented data, obtain fourth segmented data;
根据所述第三分段数据和所述第四分段数据,获得所述加密文本。The encrypted text is obtained based on the third segment data and the fourth segment data.
可选地,处理器810还用于:Optionally, processor 810 is also used to:
将所述第三分段数据和所述第四分段数据聚合,得到第二数据;Aggregate the third segmented data and the fourth segmented data to obtain second data;
对所述第二数据进行十六进制转换,获得所述加密文本。Perform hexadecimal conversion on the second data to obtain the encrypted text.
可选地,所述第一超声波信息为与本端电子设备配对成功的对端电子设备发送的超声波信息。Optionally, the first ultrasonic information is ultrasonic information sent by a peer electronic device that is successfully paired with the local electronic device.
可选地,射频单元801用于:Optionally, the radio frequency unit 801 is used for:
向所述对端电子设备发送所述加密文本。Send the encrypted text to the peer electronic device.
可选地,射频单元801还用于:Optionally, the radio frequency unit 801 is also used for:
接收目标电子设备发送的目标超声波信息和设备标识信息;Receive target ultrasonic information and device identification information sent by the target electronic device;
处理器810还用于:Processor 810 is also used to:
若根据所述设备标识信息验证所述目标电子设备为所述对端电子设备,则将所述目标超声波信息记录为所述第一超声波信息。If the target electronic device is verified to be the peer electronic device according to the device identification information, the target ultrasonic information is recorded as the first ultrasonic information.
应理解的是,本申请实施例中,输入单元804可以包括图形处理器(GraphicsProcessing Unit,GPU)8041和麦克风8042,图形处理器8041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元806可包括显示面板8061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板8061。用户输入单元807包括触控面板8071以及其他输入设备8072中的至少一种。触控面板8071,也称为触摸屏。触控面板8071可包括触摸检测装置和触摸控制器两个部分。其他输入设备8072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。It should be understood that in the embodiment of the present application, the input unit 804 may include a graphics processor (Graphics Processing Unit, GPU) 8041 and a microphone 8042. The graphics processor 8041 is responsible for the image capture device (such as Process the image data of still pictures or videos obtained by the camera). The display unit 806 may include a display panel 8061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 807 includes a touch panel 8071 and at least one of other input devices 8072 . Touch panel 8071, also known as touch screen. The touch panel 8071 may include two parts: a touch detection device and a touch controller. Other input devices 8072 may include but are not limited to physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described again here.
存储器809可用于存储软件程序以及各种数据。存储器809可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器809可以包括易失性存储器或非易失性存储器,或者,存储器809可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器809包括但不限于这些和任意其它适合类型的存储器。Memory 809 can be used to store software programs as well as various data. The memory 809 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, Image playback function, etc.) etc. Additionally, memory 809 may include volatile memory or non-volatile memory, or memory 809 may include both volatile and non-volatile memory. Among them, the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory. Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory. Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM) , SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM). Memory 809 in embodiments of the present application includes, but is not limited to, these and any other suitable types of memory.
处理器810可包括一个或多个处理单元;可选的,处理器810集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器810中。The processor 810 may include one or more processing units; optionally, the processor 810 integrates an application processor and a modem processor, where the application processor mainly handles operations related to the operating system, user interface, application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the above modem processor may not be integrated into the processor 810.
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述信息加密方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。Embodiments of the present application also provide a readable storage medium. Programs or instructions are stored on the readable storage medium. When the program or instructions are executed by a processor, each process of the above information encryption method embodiment is implemented, and the same can be achieved. The technical effects will not be repeated here to avoid repetition.
其中,所述处理器为上述实施例中所述的电子设备中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等。Wherein, the processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes computer readable storage media, such as computer read-only memory ROM, random access memory RAM, magnetic disk or optical disk, etc.
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述信息加密方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。An embodiment of the present application further provides a chip. The chip includes a processor and a communication interface. The communication interface is coupled to the processor. The processor is used to run programs or instructions to implement the above information encryption method embodiment. Each process can achieve the same technical effect. To avoid duplication, it will not be described again here.
应理解,本申请实施例提到的芯片还可以称为系统级芯片、系统芯片、芯片系统或片上系统芯片等。It should be understood that the chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-a-chip or system-on-chip, etc.
本申请实施例提供一种计算机程序产品,该程序产品被存储在存储介质中,该程序产品被至少一个处理器执行以实现如上述信息加密方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。Embodiments of the present application provide a computer program product. The program product is stored in a storage medium. The program product is executed by at least one processor to implement each process of the above information encryption method embodiment, and can achieve the same technical effect. , to avoid repetition, will not be repeated here.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。It should be noted that, in this document, the terms "comprising", "comprises" or any other variations thereof are intended to cover a non-exclusive inclusion, such that a process, method, article or device that includes a series of elements not only includes those elements, It also includes other elements not expressly listed or inherent in the process, method, article or apparatus. Without further limitation, an element defined by the statement "comprises a..." does not exclude the presence of additional identical elements in a process, method, article or apparatus that includes that element. In addition, it should be pointed out that the scope of the methods and devices in the embodiments of the present application is not limited to performing functions in the order shown or discussed, but may also include performing functions in a substantially simultaneous manner or in reverse order according to the functions involved. Functions may be performed, for example, the methods described may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,或者网络设备等)执行本申请各个实施例所述的方法。Through the above description of the embodiments, those skilled in the art can clearly understand that the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation. Based on this understanding, the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to the existing technology. The computer software product is stored in a storage medium (such as ROM/RAM, disk , optical disk), including several instructions to cause a terminal (which can be a mobile phone, computer, server, or network device, etc.) to execute the methods described in various embodiments of this application.
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。The embodiments of the present application have been described above in conjunction with the accompanying drawings. However, the present application is not limited to the above-mentioned specific implementations. The above-mentioned specific implementations are only illustrative and not restrictive. Those of ordinary skill in the art will Inspired by this application, many forms can be made without departing from the purpose of this application and the scope protected by the claims, all of which fall within the protection of this application.
Claims (14)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210890457.9A CN115277192B (en) | 2022-07-27 | 2022-07-27 | Information encryption method, device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210890457.9A CN115277192B (en) | 2022-07-27 | 2022-07-27 | Information encryption method, device and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115277192A CN115277192A (en) | 2022-11-01 |
CN115277192B true CN115277192B (en) | 2024-01-30 |
Family
ID=83769460
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210890457.9A Active CN115277192B (en) | 2022-07-27 | 2022-07-27 | Information encryption method, device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115277192B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024193466A1 (en) * | 2023-03-17 | 2024-09-26 | 陈嘉宏 | Wireless transmission method, system and device |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1275846A (en) * | 1999-05-26 | 2000-12-06 | 松下电器产业株式会社 | Device and method for data encipher |
JP2008309493A (en) * | 2007-06-12 | 2008-12-25 | Toshiba Corp | Apparatus and method for calibrating ultrasonic vibration displacement gauge |
CN106160878A (en) * | 2015-04-01 | 2016-11-23 | 飞云卓越数据应用科技(平潭)有限公司 | Active the ultrasonic infrasonic wave that involves is utilized to send and add the electronic installation of confidential information |
CN107147449A (en) * | 2017-07-17 | 2017-09-08 | 电子科技大学 | A privacy-preserving ultrasonic communication method |
CN108327296A (en) * | 2018-01-31 | 2018-07-27 | 大连交通大学 | A kind of the ultrasonic precision sealing-in device and method of feature based wavelet |
CN110071909A (en) * | 2019-03-15 | 2019-07-30 | 平安科技(深圳)有限公司 | Long data ciphering method, device, computer equipment and storage medium based on RSA |
WO2019241691A1 (en) * | 2018-06-14 | 2019-12-19 | Paypal, Inc. | Two-factor authentication through ultrasonic audio transmissions |
CN113194083A (en) * | 2021-04-26 | 2021-07-30 | 鸣飞伟业技术有限公司 | Method for transmitting throwing after video segmentation encryption |
CN113746622A (en) * | 2021-09-06 | 2021-12-03 | 哈尔滨工业大学(威海) | A Lightweight Block Text Encryption Method Based on Two-Dimensional Chaos System |
-
2022
- 2022-07-27 CN CN202210890457.9A patent/CN115277192B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1275846A (en) * | 1999-05-26 | 2000-12-06 | 松下电器产业株式会社 | Device and method for data encipher |
JP2008309493A (en) * | 2007-06-12 | 2008-12-25 | Toshiba Corp | Apparatus and method for calibrating ultrasonic vibration displacement gauge |
CN106160878A (en) * | 2015-04-01 | 2016-11-23 | 飞云卓越数据应用科技(平潭)有限公司 | Active the ultrasonic infrasonic wave that involves is utilized to send and add the electronic installation of confidential information |
CN107147449A (en) * | 2017-07-17 | 2017-09-08 | 电子科技大学 | A privacy-preserving ultrasonic communication method |
CN108327296A (en) * | 2018-01-31 | 2018-07-27 | 大连交通大学 | A kind of the ultrasonic precision sealing-in device and method of feature based wavelet |
WO2019241691A1 (en) * | 2018-06-14 | 2019-12-19 | Paypal, Inc. | Two-factor authentication through ultrasonic audio transmissions |
CN110071909A (en) * | 2019-03-15 | 2019-07-30 | 平安科技(深圳)有限公司 | Long data ciphering method, device, computer equipment and storage medium based on RSA |
CN113194083A (en) * | 2021-04-26 | 2021-07-30 | 鸣飞伟业技术有限公司 | Method for transmitting throwing after video segmentation encryption |
CN113746622A (en) * | 2021-09-06 | 2021-12-03 | 哈尔滨工业大学(威海) | A Lightweight Block Text Encryption Method Based on Two-Dimensional Chaos System |
Non-Patent Citations (2)
Title |
---|
Joint Watermarking-Encryption-JPEG-LS for Medical Image Reliability Control in Encrypted and Compressed Domains;Sahar Haddad;等;《IEEE Transactions on Information Forensics and Security 》;全文 * |
一种新型的文本信息加密与识别系统――陈-Mobius变换的一种新应用;魏腾雄;孙桂杰;苏武浔;;福州大学学报(自然科学版)(第03期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN115277192A (en) | 2022-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210281418A1 (en) | Secure Distributed Information System | |
CN110798315B (en) | Data processing method and device based on block chain and terminal | |
CN109951295B (en) | Key processing and using method, device, equipment and medium | |
CN107612683B (en) | An encryption and decryption method, apparatus, system, device and storage medium | |
WO2022078367A1 (en) | Payment secret key encryption and decryption method, payment authentication method, and terminal device | |
CN103037323B (en) | Based on random code verification system and the verification method thereof of mobile terminal | |
US20180359230A1 (en) | Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys | |
CN116594567A (en) | Information management method, device and electronic device | |
CN112987942B (en) | Method, device and system for inputting information by keyboard, electronic equipment and storage medium | |
CN114448605A (en) | Encrypted ciphertext verification method, system, device and computer-readable storage medium | |
CN115277192B (en) | Information encryption method, device and electronic equipment | |
WO2018227471A1 (en) | Secure processing method and apparatus for biometric feature data, sensor, and terminal device | |
CN116015627A (en) | A face recognition anti-tampering method and system based on symmetric algorithm | |
US10623384B2 (en) | Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys | |
CN116057893A (en) | Multi-Factor Geofencing System for Secure Encryption and Decryption System | |
CN117951173A (en) | Account query method, system and equipment | |
CN114978620B (en) | Encryption method and decryption method of identity identification number | |
CN116506179A (en) | Data backup method, device, electronic device and readable storage medium | |
CN114510688A (en) | Equipment unlocking method and device, computer readable storage medium and electronic equipment | |
CN115134473B (en) | Image encryption method and device | |
CN120200859B (en) | A data transmission control method, device, program product and storage medium | |
CN116933284A (en) | File processing method and device and electronic equipment | |
CN116886767A (en) | Message pushing method, terminal, electronic equipment and application server | |
WO2021051525A1 (en) | Information processing method and related device | |
CN102752270B (en) | Electronic document transfer system, mobile communication device and related decryption device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |