+

WO2018161538A1 - Procédé d'écriture de clé de cryptage et terminal mobile - Google Patents

Procédé d'écriture de clé de cryptage et terminal mobile Download PDF

Info

Publication number
WO2018161538A1
WO2018161538A1 PCT/CN2017/103200 CN2017103200W WO2018161538A1 WO 2018161538 A1 WO2018161538 A1 WO 2018161538A1 CN 2017103200 W CN2017103200 W CN 2017103200W WO 2018161538 A1 WO2018161538 A1 WO 2018161538A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
mobile terminal
writing program
server
detecting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2017/103200
Other languages
English (en)
Chinese (zh)
Inventor
刘平
周海涛
王立中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of WO2018161538A1 publication Critical patent/WO2018161538A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Definitions

  • the present invention relates to the field of mobile terminal technologies, and in particular, to a key writing method and a mobile terminal.
  • smartphones have gathered functions in various fields. For example, existing smart phones can send and receive emails, play video and audio files, record meeting minutes, open screen meetings, and even complete payment operations. Because smartphones have so many features, their completeness is especially important.
  • the embodiment of the invention provides a key writing method and a mobile terminal.
  • an embodiment of the present invention provides a key writing method, including:
  • the key writing program to write the key into an encrypted storage area of the mobile terminal, where the key is used to encrypt preset type data, where the preset type data includes at least one of the following: fingerprint data, Voiceprint data or face image data.
  • an embodiment of the present invention provides a mobile terminal, including:
  • An acquiring unit configured to acquire a data packet pushed by the server when detecting that the system currently installed by the mobile terminal is started for the first time, where the data packet includes a key writing program;
  • An extracting unit configured to extract the key writing program in the data packet, where the key writing program carries a key
  • a writing unit configured to run the key writing program, to write the key into an encrypted storage area of the mobile terminal, where the key is used to encrypt preset type data, where the preset type data includes at least the following One: fingerprint data, voiceprint data or face image data.
  • an embodiment of the present invention provides a mobile terminal, including:
  • processor a processor, a memory, a communication interface, and a communication bus, wherein the processor, the memory, and the communication interface are connected by the communication bus and complete communication with each other;
  • the memory stores executable program code for wireless communication
  • the processor is configured to invoke the executable program code in the memory to perform some or all of the steps described in any of the methods of the first aspect of the embodiments of the present invention.
  • FIG. 1 is a schematic flowchart of a key writing method according to an embodiment of the present invention.
  • FIG. 2 is a schematic flowchart diagram of another key writing method according to an embodiment of the present invention.
  • FIG. 3 is a schematic flowchart diagram of another key writing method according to an embodiment of the present invention.
  • 4-1 is a block diagram of a unit structure of a mobile terminal according to an embodiment of the present invention.
  • 4-2 is a block diagram of a unit composition of another mobile terminal according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a mobile terminal according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
  • references to "an embodiment” herein mean that a particular feature, structure, or characteristic described in connection with the embodiments can be included in at least one embodiment of the invention.
  • the appearances of the phrases in various places in the specification are not necessarily referring to the same embodiments, and are not exclusive or alternative embodiments that are mutually exclusive. Those skilled in the art will understand and implicitly understand that the embodiments described herein can be combined with other embodiments.
  • Mobile terminals usually use encryption and decryption technology to implement the security of mobile terminals in many places in the logic flow.
  • the security of keys such as encryption algorithms is very important. There is a risk of being decompiled in the normal storage area, so it is generally stored in the encrypted storage area. The above keys are generally written into the encrypted storage area through the production line when the mobile terminal is produced, thus increasing the cost of the production line station.
  • the mobile terminal when the mobile terminal detects that the system currently installed by the mobile terminal is started for the first time, the mobile terminal acquires a data packet pushed by the server, where the data packet includes a key writing program, and extracts the The key in the data packet is written to the program, the key writing program carries a key, runs the key writing program, and writes the key into an encrypted storage area of the mobile terminal, the key For encrypting preset type data, the preset type data includes at least one of the following: fingerprint data, voiceprint data, or face image data.
  • the mobile terminal receives the key write program pushed by the server, and writes the key to the encrypted storage of the mobile terminal by running the key write program.
  • the storage area avoids the need to write the key to the encrypted storage area through the production line during production, thus saving the cost of the production line station.
  • FIG. 1 is a schematic flowchart of a key writing method according to an embodiment of the present invention. As shown in FIG. 1 , a key writing method in an embodiment of the present invention includes the following steps:
  • the mobile terminal acquires a data packet pushed by the server when detecting that the system currently installed by the mobile terminal is started for the first time, where the data packet includes a key writing program.
  • the mobile terminal detects that the system currently installed by the mobile terminal is started for the first time, it can be understood that when the mobile terminal is powered on for the first time after being shipped from the factory, it can also be understood as the time when the mobile terminal is powered on for the first time after being brushed.
  • the mobile terminal detects that the currently installed system of the mobile terminal is started for the first time, the mobile terminal obtains the data packet pushed by the server.
  • the data packet that the server pushes to the mobile terminal by using the over-the-air technology (OTA) may be obtained, where The data packet can be included in the flash package.
  • OTA over-the-air technology
  • the mobile terminal extracts the key writing program in the data packet, where the key writing program carries a key.
  • the key writer is used to write a key to the mobile terminal encrypted storage area.
  • the above-mentioned key is required, and the above-mentioned key is essentially a binary data of a specified length, because of the importance of the key, Therefore, the above key needs to be stored in the encrypted storage area.
  • S103 The mobile terminal runs the key writing program, and writes the key into an encrypted storage area of the mobile terminal, where the key is used to encrypt preset type data, and the preset type data includes at least one of the following types. : Fingerprint data, voiceprint data, or face image data.
  • the mobile terminal can concentrate these files in an area to encrypt the area, which is an encrypted storage area.
  • an encrypted storage area After the encrypted storage area is set, all files stored in that area are automatically encrypted and do not need to be operated separately.
  • the storage area is stored in an encrypted storage area.
  • the data and files are encrypted. Only the user who created the encrypted storage area can open the encrypted storage area.
  • the encrypted storage area supports its own algorithm, DES, 3DES, AES or other domestic algorithms.
  • the mobile terminal may perform authentication based on fingerprint data, voiceprint data, or face image data of the user, thereby implementing operations such as payment, and thus, fingerprint data, voiceprint data, or face image data of the user are used for authentication.
  • the data plays a vital role in the security of the data of the mobile terminal and the security of the user of the mobile terminal. Therefore, it is necessary to encrypt the above-mentioned preset type data based on the encryption algorithm and the above-mentioned key.
  • the mobile terminal may further perform the following operations:
  • the key writing program is deleted when it is detected that the key satisfies a preset condition.
  • the key writing program is used to write a key into an encrypted storage area of the mobile terminal, and once the key is successfully written into the encrypted storage area, the mobile terminal can delete the key writing program, and on the other hand, The storage space of the mobile terminal is saved, and more importantly, the risk that the key writer is stored in the mobile terminal to be decompiled is prevented.
  • the mobile terminal can also perform the following operations:
  • the key writer is run to write the key to an encrypted storage area of the mobile terminal.
  • the key writing program further includes verification information, where the verification information is used to detect integrity of the key;
  • the specific implementation manner of deleting the key writing program may be:
  • the key writer is deleted.
  • the above verification information may include, but is not limited to, a hash function (Hash).
  • Hash hash function
  • the mobile terminal may also perform the following operations:
  • the key writer is run to write the key to an encrypted storage area of the mobile terminal.
  • the mobile terminal when the mobile terminal detects that the system currently installed by the mobile terminal is started for the first time, the mobile terminal acquires a data packet pushed by the server, where the data packet includes a key writing program. Extracting the key writing program in the data packet, the key writing program carrying a key, running the key writing program, and writing the key into an encrypted storage area of the mobile terminal, The key is used to encrypt preset type data, and the preset type data includes at least one of the following: fingerprint data, voiceprint data, or face image data.
  • the mobile terminal receives the key writing program pushed by the server, and writes the key into the encrypted storage area of the mobile terminal by running the key writing program, thereby avoiding passing in production.
  • the production line writes the key to the encrypted storage area, thus saving the cost of the production line station.
  • FIG. 2 is a schematic flowchart of another key writing method according to an embodiment of the present invention.
  • the key writing method in the embodiment of the present invention includes:
  • the mobile terminal acquires a data packet pushed by the server when detecting that the system currently installed by the mobile terminal is started for the first time, where the data packet includes a key writing program.
  • the mobile terminal extracts the key writing program in the data packet, where the key writing program carries a key.
  • S203 The mobile terminal runs the key writing program, and writes the key into an encrypted storage area of the mobile terminal, where the key is used to encrypt preset type data, and the preset type data includes at least one of the following types. : Fingerprint data, voiceprint data, or face image data.
  • the mobile terminal detects whether the key meets a preset condition.
  • step S205 When it is detected that the key meets the preset condition, step S205 is performed; when it is detected that the key does not satisfy the preset condition, steps S206 to S208 are performed.
  • the mobile terminal deletes the key write process when detecting that the key meets a preset condition. sequence.
  • the mobile terminal sends an acquisition request to the server when detecting that the key does not meet the preset condition, where the obtaining request is used to request the server to acquire the key writing program.
  • the mobile terminal receives the key writing program generated by the server in response to the acquiring request.
  • the mobile terminal runs the key writing program, and writes the key into an encrypted storage area of the mobile terminal.
  • the mobile terminal when the mobile terminal detects that the system currently installed by the mobile terminal is started for the first time, the mobile terminal acquires a data packet pushed by the server, where the data packet includes a key writing program. Extracting the key writing program in the data packet, the key writing program carrying a key, running the key writing program, and writing the key into an encrypted storage area of the mobile terminal, The key is used to encrypt preset type data, and the preset type data includes at least one of the following: fingerprint data, voiceprint data, or face image data.
  • the mobile terminal receives the key writing program pushed by the server, and writes the key into the encrypted storage area of the mobile terminal by running the key writing program, thereby avoiding passing in production.
  • the production line writes the key to the encrypted storage area, thus saving the cost of the production line station.
  • FIG. 3 is a schematic flowchart diagram of another key writing method according to an embodiment of the present invention. As shown in FIG. 3, the method for writing a key in the embodiment of the present invention includes:
  • the mobile terminal acquires a data packet pushed by the server when detecting that the system currently installed by the mobile terminal is started for the first time, where the data packet includes a key writing program.
  • the mobile terminal extracts the key writing program in the data packet, the key writing program carries a key, and the key writing program further includes verification information, where the verification information is used to detect Describe the integrity of the key.
  • S303 The mobile terminal runs the key writing program, and writes the key into an encrypted storage area of the mobile terminal, where the key is used to encrypt preset type data, and the preset type data includes at least one of the following types. : Fingerprint data, voiceprint data, or face image data.
  • the mobile terminal detects, according to the system application installed by the mobile terminal and the verification information, whether the key is complete.
  • step S305 is performed to continue to perform steps S309 to S312; otherwise, steps S306 to S308 are continued to perform steps S309 to S312.
  • the mobile terminal deletes the key writing program when detecting that the key is complete.
  • the mobile terminal sends an acquisition request to the server when detecting that the key does not meet the preset condition, where the obtaining request is used to request the server to acquire the key writing program.
  • the mobile terminal receives the key writing program generated by the server in response to the obtaining request.
  • the mobile terminal runs the key writing program, and writes the key into an encrypted storage area of the mobile terminal.
  • the mobile terminal detects, according to a preset time, whether the key meets a preset condition.
  • the mobile terminal sends the acquisition request to the server when detecting that the key does not meet a preset condition.
  • the mobile terminal receives the key writing program generated by the server in response to the acquiring request.
  • the mobile terminal runs the key writing program, and writes the key into an encrypted storage area of the mobile terminal.
  • the mobile terminal when the mobile terminal detects that the system currently installed by the mobile terminal is started for the first time, the mobile terminal acquires a data packet pushed by the server, where the data packet includes a key writing program. Extracting the key writing program in the data packet, the key writing program carrying a key, running the key writing program, and writing the key into an encrypted storage area of the mobile terminal, The key is used to encrypt preset type data, and the preset type data includes at least one of the following: fingerprint data, voiceprint data, or face image data.
  • the mobile terminal receives the key writing program pushed by the server, and writes the key into the encrypted storage area of the mobile terminal by running the key writing program, thereby avoiding passing in production.
  • the production line writes the key to the encrypted storage area, thus saving the cost of the production line station.
  • FIG. 4-1 is a block diagram of a unit structure of a mobile terminal according to an embodiment of the present invention.
  • the mobile terminal in the embodiment of the present invention may include an acquiring unit 401, and extracting Unit 402 and write unit 403, wherein:
  • the obtaining unit 401 is configured to: when detecting that the system currently installed by the mobile terminal is started for the first time, acquire a data packet pushed by the server, where the data packet includes a key writing program;
  • the extracting unit 402 is configured to extract the key writing program in the data packet, where the key writing program carries a key;
  • the writing unit 403 is configured to run the key writing program, and write the key into an encrypted storage area of the mobile terminal, where the key is used to encrypt preset type data, and the preset type data is used. At least one of the following is included: fingerprint data, voiceprint data, or face image data.
  • FIG. 4-2 is a block diagram of another unit of a mobile terminal according to an embodiment of the present invention.
  • the mobile terminal may include the embodiment corresponding to FIG. 4-1.
  • the mobile terminal may further include:
  • the deleting unit 404 after the writing unit 403 writes the key into the encrypted storage area of the mobile terminal, is used to delete the key writing program when it is detected that the key satisfies a preset condition.
  • the mobile terminal further includes:
  • the sending unit 405 is configured to: when detecting that the key does not meet the preset condition, send an acquisition request to the server, where the obtaining request is used to request the server to acquire the key writing program;
  • the receiving unit 406 is further configured to receive the key writing program generated by the server in response to the obtaining request;
  • the writing unit 403 is further configured to run the key writing program to write the key into an encrypted storage area of the mobile terminal.
  • the key writing program further includes verification information, where the verification information is used to detect integrity of the key;
  • the deleting unit 404 includes:
  • the detecting subunit 4041 is configured to detect whether the key is complete based on a system application installed by the mobile terminal and the verification information;
  • the delete subunit 4042 is configured to delete the key write program if it is detected that the key is complete.
  • the mobile terminal further includes:
  • the checking unit 407 is configured to detect, after the deletion unit 404 deletes the key writing program, whether the key meets a preset condition every preset time; if it is detected that the key does not satisfy the preset a condition, sending the acquisition request to the server; receiving the key writing program generated by the server in response to the obtaining request; running the key writing program to write the key to the mobile terminal Encrypt the storage area.
  • the mobile terminal described in the device embodiment of the present invention is presented in the form of a functional unit.
  • the term "unit” as used herein shall be understood to mean the broadest possible meaning, and the object for implementing the functions described for each "unit” may be, for example, an integrated circuit ASIC, a single circuit for executing one or more software or firmware.
  • a processor shared, dedicated or chipset
  • memory of the program combinatorial logic, and/or other suitable components that perform the functions described above.
  • the function of acquiring the data packet pushed by the server may be implemented by the mobile terminal shown in FIG. 5, and may be specifically adopted by the processor 101.
  • the executable program code in the memory 102 is called, and when it is detected that the system currently installed by the mobile terminal is started for the first time, the data packet pushed by the server is acquired.
  • the mobile terminal acquires a data packet pushed by the server when detecting that the system currently installed by the mobile terminal is started for the first time, and the data packet includes a key writing program, and extracts the data.
  • the key in the package is written into a program, the key writing program carries a key, runs the key writing program, and writes the key into an encrypted storage area of the mobile terminal, where the key is used
  • the preset type data is encrypted, and the preset type data includes at least one of the following: fingerprint data, voiceprint data, or face image data.
  • the mobile terminal receives the key writing program pushed by the server, and writes the key into the encrypted storage area of the mobile terminal by running a key writing program.
  • the domain avoids the need to write the key to the encrypted storage area through the production line at the time of production, thus saving the cost of the production line station.
  • the embodiment of the present invention further provides another mobile terminal, as shown in FIG. 5, including: a processor 101, a memory 102, a communication interface 103, and a communication bus 104; wherein the processor 101, the memory 102, and the communication interface 103 communicate
  • the bus 104 connects and completes communication with each other;
  • the processor 101 controls wireless communication with an external cellular network through the communication interface 103;
  • the communication interface 103 includes but is not limited to an antenna, an amplifier, a transceiver, a coupler, and a low noise amplifier (low noise) Amplifier, LNA), duplexer, etc.
  • the memory 102 includes at least one of: a random access memory, a nonvolatile memory, and an external memory, the memory 102 storing executable program code capable of directing the processor 101 to perform the method embodiment of the present invention The key writing method specifically disclosed in the method.
  • the processor 101 is configured to: when detecting that the system currently installed by the mobile terminal is started for the first time, acquire a data packet pushed by the server, where the data packet includes a key writing program; and extracting the a key writing program, the key writing program carrying a key; running the key writing program to write the key into an encrypted storage area of the mobile terminal, the key being used to encrypt a preset type Data, the preset type data includes at least one of the following: fingerprint data, voiceprint data, or face image data.
  • the processor 101 may further be configured to delete the key write when detecting that the key meets a preset condition. Into the program.
  • the processor 101 is further configured to: when detecting that the key does not meet a preset condition, send an acquisition request to the server, where the obtaining request is used to request the server to obtain the secret a key writing program; receiving the key writing program generated by the server in response to the obtaining request; running the key writing program to write the key into an encrypted storage area of the mobile terminal.
  • the key writing program further includes verification information, where the verification information is used to detect integrity of the key;
  • the processor 101 is configured to, when deleting the key writing program, when detecting that the key meets a preset condition, specifically for the system application installed according to the mobile terminal and the verification information, Detecting whether the key is complete; in case detecting that the key is complete, deleting the key writer.
  • the processor 101 after being used to delete the key writing program, may be further configured to detect, according to a preset time, whether the key meets a preset condition; Sending the acquisition request to the server when the key does not satisfy the preset condition; receiving the key writing program generated by the server in response to the obtaining request; running the key writing program, the key is Write to the encrypted storage area of the mobile terminal.
  • the mobile terminal acquires a data packet pushed by the server when detecting that the system currently installed by the mobile terminal is started for the first time, and the data packet includes a key writing program, and extracts the data.
  • the key in the package is written into a program, the key writing program carries a key, runs the key writing program, and writes the key into an encrypted storage area of the mobile terminal, where the key is used
  • the preset type data is encrypted, and the preset type data includes at least one of the following: fingerprint data, voiceprint data, or face image data.
  • the mobile terminal receives the key writing program pushed by the server, and writes the key into the encrypted storage area of the mobile terminal by running the key writing program, thereby avoiding passing in production.
  • the production line writes the key to the encrypted storage area, thus saving the cost of the production line station.
  • the embodiment of the present invention further provides another mobile terminal.
  • the mobile terminal can be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, and the mobile terminal is used as a mobile phone as an example:
  • FIG. 6 is a block diagram showing a partial structure of a mobile phone related to a mobile terminal provided by an embodiment of the present invention.
  • the mobile phone includes: a radio frequency (RF) circuit 910, a memory 920, an input unit 930, a display unit 940, a sensor 950, an audio circuit 960, a wireless fidelity (WiFi) module 970, and a processor 980. And power supply 990 and other components.
  • RF radio frequency
  • the RF circuit 910 can be used for receiving and transmitting information.
  • RF circuit 910 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • RF circuitry 910 can also communicate with the network and other devices via wireless communication.
  • the above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • E-mail Short Messaging Service
  • the memory 920 can be used to store software programs and modules, and the processor 980 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 920.
  • the memory 920 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function, and the like; the storage data area may store data created according to usage of the mobile phone, and the like.
  • memory 920 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 930 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
  • the input unit 930 can include a fingerprint identification module 931 and other input devices 932.
  • the fingerprint identification module 931 can collect fingerprint data of the user.
  • the fingerprint identification module 931 can include an optical fingerprint module, a capacitive fingerprint module, and a radio frequency fingerprint module.
  • the fingerprint identification module 931 is an example of a capacitive fingerprint recognition module, and specifically includes a sensing electrode (an abnormal sensing electrode and a normal sensing electrode) and a signal processing circuit (such as an amplifying circuit, a noise suppression circuit, and a mode) connected to the sensing electrode. Number conversion circuit, etc.).
  • the input unit 930 may also include other input devices 932.
  • other input devices 932 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 940 can be used to display information input by the user or information provided to the user and the mobile phone Various menus.
  • the display unit 940 can include a display screen 941.
  • the display screen 941 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the fingerprint recognition module 931 and the display screen 941 function as two separate components to implement the input and input functions of the mobile phone, in some embodiments, the fingerprint recognition module 931 and the display screen 941 can be Integrated to achieve the input and output functions of the phone.
  • the handset may also include at least one type of sensor 950, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display screen 941 according to the brightness of the ambient light, and the proximity sensor may turn off the display screen 941 and/or when the mobile phone moves to the ear. Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tapping
  • the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • An audio circuit 960, a speaker 961, and a microphone 962 can provide an audio interface between the user and the handset.
  • the audio circuit 960 can transmit the converted electrical data of the received audio data to the speaker 961, and convert it into a sound signal output by the speaker 961.
  • the microphone 962 converts the collected sound signal into an electrical signal, and the audio circuit 960 After receiving, it is converted into audio data, and then processed by the audio data output processor 980, sent to the other mobile phone via the RF circuit 910, or outputted to the memory 920 for further processing.
  • WiFi is a short-range wireless transmission technology
  • the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 970, which provides users with wireless broadband Internet access.
  • FIG. 6 shows the WiFi module 970, it can be understood that it does not belong to the essential configuration of the mobile phone, and can be omitted as needed within the scope of not changing the essence of the invention.
  • the processor 980 is the control center of the handset, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 920, and invoking data stored in the memory 920, executing The phone's various functions and processing data, so that the overall monitoring of the phone.
  • the processor 980 may include one or more processing units; preferably, the processor The 980 can integrate an application processor and a modem processor, wherein the application processor primarily processes an operating system, a user interface, an application, etc., and the modem processor primarily processes wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 980.
  • the handset also includes a power source 990 (such as a battery) that supplies power to the various components.
  • a power source 990 such as a battery
  • the power source can be logically coupled to the processor 980 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • each step method flow can be implemented based on the structure of the mobile phone.
  • each unit function can be implemented based on the structure of the mobile phone.
  • the embodiment of the present invention further provides a computer storage medium, wherein the computer storage medium can store a program, and the program includes some or all of the steps of any one of the key writing methods described in the foregoing method embodiments.
  • Embodiments of the present invention also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a computer to perform the operations as recited in the above method embodiments Any or all of the steps of any type of key writing method.
  • the disclosed device may be It's way to achieve it.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical or otherwise.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a memory. A number of instructions are included to cause a computer device (which may be a personal computer, server or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing memory includes: a U disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk, and the like, which can store program codes.
  • ROM Read-Only Memory
  • RAM Random Access Memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

L'invention porte sur un procédé d'écriture de clé de cryptage et sur un terminal mobile. Le procédé consiste : lors de la détection d'un premier démarrage d'un système actuellement installé dans un terminal mobile, à acquérir un paquet de données poussé par un serveur, le paquet de données comprenant un programme d'écriture de clé de cryptage ; à extraire le programme d'écriture de clé de cryptage du paquet de données, le programme d'écriture de clé de cryptage comportant une clé de cryptage ; à exécuter le programme d'écriture de clé de cryptage pour écrire la clé de cryptage dans une région de stockage cryptée du terminal mobile, la clé de cryptage étant utilisée pour crypter un type préétabli de données.
PCT/CN2017/103200 2017-03-08 2017-09-25 Procédé d'écriture de clé de cryptage et terminal mobile Ceased WO2018161538A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710134753.5 2017-03-08
CN201710134753.5A CN106954211B (zh) 2017-03-08 2017-03-08 一种密钥写入方法及移动终端

Publications (1)

Publication Number Publication Date
WO2018161538A1 true WO2018161538A1 (fr) 2018-09-13

Family

ID=59466790

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/103200 Ceased WO2018161538A1 (fr) 2017-03-08 2017-09-25 Procédé d'écriture de clé de cryptage et terminal mobile

Country Status (2)

Country Link
CN (1) CN106954211B (fr)
WO (1) WO2018161538A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110188564A (zh) * 2019-07-09 2019-08-30 江苏亨通问天量子信息研究院有限公司 基于量子密钥加密的移动数据存储终端

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106954211B (zh) * 2017-03-08 2019-08-20 Oppo广东移动通信有限公司 一种密钥写入方法及移动终端
CN108989032A (zh) * 2018-07-27 2018-12-11 深圳市新名泽科技有限公司 密钥读写方法、装置、区块链系统及终端设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103428700A (zh) * 2013-07-26 2013-12-04 中国联合网络通信集团有限公司 业务鉴权方法及装置
US20150350908A1 (en) * 2013-01-02 2015-12-03 Knightsbridge Portable Communications Sp Access Device and System for an Electronic Device
CN105792167A (zh) * 2014-12-15 2016-07-20 中国移动通信集团公司 一种初始化可信执行环境的方法及装置、设备
CN106211158A (zh) * 2016-07-12 2016-12-07 广东欧珀移动通信有限公司 一种接入网络的方法及移动终端
CN106954211A (zh) * 2017-03-08 2017-07-14 广东欧珀移动通信有限公司 一种密钥写入方法及移动终端

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5967549B2 (ja) * 2012-01-25 2016-08-10 パナソニックIpマネジメント株式会社 鍵管理システム、鍵管理方法、および通信装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150350908A1 (en) * 2013-01-02 2015-12-03 Knightsbridge Portable Communications Sp Access Device and System for an Electronic Device
CN103428700A (zh) * 2013-07-26 2013-12-04 中国联合网络通信集团有限公司 业务鉴权方法及装置
CN105792167A (zh) * 2014-12-15 2016-07-20 中国移动通信集团公司 一种初始化可信执行环境的方法及装置、设备
CN106211158A (zh) * 2016-07-12 2016-12-07 广东欧珀移动通信有限公司 一种接入网络的方法及移动终端
CN106954211A (zh) * 2017-03-08 2017-07-14 广东欧珀移动通信有限公司 一种密钥写入方法及移动终端

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110188564A (zh) * 2019-07-09 2019-08-30 江苏亨通问天量子信息研究院有限公司 基于量子密钥加密的移动数据存储终端
CN110188564B (zh) * 2019-07-09 2024-01-26 江苏亨通问天量子信息研究院有限公司 基于量子密钥加密的移动数据存储终端

Also Published As

Publication number Publication date
CN106954211B (zh) 2019-08-20
CN106954211A (zh) 2017-07-14

Similar Documents

Publication Publication Date Title
CN107066229A (zh) 录音的方法及终端
WO2018032661A1 (fr) Procédé d'affichage d'informations pour un dispositif terminal et dispositif terminal
CN106203035A (zh) 一种数据访问控制方法及移动终端
WO2018049881A1 (fr) Procédé et dispositif de migration de données
CN106681860B (zh) 一种数据备份方法及数据备份装置
WO2018049912A1 (fr) Procédé de transmission de données, et dispositifs associés
CN106658354B (zh) 一种数据传输方法及设备
CN106484326B (zh) 一种数据传输处理方法及移动终端
CN106255102B (zh) 一种终端设备的鉴定方法及相关设备
CN106534288B (zh) 一种数据传输方法及移动终端
WO2018049934A1 (fr) Procédé et terminaux de migration de données
CN106550361B (zh) 一种数据传输方法,设备及计算机可读存储介质
WO2018049884A1 (fr) Procédé et dispositif de migration de données
CN108549698A (zh) 文件处理方法、装置、移动终端及计算机可读存储介质
WO2019128179A1 (fr) Procédé et appareil de transmission de données entre terminaux mobiles, et terminal mobile
WO2018049885A1 (fr) Procédé et dispositif de migration de données
CN106326773A (zh) 一种照片加密管理的方法、装置及终端
WO2018161538A1 (fr) Procédé d'écriture de clé de cryptage et terminal mobile
CN116541865A (zh) 基于数据安全的密码输入方法、装置、设备及存储介质
WO2018049937A1 (fr) Terminaux et procédé de migration de données
CN107592409A (zh) 应用程序控制方法及装置
CN106792434B (zh) 一种热点建立方法及终端设备
CN109068317A (zh) 通信方法、通信处理装置及计算机可读存储介质
CN107102913A (zh) 数据备份方法、装置和计算机设备
CN107038414B (zh) 一种指纹模板同步方法及设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17899881

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17899881

Country of ref document: EP

Kind code of ref document: A1

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载