Nothing Special   »   [go: up one dir, main page]

CN109120576A - Data sharing method and device, computer equipment and storage medium - Google Patents

Data sharing method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN109120576A
CN109120576A CN201710488308.9A CN201710488308A CN109120576A CN 109120576 A CN109120576 A CN 109120576A CN 201710488308 A CN201710488308 A CN 201710488308A CN 109120576 A CN109120576 A CN 109120576A
Authority
CN
China
Prior art keywords
sharing
data
cipher
default application
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710488308.9A
Other languages
Chinese (zh)
Other versions
CN109120576B (en
Inventor
蔡元锋
刘友学
钱成
姜鑫磊
李杨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201710488308.9A priority Critical patent/CN109120576B/en
Publication of CN109120576A publication Critical patent/CN109120576A/en
Application granted granted Critical
Publication of CN109120576B publication Critical patent/CN109120576B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

A kind of data sharing method and device, run on sharing transmitting terminal, comprising: receive on third-party application and share sharing data to the sharing instruction of default application;The default public key applied is obtained from third-party application according to instruction is shared;Cipher-text information is determined according to public key and sharing data, and jumps to default application;Sharing object input instruction is received by sharing object reception interface;Sharing object is determined according to object input instruction is shared, and cipher-text information is sent to sharing object by default application, and safety is higher.The present invention also provides a kind of data sharing method corresponding with the above method and device and devices, run on and share receiving end, and security performance is higher.Accordingly, the present invention also provides a kind of computer equipments and storage medium corresponding with data sharing method and device, security performance is high.

Description

Data sharing method and device, computer equipment and storage medium
Technical field
The present invention relates to information to share technical field, sets more particularly to a kind of data sharing method and device, computer Standby and storage medium.
Background technique
The solution shared across application that URL Scheme (uniform resource locator sharing model) is provided as operating system Scheme, has the characteristics that succinct easy-to-use, by the welcome of developer, is all widely used in each pandemic application ware.One As for, the data of the complete Trust transitivity side of the recipient of URL Scheme, hacker can pass through forge a third-party application Fallacious message is sent to recipient, reaches the destruction normal industry of recipient by sending the malicious data constructed meticulously to recipient The purpose for process flow of being engaged in.
Therefore, the data sharing safety across application is lower.
Summary of the invention
Based on this, it is necessary to for the lower problem of the data sharing safety across application, provide a kind of highly-safe Data sharing method and device, computer equipment and storage medium.
A kind of data sharing method runs on sharing transmitting terminal, comprising:
It is received on third-party application and shares sharing data to the sharing instruction of default application;
The public key of the default application is obtained from the third-party application according to the sharing instruction;
Cipher-text information is determined according to the public key and the sharing data, and jumps to the default application;
It is received by the default application and shares object input instruction;
It inputs instruction according to the sharing object and determines and share object, and the cipher-text information is passed through into the default application It is sent to the sharing object.
A kind of data sharing device, runs on sharing transmitting terminal, comprising:
Command reception module refers to for receiving the sharing for sharing sharing data to default application on third-party application It enables;
Public key acquisition module, for obtaining the public affairs of the default application from the third-party application according to the sharing instruction Key;
Ciphertext determining module for determining cipher-text information according to the public key and the sharing data, and jumps to described Default application;
Object receiving module shares object input instruction for receiving by the default application;
Ciphertext sending module shares object for inputting instruction according to the sharing object and determining, and the ciphertext is believed Breath is sent to the sharing object by the default application.
It is obtained due to before sending sharing data, needing to be instructed according to the sharing from the third-party application The public key of the default application, and cipher-text information is determined according to the public key and the sharing data.Finally just by cipher-text information It is sent to receive to share by the default application and shares object determined by object input instruction.In this way, sharing receiving end needs Cipher-text information is carried out after accurately decrypting, sharing data could be shown and share receiving end, and then executed and share number According to related service, therefore, the safety of this method and device is higher.
A kind of data sharing method runs on and shares receiving end, comprising:
The cipher-text information sharing transmitting terminal and sending is received by default application;
When determining sharing data according to the private key and the cipher-text information of the default application, the sharing data is shown Show in the default application;The private key determines that public key used by the cipher-text information is corresponding with the sharing transmitting terminal, The public key is the sharing transmitting terminal according to the default application for sharing instruction acquisition, public to the third application authorized The key opened, the sharing instruction are that the sharing transmitting terminal is received by the sharing data point on the third-party application It enjoys to the instruction of default application.
A kind of data sharing device runs on and shares receiving end, comprising:
Ciphertext receiving module, for receiving the cipher-text information sharing transmitting terminal and sending by default application;
Data disaply moudle determines sharing data according to the private key and the cipher-text information of the default application for working as When, the sharing data is shown in the default application;The private key determines that the ciphertext is believed with the transmitting terminal of sharing Public key used by ceasing is corresponding, the public key be the sharing transmitting terminal according to share the default application that instruction obtains, Disclosed key is applied to the third authorized, the sharing instruction is that the sharing transmitting terminal connects on the third-party application That receives shares the sharing data to the instruction of default application.
Due to before showing to sharing data, needing to receive the ciphertext sharing transmitting terminal and sending by default application Information just shows the sharing data when determining sharing data according to the private key and the cipher-text information of the default application Show in the default application, so could execute with sharing data related service, therefore, the safety of this method and device compared with It is high.
A kind of computer equipment, including memory, processor and be stored on the memory and can be in the processor The computer program of upper operation, the processor realize the step of above-mentioned data sharing method when executing the computer program Suddenly.
A kind of computer storage medium is stored with computer program, the computer journey in the computer storage medium When sequence is executed by processor, the step of realizing above-mentioned data sharing method.
It is obtained due to before sending sharing data, needing to be instructed according to the sharing from the third-party application The public key of the default application, and cipher-text information is determined according to the public key and the sharing data.Finally just by cipher-text information It is sent to receive to share by the default application and shares object determined by object input instruction.In this way, sharing receiving end needs Cipher-text information is carried out after accurately decrypting, sharing data could be shown and share receiving end, and then executed and share number According to related service, therefore, the safety of above-mentioned computer equipment and storage medium is higher.
Detailed description of the invention
Fig. 1 is the data sharing method of an embodiment and the application environment schematic diagram of device;
Fig. 2 is the schematic diagram of internal structure of the execution terminal of an embodiment;
Fig. 3 is the flow chart of the data sharing method of an embodiment;
Fig. 4 is the specific flow chart of a step of the data sharing method of Fig. 3;
Fig. 5 is the flow chart for running on the data sharing method for another embodiment for sharing transmitting terminal;
Fig. 6 is the flow chart for running on the data sharing method for the embodiment for sharing receiving end;
Fig. 7 is the specific flow chart of one step of data sharing method of Fig. 6;
Fig. 8 is the structure chart of the data sharing device of an embodiment;
Fig. 9 is the concrete structure diagram of a module of the data sharing device of Fig. 8;
Figure 10 is the structure chart of the data sharing device of another embodiment.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention more comprehensible, with reference to the accompanying drawings and embodiments, to this Invention is described in further detail.It should be appreciated that the specific embodiments described herein are only used to explain the present invention, And the scope of protection of the present invention is not limited.
Fig. 1 is the application environment schematic diagram for the highly-safe data sharing method that an embodiment provides.Such as Fig. 1 institute Show, which includes sharing transmitting terminal 110, network 120 and sharing receiving end 130, shares transmitting terminal 110 and connects with sharing Receiving end 130 is connected by network 120.The sharing transmitting terminal 110 or share receiving end 130 can be mobile phone, tablet computer or Personal digital assistant or wearable device etc..In one embodiment, data sharing method, which operates in, shares transmitting terminal 110 In;In another embodiment, data sharing method, which operates in, shares in receiving end 130.It should be noted that in some embodiments In, share transmitting terminal 110 can be set in same execution terminal with receiving end 130 is shared.
Fig. 2 is the schematic diagram of internal structure of the execution terminal in one embodiment, and executing terminal can be sharing transmitting terminal 110, or share receiving end 130.As shown in Fig. 2, executing terminal includes the processor connected by system bus, storage Medium, built-in storage, network interface, output device and input unit.Wherein, the storage medium for executing terminal is stored with operation system System and a kind of computer program of data sharing device, when the computer program of the data sharing device is executed by processor, Realize a kind of data sharing method.The processor supports the entire operation for executing terminal for providing calculating and control ability.It holds The built-in storage of row terminal provides environment for the data sharing device operation in storage medium, and meter can be stored in the built-in storage Calculation machine readable instruction when the computer-readable instruction is executed by processor, may make processor to execute a kind of data sharing method. The network interface of terminal is executed for accessing network, such as can carry out network communication with corresponding another execution terminal.Execute end The output device at end includes display screen, and display screen can be liquid crystal display or electric ink display screen etc.;Execute terminal Input unit can be the touch layer covered on display screen, be also possible to the key being arranged on user terminal shell, trace ball or Trackpad can also be external keyboard, Trackpad or mouse etc..It will be understood by those skilled in the art that knot shown in Figure 2 Structure, the only block diagram of part-structure relevant to the present invention program are not constituted and are applied thereon to the present invention program The restriction of terminal is executed, the specific terminal that executes may include more certain than more or fewer components as shown in the figure, or combination Component, or with different component layouts.
Referring to figure 3., in one embodiment, a kind of data sharing method is provided, this method operates in as shown in Figure 1 Sharing transmitting terminal in, method includes the following steps:
S310: it is received on third-party application and shares sharing data to the sharing instruction of default application.
Third-party application is to be capable of providing the application program of sharing data except default application.Optionally, sharing data The sharing contents that can be specifically shared, such as an article, a width picture, a piece of news;Or in link sharing The chained address of appearance, such as URL (Uniform Resource Locator, uniform resource locator).To economize on resources, at one In preferred embodiment, sharing data is the chained address for linking sharing contents.
It can be received on the interactive interface of third-party application and share sharing data to the sharing instruction of default application, It can be received by way of shortcut key and share sharing data to the sharing instruction of default application.Interaction circle of third-party application Face is specifically as follows sharing interactive interface.In a specific embodiment, sharing interactive interface includes that can share to one point Enjoy the icon of platform;Each sharing platform can correspond to an application, if sharing platform can be sharing to wechat good friend, The corresponding application of the sharing platform at this time is wechat, and for another example, sharing platform can be sharing to circle of friends, at this time sharing platform pair The application answered also is wechat.In a specific embodiment, the sharing of user's input can received to the life of sharing platform When enabling, the sharing instruction shared to the corresponding default application of sharing platform is generated, to realize that reception will on third-party application Sharing data is shared to the sharing instruction of default application.
S330: the default public key applied is obtained from third-party application according to instruction is shared.
In the present embodiment, when executing terminal is to share transmitting terminal to receive sharing instruction, cryptographic operation is triggered.It holds Row cryptographic operation is firstly the need of key is got, and therefore, the public key of default application is first got from third-party application.It needs to illustrate , the public key of default application is to share permission to the server end application of default application in advance in third-party application, is being obtained When sharing permission, the server end of default application is sent to third-party application.Specifically, the server end for presetting application passes through The form of SDK (Software Development Kit, Software Development Kit) sends the default public key applied to third party Using.
S340: cipher-text information is determined according to public key and sharing data, and jumps to default application.
Sharing data can be directly encrypted by public key in one of the embodiments, obtain cipher-text information.It is understood that Ground can also determine otherwise cipher-text information according to public key and sharing data in other embodiments.
In the present embodiment, it after determining cipher-text information, jumps as default application.Default application can be jumped to Share object reception interface, sharing object reception interface is interaction circle that object input instruction is shared in the reception that default application provides Face can receive by the sharing object reception interface and share object input instruction, and then determines and share object.Sharing object can Be share the corresponding user of transmitting terminal apply upper sharing platform default, be also possible to be different to share transmitting terminal corresponding User another or multiple users, user group or user group.
S350: it is received by default application and shares object input instruction.
It can be by the sharing object reception interface of default application, in the sharing object of the upper reception user input of default application Input instruction.Sharing object input instruction can be by selecting one or more on the sharing object reception interface of default application A mode for sharing object, which is input to, executes terminal.It is also possible to it is to be appreciated that sharing object input instruction by pre- If directly inputting the mode for sharing object on the sharing object reception interface of application or other way being input to and executes terminal.
S360: sharing object is determined according to object input instruction is shared, and cipher-text information is sent to by default application Share object.
After receiving sharing object input instruction, sharing object can be determined by being instructed according to sharing object input, and then will Determining cipher-text information is sent to sharing object by default application.The cipher-text information can be sent to point where sharing object Enjoy receiving end.Share the recipient that object is data sharing.
Due to before sending to sharing data, needing to obtain default application from third-party application according to sharing instruction Public key, and cipher-text information is determined according to public key and sharing data.Finally just cipher-text information is sent to, is connect by sharing object It receives interface and receives to share and share object determined by object input instruction.It needs to carry out cipher-text information in this way, sharing receiving end After accurate decryption, sharing data could be shown and share receiving end, and then execution and sharing data related service, therefore, Its safety is higher.
In order to further increase the safety of data sharing, referring to Fig. 4, in a wherein embodiment, according to public key And sharing data determines the step of cipher-text information, i.e. step S340, comprising:
S341: symmetric key is obtained.
It can directly acquire and share the symmetric key that transmitting terminal side generates at random, also available sharing transmitting terminal is according to pre- If the symmetric key that rule generates.It should be noted that sharing receiving end before receiving cipher-text information, this can not be got Symmetric key.
S343: symmetric cryptography is carried out to sharing data using symmetric key, obtains symmetrical ciphertext.
Symmetric cryptography is carried out to sharing data by the symmetric key and obtains symmetrical ciphertext.Therefore, share receiving end to need After getting the symmetric key, symmetrical ciphertext, which is decrypted, by the symmetric key can just obtain sharing data.Wherein In one specific embodiment, for the safety for further increasing sharing data, symmetric cryptography can be AES (Advanced Encryption Standard, Advanced Encryption Standard) encryption.
S345: carrying out asymmetric encryption to symmetric key according to public key, obtain asymmetric ciphertext, and by symmetrical ciphertext and non- Symmetrical ciphertext forms cipher-text information.
The symmetric key for encrypting sharing data is carried out with the public key of the default application obtained from third-party application non- Symmetric cryptography obtains asymmetric ciphertext, and symmetrical ciphertext and asymmetric ciphertext are formed cipher-text information, to further increase point Enjoy the safety of data.It is asymmetric to add in order to further increase the safety of fractional data in a wherein specific embodiment Close can be rsa encryption (a kind of asymmet-ric encryption method).
Further, in order to further improve the safety of sharing data, obtain symmetric key the step of, i.e. step S341, comprising:
(a), the application message of third-party application is obtained.
The application message of third-party application is the relevant information of third-party application, such as can be developer's information.
(b), it is instructed according to sharing and obtains current time stamp, and obtain random number.
It, can be obtaining current time so that it is determined that getting by way of current time stamp when receiving sharing instruction Current time stamp, and random number can be obtained by random function.
(c), according to application message, current time stamp and generating random number symmetric key.
It, can be according to application message, current time stamp after getting application message, current time stamp and random number And at least one in random number generates symmetric key.Optionally, in order to further increase the safety of sharing data, according to answering Symmetric key is generated with information, current time stamp and three item data of random number.Specifically, can according to application message, it is current when Between stab and random number calculate random cipher, using the random cipher as symmetric key;It may be to further increase sharing number According to safety, by the random cipher carry out MD5 (Message-Digest Algorithm 5, md5-challenge) Xi Ha Calculated result is calculated in value, using the calculated result as symmetric key.
Referring to Fig. 5, obtaining the default public affairs applied from third-party application according to instruction is shared in a wherein embodiment Before the step of key, i.e. before step S330, further includes:
S320: the server that sharing data is sent to default application is verified.
The mode of verification can be analyzed for server according to the relevant operation of sharing data to current operation and before, Determine the safety of current sharing data.When passed the verification, subsequent instruct according to sharing from third-party application could be executed to obtain Take the instruction of the public key of default application.Otherwise, stop data sharing.Since server needs to analyze sharing data, The safety of current sharing data is determined, therefore, safety is higher.
Referring to Fig. 6, the present invention also one kind and the mutual corresponding data sharing method of the above method, run on sharing and receive End, comprising:
S610: the cipher-text information sharing transmitting terminal and sending is received by default application.
It is to be appreciated that sharing receiving end is the terminal shared where object, sharing object is to share transmitting terminal passing through After sharing object reception interface receives sharing object input instruction, determining pair that share extremely is instructed according to sharing object input As.
S620: when determining sharing data according to the private key and cipher-text information of default application, sharing data is shown pre- If in.
It is the cipher-text information determined according to public key and sharing data due to sharing transmitting terminal, if being received sharing receiving end Be sharing that the third-party application authorized through default application is initiated, by the private key of default application and can necessarily receive Cipher-text information determine sharing data.When that can determine that sharing receiving end can determine sharing data, illustrate the sharing data It is the sharing that the third-party application authorized by default application is initiated, is legal sharing data, it therefore, can be by the sharing Data are shown in default application.The dialog box that the sharing data interface can chat for one with the user for sharing transmitting terminal; The sharing data interface may be the publication preview or publication result shared to a data publishing platform.
It should be noted that in the present embodiment, private key determines public key used by cipher-text information with transmitting terminal is shared It is corresponding, public key be share transmitting terminal according to share default application that instruction obtains, to the third authorized using disclosed close Key, sharing instruction is to share that transmitting terminal is received on third-party application shares sharing data to the instruction of default application.
Due to before showing to sharing data, needing to receive the ciphertext sharing transmitting terminal and sending by default application Information just shows sharing data in default application when determining sharing data according to the private key and cipher-text information of default application In, so could execute with sharing data related service, therefore, safety is higher.
Further, when determining sharing data according to the private key and cipher-text information of default application, sharing data is shown Step in default application, i.e. step S620 include:
(I), when being decrypted to obtain symmetric key to the asymmetric ciphertext of cipher-text information according to the private key of default application, It is decrypted according to symmetrical ciphertext of the symmetric key to cipher-text information.
It is to be appreciated that in the present embodiment, cipher-text information includes symmetrical ciphertext and asymmetric ciphertext.Symmetrically ciphertext is The ciphertext obtained after symmetric cryptography is carried out to sharing data by symmetric key;Asymmetric ciphertext is by public key to symmetric key Carry out the ciphertext that asymmetric encryption obtains.
(II), it is decrypted when according to symmetrical ciphertext of the symmetric key to cipher-text information, when obtaining sharing data, will share Data are shown in default application.
If sharing the cipher-text information that receiving end receives is that the third-party application that default application has authorized initiates to share and send out It send, then necessarily asymmetric ciphertext can be decrypted to obtain symmetric key according to the private key of default application, and then can root Symmetrical ciphertext is decrypted according to symmetric key, obtains sharing data.When the available sharing data in sharing receiving end, explanation The sharing data is the default sharing for applying the third-party application authorized to initiate, and is legal sharing data, therefore, can be incited somebody to action The sharing data is shown in default application.It such as, can seem in the sharing data interface of default application by the sharing data.
It is illustrated below by way of a specific implementation process.
Since enterprise's IM software (employee of same enterprise provides the software of instant messaging service) is to the safety of sharing data Property require it is higher, therefore, in this embodiment, preset application be preferably enterprise IM software.
When enterprise staff finds that valuable information can be by arousing enterprise by sharing transmitting terminal in third-party application Industry IM software is shared with client or colleague, and the requirement due to enterprise's IM software to safety is higher, when enterprise staff passes through the Tripartite using sharing information to enterprise's IM software when, the third-party application for sharing transmitting terminal needs to encrypt sharing data, The ciphering process is not necessarily to the intervention of user, does not interfere with user experience.It should be noted that third-party application can be by adding The SDK that enterprise IM software is provided when authorizing for it is carried to encrypt sharing data.In a specific embodiment, third party For the system architecture of application as shown in fig. 7, SDK is embedded in third-party application, SDK specifically includes AES module and RSA module.AES Module obtains symmetrical ciphertext, such as URL for generating symmetric key, and using symmetric key encryption sharing data to be shared.Add The purpose of close URL is to prevent from URL to be maliciously tampered to forge and cause security threat to the regular traffic of enterprise's IM software.RSA mould Block is used for encrypted symmetric key, guarantees that symmetric key will not be stolen in transmission process.RSA Algorithm can guarantee to use public key Encrypted information can only be decrypted by the side for holding private key, and insertion when SDK is distributed to third-party application of RSA public key In SDK, third-party application need by the audit of enterprise's IM software just it is available to SDK and sharing data it is soft to enterprise IM Part.
It is not tampered to guarantee that third-party application is shared with the URL of enterprise's IM software, third-party application is needed using SDK The AES module of offer encrypts original URL (sharing data).Since symmetric key is generated in third-party application, enterprise IM Software needs to be decrypted with symmetric key to get original URL.In order to guarantee the transmission safety of symmetric key, in this reality It applies in example, symmetric key carries out asymmetric encryption by the RSA module in insertion SDK.Third-party application can will be encrypted by AES module The URL (symmetrical ciphertext) crossed is transferred to shares receiving end together with by the encrypted symmetric key of RSA module (asymmetric ciphertext) Enterprise's IM software, share receiving end enterprise's IM software get the sharing from third-party application can be used private key decryption Asymmetric ciphertext obtains symmetric key, and the symmetrical ciphertext of symmetric key decryption obtains original URL (sharing data) again later.
Share the corresponding data sharing of the data sharing method of transmitting terminal with above-mentioned run on the present invention also provides a kind of and fill It sets.A kind of data sharing device of embodiment, runs on sharing transmitting terminal, as shown in Figure 8, comprising:
Command reception module 810 shares sharing data to the sharing of default application for receiving on third-party application Instruction;
Public key acquisition module 830, for obtaining the public key of default application from third-party application according to sharing instruction;
Ciphertext determining module 840 for determining cipher-text information according to public key and sharing data, and jumps to default application;
Object receiving module 850, for receiving sharing object input instruction by sharing object reception interface;
Ciphertext sending module 860 shares object for determining according to sharing object input instruction, and cipher-text information is passed through Default application is sent to sharing object.
Due to before sending to sharing data, needing to obtain default application from third-party application according to sharing instruction Public key, and cipher-text information is determined according to public key and sharing data.Finally just cipher-text information is sent to, is connect by sharing object It receives interface and receives to share and share object determined by object input instruction.It needs to carry out cipher-text information in this way, sharing receiving end After accurate decryption, sharing data could be shown and share receiving end, and then execution and sharing data related service, therefore, Its safety is higher.
In order to further increase the safety of data sharing, referring to Fig. 9, ciphertext determines in a wherein embodiment Module, comprising:
Key acquiring unit 841, for obtaining symmetric key;
Symmetric cryptography unit 843 obtains symmetrical ciphertext for carrying out symmetric cryptography to sharing data using symmetric key;
Ciphertext forms unit 845, for, to symmetric key progress asymmetric encryption, obtaining asymmetric ciphertext according to public key, And symmetrical ciphertext and asymmetric ciphertext are formed into cipher-text information.
Please continue to refer to Fig. 9, further, in order to further improve the safety of sharing data, key obtains single Member 841, comprising:
First obtains subelement 841a, for obtaining the application message of third-party application;
Second obtains subelement 841b, obtains current time stamp for instructing according to sharing, and obtain random number;
Key generates subelement 841c, for according to application message, current time stamp and generating random number symmetric key.
It further include verification sending module 820 in a wherein embodiment please continue to refer to Fig. 8;
Sending module 820 is verified, the server for sharing data to be sent to default application verifies;
Public key acquisition module 830, for obtaining default application from third-party application according to instruction is shared when verification passes through Public key.
Share the corresponding data sharing of the data sharing method of receiving end with above-mentioned run on the present invention also provides a kind of and fill It sets.A kind of data sharing device of embodiment runs on and shares receiving end, as shown in Figure 10, comprising:
Ciphertext receiving module 910, for receiving the cipher-text information sharing transmitting terminal and sending by default application;
Data disaply moudle 930, for will divide when determining sharing data according to the private key and cipher-text information of default application Data are enjoyed to be shown in default application;Private key determines that public key used by cipher-text information is corresponding with transmitting terminal is shared, and public key is point Enjoy transmitting terminal according to share default application that instruction obtains, to the third authorized using disclosed key, sharing instruction is Share that transmitting terminal is received on third-party application shares sharing data to the instruction of default application.
Due to before showing to sharing data, needing to receive the ciphertext sharing transmitting terminal and sending by default application Information just shows sharing data in default application when determining sharing data according to the private key and cipher-text information of default application In, so could execute with sharing data related service, therefore, safety is higher.
It further include cipher key decryption block 920 in a wherein embodiment please continue to refer to Figure 10;
Cipher key decryption block 920, for being solved when according to the private key of default application to the asymmetric ciphertext of cipher-text information It is close when obtaining symmetric key, it is decrypted according to symmetrical ciphertext of the symmetric key to cipher-text information;
Data disaply moudle 930, for working as cipher key decryption block 920 according to symmetric key to the symmetrical ciphertext of cipher-text information It is decrypted, when obtaining sharing data, sharing data is shown in default application.
The present invention also provides a kind of calculating corresponding with the above-mentioned data sharing method for running on sharing transmitting terminal and device Machine equipment including memory, processor and is stored in the computer journey that can be run on the memory and on the processor The step of sequence, the processor realizes the data sharing method of above-mentioned sharing transmitting terminal when executing the computer program.
It is obtained due to before sending sharing data, needing to be instructed according to the sharing from the third-party application The public key of the default application, and cipher-text information is determined according to the public key and the sharing data.Finally just by cipher-text information It is sent to receive to share by the sharing object reception interface and shares object determined by object input instruction.In this way, sharing Receiving end needs to carry out after accurately decrypting cipher-text information, could show sharing data and share receiving end, and then execute With sharing data related service, therefore, the safety of above-mentioned computer equipment is higher.
The present invention also provides a kind of calculating corresponding with the above-mentioned data sharing method for running on sharing transmitting terminal and device Machine storage medium is stored with computer program in the computer storage medium, when the computer program is executed by processor, The step of realizing the data sharing method of above-mentioned sharing transmitting terminal.
It is obtained due to before sending sharing data, needing to be instructed according to the sharing from the third-party application The public key of the default application, and cipher-text information is determined according to the public key and the sharing data.Finally just by cipher-text information It is sent to receive to share by the sharing object reception interface and shares object determined by object input instruction.In this way, sharing Receiving end needs to carry out after accurately decrypting cipher-text information, could show sharing data and share receiving end, and then execute With sharing data related service, therefore, the safety of above-mentioned computer storage medium is higher.
The present invention also provides a kind of calculating corresponding with the above-mentioned data sharing method for running on sharing receiving end and device Machine equipment including memory, processor and is stored in the computer journey that can be run on the memory and on the processor The step of sequence, the processor realizes the data sharing method of above-mentioned sharing receiving end when executing the computer program.
Due to before showing to sharing data, needing to receive the ciphertext sharing transmitting terminal and sending by default application Information just shows the sharing data when determining sharing data according to the private key and the cipher-text information of the default application Show in the default application, and then could execute and sharing data related service, therefore, the safety of above-mentioned computer equipment It is higher.
The present invention also provides a kind of calculating corresponding with the above-mentioned data sharing method for running on sharing receiving end and device Machine storage medium is stored with computer program in the computer storage medium, when the computer program is executed by processor, The step of realizing the data sharing method of above-mentioned sharing receiving end.
Due to before showing to sharing data, needing to receive the ciphertext sharing transmitting terminal and sending by default application Information just shows the sharing data when determining sharing data according to the private key and the cipher-text information of the default application Show in the default application, and then could execute and sharing data related service, therefore, the peace of above-mentioned computer storage medium Full property is higher.
The data sharing device and above-mentioned data sharing method sharing transmitting terminal or share receiving end are run on due to above-mentioned It corresponds to each other, for particular technique feature corresponding with the above method in device, therefore not to repeat here.Above-mentioned computer equipment and Computer storage medium with above-mentioned data sharing method correspond, in computer equipment and storage medium with above-mentioned side The corresponding technical characteristic of method, therefore not to repeat here.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Instruct relevant hardware to complete by computer program, program can be stored in one and non-volatile computer-readable deposit In storage media, in the embodiment of the present invention, which be can be stored in the storage medium of computer system, and by the department of computer science At least one processor in system executes, and includes the process such as the embodiment of above-mentioned each method with realization.Storage medium therein It can be magnetic disk, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to protection of the invention Range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (14)

1. a kind of data sharing method, which is characterized in that run on sharing transmitting terminal, comprising:
It is received on third-party application and shares sharing data to the sharing instruction of default application;
The public key of the default application is obtained from the third-party application according to the sharing instruction;
Cipher-text information is determined according to the public key and the sharing data, and jumps to the default application;
It is received by the default application and shares object input instruction;
It inputs instruction according to the sharing object and determines and share object, and the cipher-text information is sent by the default application To the sharing object.
2. data sharing method according to claim 1, which is characterized in that described according to the public key and the sharing number According to the step of determining cipher-text information, comprising:
Obtain symmetric key;
Symmetric cryptography is carried out to the sharing data using the symmetric key, obtains symmetrical ciphertext;
Asymmetric encryption is carried out to the symmetric key according to the public key, obtains asymmetric ciphertext, and by the symmetrical ciphertext And the asymmetric ciphertext forms cipher-text information.
3. data sharing method according to claim 2, which is characterized in that the step of the acquisition symmetric key, comprising:
Obtain the application message of the third-party application;
It is instructed according to the sharing and obtains current time stamp, and obtain random number;
According to the application message, the current time stamp and the generating random number symmetric key.
4. data sharing method according to claim 1, which is characterized in that it is described according to sharing instruction from described the Before the step of tripartite's application obtains the public key of the default application, further includes:
The server that the sharing data is sent to the default application is verified.
5. a kind of data sharing method, which is characterized in that run on and share receiving end, comprising:
The cipher-text information sharing transmitting terminal and sending is received by default application;
When determining sharing data according to the private key and the cipher-text information of the default application, the sharing data is shown In the default application;The private key determines that public key used by the cipher-text information is corresponding with the sharing transmitting terminal, described Public key be it is described sharing transmitting terminal according to share instruction obtain the default application, to authorized third application disclosed in Key, sharing instruction be the sharing transmitting terminal on the third-party application it is received by the sharing data share to The instruction of default application.
6. data sharing method according to claim 5, which is characterized in that the private key when according to the default application And the sharing data is shown the step in the default application when determining sharing data by the cipher-text information, comprising:
When being decrypted to obtain symmetric key to the asymmetric ciphertext of the cipher-text information according to the private key of the default application, It is decrypted according to symmetrical ciphertext of the symmetric key to the cipher-text information;
It is decrypted when according to symmetrical ciphertext of the symmetric key to the cipher-text information, it, will be described when obtaining sharing data Sharing data is shown in the default application.
7. a kind of data sharing device, which is characterized in that run on sharing transmitting terminal, comprising:
Command reception module shares sharing data to the sharing instruction of default application for receiving on third-party application;
Public key acquisition module, for obtaining the public key of the default application from the third-party application according to the sharing instruction;
Ciphertext determining module for determining cipher-text information according to the public key and the sharing data, and jumps to described default Using;
Object receiving module shares object input instruction for receiving by the default application;
Ciphertext sending module shares object for inputting instruction according to the sharing object and determining, and the cipher-text information is led to It crosses the default application and is sent to the sharing object.
8. data sharing device according to claim 7, which is characterized in that the ciphertext determining module, comprising:
Key acquiring unit, for obtaining symmetric key;
Symmetric cryptography unit obtains symmetrical ciphertext for carrying out symmetric cryptography to the sharing data using the symmetric key;
Ciphertext forms unit, for, to symmetric key progress asymmetric encryption, obtaining asymmetric ciphertext according to the public key, And the symmetrical ciphertext and the asymmetric ciphertext are formed into cipher-text information.
9. data sharing device according to claim 8, which is characterized in that the key acquiring unit, comprising:
First obtains subelement, for obtaining the application message of the third-party application;
Second obtains subelement, obtains current time stamp for instructing according to the sharing, and obtain random number;
Key generates subelement, for symmetrically close according to the application message, the current time stamp and the generating random number Key.
10. data sharing device according to claim 7, which is characterized in that further include verification sending module;
The verification sending module, the server for the sharing data to be sent to the default application verify;
The public key acquisition module, for obtaining institute from the third-party application according to sharing instruction when verification passes through State the public key of default application.
11. a kind of data sharing device, which is characterized in that run on and share receiving end, comprising:
Ciphertext receiving module, for receiving the cipher-text information sharing transmitting terminal and sending by default application;
Data disaply moudle, for inciting somebody to action when determining sharing data according to the private key and the cipher-text information of the default application The sharing data is shown in the default application;The private key determines that the cipher-text information is adopted with the transmitting terminal of sharing Public key is corresponding, the public key be the sharing transmitting terminal according to share the default application that instruction obtains, to having awarded The third of power applies disclosed key, and the sharing instruction, which is that the sharing transmitting terminal is received on the third-party application, incites somebody to action The sharing data is shared to the instruction of default application.
12. data sharing device according to claim 11, which is characterized in that further include cipher key decryption block;
The cipher key decryption block, for when according to the private key of the default application to the asymmetric ciphertext of the cipher-text information into When row decryption obtains symmetric key, it is decrypted according to symmetrical ciphertext of the symmetric key to the cipher-text information;
The data disaply moudle, for working as the cipher key decryption block according to the symmetric key to pair of the cipher-text information Claim ciphertext to be decrypted, when obtaining sharing data, the sharing data is shown in the default application.
13. a kind of computer equipment, including memory, processor and it is stored on the memory and can be on the processor The computer program of operation, which is characterized in that the processor realizes that claim 1-6 is any when executing the computer program The step of data sharing method described in one.
14. a kind of computer storage medium, computer program is stored in the computer storage medium, which is characterized in that institute When stating computer program and being executed by processor, the step of realizing data sharing method as claimed in any one of claims 1 to 6.
CN201710488308.9A 2017-06-23 2017-06-23 Data sharing method and device, computer equipment and storage medium Active CN109120576B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710488308.9A CN109120576B (en) 2017-06-23 2017-06-23 Data sharing method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710488308.9A CN109120576B (en) 2017-06-23 2017-06-23 Data sharing method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109120576A true CN109120576A (en) 2019-01-01
CN109120576B CN109120576B (en) 2020-11-03

Family

ID=64733321

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710488308.9A Active CN109120576B (en) 2017-06-23 2017-06-23 Data sharing method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109120576B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981655A (en) * 2019-03-29 2019-07-05 富士施乐实业发展(中国)有限公司 A kind of method and device transmitted, receive information
CN112769569A (en) * 2021-03-04 2021-05-07 北京德风新征程科技有限公司 Internet of things equipment secure communication method and equipment
CN113032810A (en) * 2021-04-07 2021-06-25 工银科技有限公司 Information processing method, information processing apparatus, electronic device, information processing medium, and program product

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101466094A (en) * 2007-12-18 2009-06-24 郭诺 Method, server and deciphering device for protecting digital contents of mobile communication application
CN101771532A (en) * 2008-12-31 2010-07-07 华为技术有限公司 Method, device and system for realizing resource sharing
CN101989992A (en) * 2009-07-31 2011-03-23 中国移动通信集团公司 Downloading method, system and relevant device of wireless application protocol (WAP) services
CN103379098A (en) * 2012-04-19 2013-10-30 华为技术有限公司 Content sharing method, device and network system thereof
CN103442059A (en) * 2013-08-27 2013-12-11 华为终端有限公司 File sharing method and device
CN103973736A (en) * 2013-01-30 2014-08-06 华为终端有限公司 Data sharing method and device
US20150052253A1 (en) * 2014-09-22 2015-02-19 Weaved, Inc. Multi-server fractional subdomain dns protocol
CN105025019A (en) * 2015-07-07 2015-11-04 深圳奥联信息安全技术有限公司 Data safety sharing method
CN105208007A (en) * 2015-08-26 2015-12-30 中标软件有限公司 Data sharing system
CN106789008A (en) * 2016-12-16 2017-05-31 北京瑞卓喜投科技发展有限公司 Method, the apparatus and system being decrypted to sharable encryption data

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101466094A (en) * 2007-12-18 2009-06-24 郭诺 Method, server and deciphering device for protecting digital contents of mobile communication application
CN101771532A (en) * 2008-12-31 2010-07-07 华为技术有限公司 Method, device and system for realizing resource sharing
CN101989992A (en) * 2009-07-31 2011-03-23 中国移动通信集团公司 Downloading method, system and relevant device of wireless application protocol (WAP) services
CN103379098A (en) * 2012-04-19 2013-10-30 华为技术有限公司 Content sharing method, device and network system thereof
CN103973736A (en) * 2013-01-30 2014-08-06 华为终端有限公司 Data sharing method and device
CN103442059A (en) * 2013-08-27 2013-12-11 华为终端有限公司 File sharing method and device
US20150052253A1 (en) * 2014-09-22 2015-02-19 Weaved, Inc. Multi-server fractional subdomain dns protocol
CN105025019A (en) * 2015-07-07 2015-11-04 深圳奥联信息安全技术有限公司 Data safety sharing method
CN105208007A (en) * 2015-08-26 2015-12-30 中标软件有限公司 Data sharing system
CN106789008A (en) * 2016-12-16 2017-05-31 北京瑞卓喜投科技发展有限公司 Method, the apparatus and system being decrypted to sharable encryption data

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981655A (en) * 2019-03-29 2019-07-05 富士施乐实业发展(中国)有限公司 A kind of method and device transmitted, receive information
CN112769569A (en) * 2021-03-04 2021-05-07 北京德风新征程科技有限公司 Internet of things equipment secure communication method and equipment
CN112769569B (en) * 2021-03-04 2023-02-07 北京德风新征程科技有限公司 Internet of things equipment secure communication method and equipment
CN113032810A (en) * 2021-04-07 2021-06-25 工银科技有限公司 Information processing method, information processing apparatus, electronic device, information processing medium, and program product

Also Published As

Publication number Publication date
CN109120576B (en) 2020-11-03

Similar Documents

Publication Publication Date Title
US10142107B2 (en) Token binding using trust module protected keys
US8379857B1 (en) Secure key distribution for private communication in an unsecured communication channel
Choi et al. Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger
CN113572743B (en) Data encryption and decryption methods and devices, computer equipment and storage medium
CN113422679B (en) Key generation method, device and system, encryption method, electronic device and computer readable storage medium
CN112564887A (en) Key protection processing method, device, equipment and storage medium
CN102821098A (en) System and method for self-dissolving instant messaging under cloud environment
CN103327034A (en) Safe login method, system and device
TW202031010A (en) Data storage method and device, and apparatus
CN112765642A (en) Data processing method, data processing apparatus, electronic device, and medium
Tung et al. Pandora messaging: An enhanced self-message-destructing secure instant messaging architecture for mobile devices
CN116601914A (en) Hybrid key derivation to protect data
CN109120576A (en) Data sharing method and device, computer equipment and storage medium
CN110557367B (en) Secret key updating method and system for quantum computing secure communication resistance based on certificate cryptography
CN113365264B (en) Block chain wireless network data transmission method, device and system
Fahl et al. Trustsplit: usable confidentiality for social network messaging
EP2892206B1 (en) System and method for push framework security
CN106453069B (en) A kind of instant communication message sends, checks, checking control method and its equipment
CN115801252B (en) Safe cloud desktop system combined with quantum encryption technology
CN116599719A (en) User login authentication method, device, equipment and storage medium
CN113243093A (en) System and method for message transmission and retrieval using blockchains
Braga Integrated technologies for communication security on mobile devices
US11683182B2 (en) Message embedment in random values
CN110166226B (en) Method and device for generating secret key
Vinh et al. Constructing a Model Combining Zalo and End-to-End Encryption for Application in Digital Transformation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant