CN109120576A - Data sharing method and device, computer equipment and storage medium - Google Patents
Data sharing method and device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109120576A CN109120576A CN201710488308.9A CN201710488308A CN109120576A CN 109120576 A CN109120576 A CN 109120576A CN 201710488308 A CN201710488308 A CN 201710488308A CN 109120576 A CN109120576 A CN 109120576A
- Authority
- CN
- China
- Prior art keywords
- sharing
- data
- cipher
- default application
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Abstract
A kind of data sharing method and device, run on sharing transmitting terminal, comprising: receive on third-party application and share sharing data to the sharing instruction of default application;The default public key applied is obtained from third-party application according to instruction is shared;Cipher-text information is determined according to public key and sharing data, and jumps to default application;Sharing object input instruction is received by sharing object reception interface;Sharing object is determined according to object input instruction is shared, and cipher-text information is sent to sharing object by default application, and safety is higher.The present invention also provides a kind of data sharing method corresponding with the above method and device and devices, run on and share receiving end, and security performance is higher.Accordingly, the present invention also provides a kind of computer equipments and storage medium corresponding with data sharing method and device, security performance is high.
Description
Technical field
The present invention relates to information to share technical field, sets more particularly to a kind of data sharing method and device, computer
Standby and storage medium.
Background technique
The solution shared across application that URL Scheme (uniform resource locator sharing model) is provided as operating system
Scheme, has the characteristics that succinct easy-to-use, by the welcome of developer, is all widely used in each pandemic application ware.One
As for, the data of the complete Trust transitivity side of the recipient of URL Scheme, hacker can pass through forge a third-party application
Fallacious message is sent to recipient, reaches the destruction normal industry of recipient by sending the malicious data constructed meticulously to recipient
The purpose for process flow of being engaged in.
Therefore, the data sharing safety across application is lower.
Summary of the invention
Based on this, it is necessary to for the lower problem of the data sharing safety across application, provide a kind of highly-safe
Data sharing method and device, computer equipment and storage medium.
A kind of data sharing method runs on sharing transmitting terminal, comprising:
It is received on third-party application and shares sharing data to the sharing instruction of default application;
The public key of the default application is obtained from the third-party application according to the sharing instruction;
Cipher-text information is determined according to the public key and the sharing data, and jumps to the default application;
It is received by the default application and shares object input instruction;
It inputs instruction according to the sharing object and determines and share object, and the cipher-text information is passed through into the default application
It is sent to the sharing object.
A kind of data sharing device, runs on sharing transmitting terminal, comprising:
Command reception module refers to for receiving the sharing for sharing sharing data to default application on third-party application
It enables;
Public key acquisition module, for obtaining the public affairs of the default application from the third-party application according to the sharing instruction
Key;
Ciphertext determining module for determining cipher-text information according to the public key and the sharing data, and jumps to described
Default application;
Object receiving module shares object input instruction for receiving by the default application;
Ciphertext sending module shares object for inputting instruction according to the sharing object and determining, and the ciphertext is believed
Breath is sent to the sharing object by the default application.
It is obtained due to before sending sharing data, needing to be instructed according to the sharing from the third-party application
The public key of the default application, and cipher-text information is determined according to the public key and the sharing data.Finally just by cipher-text information
It is sent to receive to share by the default application and shares object determined by object input instruction.In this way, sharing receiving end needs
Cipher-text information is carried out after accurately decrypting, sharing data could be shown and share receiving end, and then executed and share number
According to related service, therefore, the safety of this method and device is higher.
A kind of data sharing method runs on and shares receiving end, comprising:
The cipher-text information sharing transmitting terminal and sending is received by default application;
When determining sharing data according to the private key and the cipher-text information of the default application, the sharing data is shown
Show in the default application;The private key determines that public key used by the cipher-text information is corresponding with the sharing transmitting terminal,
The public key is the sharing transmitting terminal according to the default application for sharing instruction acquisition, public to the third application authorized
The key opened, the sharing instruction are that the sharing transmitting terminal is received by the sharing data point on the third-party application
It enjoys to the instruction of default application.
A kind of data sharing device runs on and shares receiving end, comprising:
Ciphertext receiving module, for receiving the cipher-text information sharing transmitting terminal and sending by default application;
Data disaply moudle determines sharing data according to the private key and the cipher-text information of the default application for working as
When, the sharing data is shown in the default application;The private key determines that the ciphertext is believed with the transmitting terminal of sharing
Public key used by ceasing is corresponding, the public key be the sharing transmitting terminal according to share the default application that instruction obtains,
Disclosed key is applied to the third authorized, the sharing instruction is that the sharing transmitting terminal connects on the third-party application
That receives shares the sharing data to the instruction of default application.
Due to before showing to sharing data, needing to receive the ciphertext sharing transmitting terminal and sending by default application
Information just shows the sharing data when determining sharing data according to the private key and the cipher-text information of the default application
Show in the default application, so could execute with sharing data related service, therefore, the safety of this method and device compared with
It is high.
A kind of computer equipment, including memory, processor and be stored on the memory and can be in the processor
The computer program of upper operation, the processor realize the step of above-mentioned data sharing method when executing the computer program
Suddenly.
A kind of computer storage medium is stored with computer program, the computer journey in the computer storage medium
When sequence is executed by processor, the step of realizing above-mentioned data sharing method.
It is obtained due to before sending sharing data, needing to be instructed according to the sharing from the third-party application
The public key of the default application, and cipher-text information is determined according to the public key and the sharing data.Finally just by cipher-text information
It is sent to receive to share by the default application and shares object determined by object input instruction.In this way, sharing receiving end needs
Cipher-text information is carried out after accurately decrypting, sharing data could be shown and share receiving end, and then executed and share number
According to related service, therefore, the safety of above-mentioned computer equipment and storage medium is higher.
Detailed description of the invention
Fig. 1 is the data sharing method of an embodiment and the application environment schematic diagram of device;
Fig. 2 is the schematic diagram of internal structure of the execution terminal of an embodiment;
Fig. 3 is the flow chart of the data sharing method of an embodiment;
Fig. 4 is the specific flow chart of a step of the data sharing method of Fig. 3;
Fig. 5 is the flow chart for running on the data sharing method for another embodiment for sharing transmitting terminal;
Fig. 6 is the flow chart for running on the data sharing method for the embodiment for sharing receiving end;
Fig. 7 is the specific flow chart of one step of data sharing method of Fig. 6;
Fig. 8 is the structure chart of the data sharing device of an embodiment;
Fig. 9 is the concrete structure diagram of a module of the data sharing device of Fig. 8;
Figure 10 is the structure chart of the data sharing device of another embodiment.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention more comprehensible, with reference to the accompanying drawings and embodiments, to this
Invention is described in further detail.It should be appreciated that the specific embodiments described herein are only used to explain the present invention,
And the scope of protection of the present invention is not limited.
Fig. 1 is the application environment schematic diagram for the highly-safe data sharing method that an embodiment provides.Such as Fig. 1 institute
Show, which includes sharing transmitting terminal 110, network 120 and sharing receiving end 130, shares transmitting terminal 110 and connects with sharing
Receiving end 130 is connected by network 120.The sharing transmitting terminal 110 or share receiving end 130 can be mobile phone, tablet computer or
Personal digital assistant or wearable device etc..In one embodiment, data sharing method, which operates in, shares transmitting terminal 110
In;In another embodiment, data sharing method, which operates in, shares in receiving end 130.It should be noted that in some embodiments
In, share transmitting terminal 110 can be set in same execution terminal with receiving end 130 is shared.
Fig. 2 is the schematic diagram of internal structure of the execution terminal in one embodiment, and executing terminal can be sharing transmitting terminal
110, or share receiving end 130.As shown in Fig. 2, executing terminal includes the processor connected by system bus, storage
Medium, built-in storage, network interface, output device and input unit.Wherein, the storage medium for executing terminal is stored with operation system
System and a kind of computer program of data sharing device, when the computer program of the data sharing device is executed by processor,
Realize a kind of data sharing method.The processor supports the entire operation for executing terminal for providing calculating and control ability.It holds
The built-in storage of row terminal provides environment for the data sharing device operation in storage medium, and meter can be stored in the built-in storage
Calculation machine readable instruction when the computer-readable instruction is executed by processor, may make processor to execute a kind of data sharing method.
The network interface of terminal is executed for accessing network, such as can carry out network communication with corresponding another execution terminal.Execute end
The output device at end includes display screen, and display screen can be liquid crystal display or electric ink display screen etc.;Execute terminal
Input unit can be the touch layer covered on display screen, be also possible to the key being arranged on user terminal shell, trace ball or
Trackpad can also be external keyboard, Trackpad or mouse etc..It will be understood by those skilled in the art that knot shown in Figure 2
Structure, the only block diagram of part-structure relevant to the present invention program are not constituted and are applied thereon to the present invention program
The restriction of terminal is executed, the specific terminal that executes may include more certain than more or fewer components as shown in the figure, or combination
Component, or with different component layouts.
Referring to figure 3., in one embodiment, a kind of data sharing method is provided, this method operates in as shown in Figure 1
Sharing transmitting terminal in, method includes the following steps:
S310: it is received on third-party application and shares sharing data to the sharing instruction of default application.
Third-party application is to be capable of providing the application program of sharing data except default application.Optionally, sharing data
The sharing contents that can be specifically shared, such as an article, a width picture, a piece of news;Or in link sharing
The chained address of appearance, such as URL (Uniform Resource Locator, uniform resource locator).To economize on resources, at one
In preferred embodiment, sharing data is the chained address for linking sharing contents.
It can be received on the interactive interface of third-party application and share sharing data to the sharing instruction of default application,
It can be received by way of shortcut key and share sharing data to the sharing instruction of default application.Interaction circle of third-party application
Face is specifically as follows sharing interactive interface.In a specific embodiment, sharing interactive interface includes that can share to one point
Enjoy the icon of platform;Each sharing platform can correspond to an application, if sharing platform can be sharing to wechat good friend,
The corresponding application of the sharing platform at this time is wechat, and for another example, sharing platform can be sharing to circle of friends, at this time sharing platform pair
The application answered also is wechat.In a specific embodiment, the sharing of user's input can received to the life of sharing platform
When enabling, the sharing instruction shared to the corresponding default application of sharing platform is generated, to realize that reception will on third-party application
Sharing data is shared to the sharing instruction of default application.
S330: the default public key applied is obtained from third-party application according to instruction is shared.
In the present embodiment, when executing terminal is to share transmitting terminal to receive sharing instruction, cryptographic operation is triggered.It holds
Row cryptographic operation is firstly the need of key is got, and therefore, the public key of default application is first got from third-party application.It needs to illustrate
, the public key of default application is to share permission to the server end application of default application in advance in third-party application, is being obtained
When sharing permission, the server end of default application is sent to third-party application.Specifically, the server end for presetting application passes through
The form of SDK (Software Development Kit, Software Development Kit) sends the default public key applied to third party
Using.
S340: cipher-text information is determined according to public key and sharing data, and jumps to default application.
Sharing data can be directly encrypted by public key in one of the embodiments, obtain cipher-text information.It is understood that
Ground can also determine otherwise cipher-text information according to public key and sharing data in other embodiments.
In the present embodiment, it after determining cipher-text information, jumps as default application.Default application can be jumped to
Share object reception interface, sharing object reception interface is interaction circle that object input instruction is shared in the reception that default application provides
Face can receive by the sharing object reception interface and share object input instruction, and then determines and share object.Sharing object can
Be share the corresponding user of transmitting terminal apply upper sharing platform default, be also possible to be different to share transmitting terminal corresponding
User another or multiple users, user group or user group.
S350: it is received by default application and shares object input instruction.
It can be by the sharing object reception interface of default application, in the sharing object of the upper reception user input of default application
Input instruction.Sharing object input instruction can be by selecting one or more on the sharing object reception interface of default application
A mode for sharing object, which is input to, executes terminal.It is also possible to it is to be appreciated that sharing object input instruction by pre-
If directly inputting the mode for sharing object on the sharing object reception interface of application or other way being input to and executes terminal.
S360: sharing object is determined according to object input instruction is shared, and cipher-text information is sent to by default application
Share object.
After receiving sharing object input instruction, sharing object can be determined by being instructed according to sharing object input, and then will
Determining cipher-text information is sent to sharing object by default application.The cipher-text information can be sent to point where sharing object
Enjoy receiving end.Share the recipient that object is data sharing.
Due to before sending to sharing data, needing to obtain default application from third-party application according to sharing instruction
Public key, and cipher-text information is determined according to public key and sharing data.Finally just cipher-text information is sent to, is connect by sharing object
It receives interface and receives to share and share object determined by object input instruction.It needs to carry out cipher-text information in this way, sharing receiving end
After accurate decryption, sharing data could be shown and share receiving end, and then execution and sharing data related service, therefore,
Its safety is higher.
In order to further increase the safety of data sharing, referring to Fig. 4, in a wherein embodiment, according to public key
And sharing data determines the step of cipher-text information, i.e. step S340, comprising:
S341: symmetric key is obtained.
It can directly acquire and share the symmetric key that transmitting terminal side generates at random, also available sharing transmitting terminal is according to pre-
If the symmetric key that rule generates.It should be noted that sharing receiving end before receiving cipher-text information, this can not be got
Symmetric key.
S343: symmetric cryptography is carried out to sharing data using symmetric key, obtains symmetrical ciphertext.
Symmetric cryptography is carried out to sharing data by the symmetric key and obtains symmetrical ciphertext.Therefore, share receiving end to need
After getting the symmetric key, symmetrical ciphertext, which is decrypted, by the symmetric key can just obtain sharing data.Wherein
In one specific embodiment, for the safety for further increasing sharing data, symmetric cryptography can be AES (Advanced
Encryption Standard, Advanced Encryption Standard) encryption.
S345: carrying out asymmetric encryption to symmetric key according to public key, obtain asymmetric ciphertext, and by symmetrical ciphertext and non-
Symmetrical ciphertext forms cipher-text information.
The symmetric key for encrypting sharing data is carried out with the public key of the default application obtained from third-party application non-
Symmetric cryptography obtains asymmetric ciphertext, and symmetrical ciphertext and asymmetric ciphertext are formed cipher-text information, to further increase point
Enjoy the safety of data.It is asymmetric to add in order to further increase the safety of fractional data in a wherein specific embodiment
Close can be rsa encryption (a kind of asymmet-ric encryption method).
Further, in order to further improve the safety of sharing data, obtain symmetric key the step of, i.e. step
S341, comprising:
(a), the application message of third-party application is obtained.
The application message of third-party application is the relevant information of third-party application, such as can be developer's information.
(b), it is instructed according to sharing and obtains current time stamp, and obtain random number.
It, can be obtaining current time so that it is determined that getting by way of current time stamp when receiving sharing instruction
Current time stamp, and random number can be obtained by random function.
(c), according to application message, current time stamp and generating random number symmetric key.
It, can be according to application message, current time stamp after getting application message, current time stamp and random number
And at least one in random number generates symmetric key.Optionally, in order to further increase the safety of sharing data, according to answering
Symmetric key is generated with information, current time stamp and three item data of random number.Specifically, can according to application message, it is current when
Between stab and random number calculate random cipher, using the random cipher as symmetric key;It may be to further increase sharing number
According to safety, by the random cipher carry out MD5 (Message-Digest Algorithm 5, md5-challenge) Xi Ha
Calculated result is calculated in value, using the calculated result as symmetric key.
Referring to Fig. 5, obtaining the default public affairs applied from third-party application according to instruction is shared in a wherein embodiment
Before the step of key, i.e. before step S330, further includes:
S320: the server that sharing data is sent to default application is verified.
The mode of verification can be analyzed for server according to the relevant operation of sharing data to current operation and before,
Determine the safety of current sharing data.When passed the verification, subsequent instruct according to sharing from third-party application could be executed to obtain
Take the instruction of the public key of default application.Otherwise, stop data sharing.Since server needs to analyze sharing data,
The safety of current sharing data is determined, therefore, safety is higher.
Referring to Fig. 6, the present invention also one kind and the mutual corresponding data sharing method of the above method, run on sharing and receive
End, comprising:
S610: the cipher-text information sharing transmitting terminal and sending is received by default application.
It is to be appreciated that sharing receiving end is the terminal shared where object, sharing object is to share transmitting terminal passing through
After sharing object reception interface receives sharing object input instruction, determining pair that share extremely is instructed according to sharing object input
As.
S620: when determining sharing data according to the private key and cipher-text information of default application, sharing data is shown pre-
If in.
It is the cipher-text information determined according to public key and sharing data due to sharing transmitting terminal, if being received sharing receiving end
Be sharing that the third-party application authorized through default application is initiated, by the private key of default application and can necessarily receive
Cipher-text information determine sharing data.When that can determine that sharing receiving end can determine sharing data, illustrate the sharing data
It is the sharing that the third-party application authorized by default application is initiated, is legal sharing data, it therefore, can be by the sharing
Data are shown in default application.The dialog box that the sharing data interface can chat for one with the user for sharing transmitting terminal;
The sharing data interface may be the publication preview or publication result shared to a data publishing platform.
It should be noted that in the present embodiment, private key determines public key used by cipher-text information with transmitting terminal is shared
It is corresponding, public key be share transmitting terminal according to share default application that instruction obtains, to the third authorized using disclosed close
Key, sharing instruction is to share that transmitting terminal is received on third-party application shares sharing data to the instruction of default application.
Due to before showing to sharing data, needing to receive the ciphertext sharing transmitting terminal and sending by default application
Information just shows sharing data in default application when determining sharing data according to the private key and cipher-text information of default application
In, so could execute with sharing data related service, therefore, safety is higher.
Further, when determining sharing data according to the private key and cipher-text information of default application, sharing data is shown
Step in default application, i.e. step S620 include:
(I), when being decrypted to obtain symmetric key to the asymmetric ciphertext of cipher-text information according to the private key of default application,
It is decrypted according to symmetrical ciphertext of the symmetric key to cipher-text information.
It is to be appreciated that in the present embodiment, cipher-text information includes symmetrical ciphertext and asymmetric ciphertext.Symmetrically ciphertext is
The ciphertext obtained after symmetric cryptography is carried out to sharing data by symmetric key;Asymmetric ciphertext is by public key to symmetric key
Carry out the ciphertext that asymmetric encryption obtains.
(II), it is decrypted when according to symmetrical ciphertext of the symmetric key to cipher-text information, when obtaining sharing data, will share
Data are shown in default application.
If sharing the cipher-text information that receiving end receives is that the third-party application that default application has authorized initiates to share and send out
It send, then necessarily asymmetric ciphertext can be decrypted to obtain symmetric key according to the private key of default application, and then can root
Symmetrical ciphertext is decrypted according to symmetric key, obtains sharing data.When the available sharing data in sharing receiving end, explanation
The sharing data is the default sharing for applying the third-party application authorized to initiate, and is legal sharing data, therefore, can be incited somebody to action
The sharing data is shown in default application.It such as, can seem in the sharing data interface of default application by the sharing data.
It is illustrated below by way of a specific implementation process.
Since enterprise's IM software (employee of same enterprise provides the software of instant messaging service) is to the safety of sharing data
Property require it is higher, therefore, in this embodiment, preset application be preferably enterprise IM software.
When enterprise staff finds that valuable information can be by arousing enterprise by sharing transmitting terminal in third-party application
Industry IM software is shared with client or colleague, and the requirement due to enterprise's IM software to safety is higher, when enterprise staff passes through the
Tripartite using sharing information to enterprise's IM software when, the third-party application for sharing transmitting terminal needs to encrypt sharing data,
The ciphering process is not necessarily to the intervention of user, does not interfere with user experience.It should be noted that third-party application can be by adding
The SDK that enterprise IM software is provided when authorizing for it is carried to encrypt sharing data.In a specific embodiment, third party
For the system architecture of application as shown in fig. 7, SDK is embedded in third-party application, SDK specifically includes AES module and RSA module.AES
Module obtains symmetrical ciphertext, such as URL for generating symmetric key, and using symmetric key encryption sharing data to be shared.Add
The purpose of close URL is to prevent from URL to be maliciously tampered to forge and cause security threat to the regular traffic of enterprise's IM software.RSA mould
Block is used for encrypted symmetric key, guarantees that symmetric key will not be stolen in transmission process.RSA Algorithm can guarantee to use public key
Encrypted information can only be decrypted by the side for holding private key, and insertion when SDK is distributed to third-party application of RSA public key
In SDK, third-party application need by the audit of enterprise's IM software just it is available to SDK and sharing data it is soft to enterprise IM
Part.
It is not tampered to guarantee that third-party application is shared with the URL of enterprise's IM software, third-party application is needed using SDK
The AES module of offer encrypts original URL (sharing data).Since symmetric key is generated in third-party application, enterprise IM
Software needs to be decrypted with symmetric key to get original URL.In order to guarantee the transmission safety of symmetric key, in this reality
It applies in example, symmetric key carries out asymmetric encryption by the RSA module in insertion SDK.Third-party application can will be encrypted by AES module
The URL (symmetrical ciphertext) crossed is transferred to shares receiving end together with by the encrypted symmetric key of RSA module (asymmetric ciphertext)
Enterprise's IM software, share receiving end enterprise's IM software get the sharing from third-party application can be used private key decryption
Asymmetric ciphertext obtains symmetric key, and the symmetrical ciphertext of symmetric key decryption obtains original URL (sharing data) again later.
Share the corresponding data sharing of the data sharing method of transmitting terminal with above-mentioned run on the present invention also provides a kind of and fill
It sets.A kind of data sharing device of embodiment, runs on sharing transmitting terminal, as shown in Figure 8, comprising:
Command reception module 810 shares sharing data to the sharing of default application for receiving on third-party application
Instruction;
Public key acquisition module 830, for obtaining the public key of default application from third-party application according to sharing instruction;
Ciphertext determining module 840 for determining cipher-text information according to public key and sharing data, and jumps to default application;
Object receiving module 850, for receiving sharing object input instruction by sharing object reception interface;
Ciphertext sending module 860 shares object for determining according to sharing object input instruction, and cipher-text information is passed through
Default application is sent to sharing object.
Due to before sending to sharing data, needing to obtain default application from third-party application according to sharing instruction
Public key, and cipher-text information is determined according to public key and sharing data.Finally just cipher-text information is sent to, is connect by sharing object
It receives interface and receives to share and share object determined by object input instruction.It needs to carry out cipher-text information in this way, sharing receiving end
After accurate decryption, sharing data could be shown and share receiving end, and then execution and sharing data related service, therefore,
Its safety is higher.
In order to further increase the safety of data sharing, referring to Fig. 9, ciphertext determines in a wherein embodiment
Module, comprising:
Key acquiring unit 841, for obtaining symmetric key;
Symmetric cryptography unit 843 obtains symmetrical ciphertext for carrying out symmetric cryptography to sharing data using symmetric key;
Ciphertext forms unit 845, for, to symmetric key progress asymmetric encryption, obtaining asymmetric ciphertext according to public key,
And symmetrical ciphertext and asymmetric ciphertext are formed into cipher-text information.
Please continue to refer to Fig. 9, further, in order to further improve the safety of sharing data, key obtains single
Member 841, comprising:
First obtains subelement 841a, for obtaining the application message of third-party application;
Second obtains subelement 841b, obtains current time stamp for instructing according to sharing, and obtain random number;
Key generates subelement 841c, for according to application message, current time stamp and generating random number symmetric key.
It further include verification sending module 820 in a wherein embodiment please continue to refer to Fig. 8;
Sending module 820 is verified, the server for sharing data to be sent to default application verifies;
Public key acquisition module 830, for obtaining default application from third-party application according to instruction is shared when verification passes through
Public key.
Share the corresponding data sharing of the data sharing method of receiving end with above-mentioned run on the present invention also provides a kind of and fill
It sets.A kind of data sharing device of embodiment runs on and shares receiving end, as shown in Figure 10, comprising:
Ciphertext receiving module 910, for receiving the cipher-text information sharing transmitting terminal and sending by default application;
Data disaply moudle 930, for will divide when determining sharing data according to the private key and cipher-text information of default application
Data are enjoyed to be shown in default application;Private key determines that public key used by cipher-text information is corresponding with transmitting terminal is shared, and public key is point
Enjoy transmitting terminal according to share default application that instruction obtains, to the third authorized using disclosed key, sharing instruction is
Share that transmitting terminal is received on third-party application shares sharing data to the instruction of default application.
Due to before showing to sharing data, needing to receive the ciphertext sharing transmitting terminal and sending by default application
Information just shows sharing data in default application when determining sharing data according to the private key and cipher-text information of default application
In, so could execute with sharing data related service, therefore, safety is higher.
It further include cipher key decryption block 920 in a wherein embodiment please continue to refer to Figure 10;
Cipher key decryption block 920, for being solved when according to the private key of default application to the asymmetric ciphertext of cipher-text information
It is close when obtaining symmetric key, it is decrypted according to symmetrical ciphertext of the symmetric key to cipher-text information;
Data disaply moudle 930, for working as cipher key decryption block 920 according to symmetric key to the symmetrical ciphertext of cipher-text information
It is decrypted, when obtaining sharing data, sharing data is shown in default application.
The present invention also provides a kind of calculating corresponding with the above-mentioned data sharing method for running on sharing transmitting terminal and device
Machine equipment including memory, processor and is stored in the computer journey that can be run on the memory and on the processor
The step of sequence, the processor realizes the data sharing method of above-mentioned sharing transmitting terminal when executing the computer program.
It is obtained due to before sending sharing data, needing to be instructed according to the sharing from the third-party application
The public key of the default application, and cipher-text information is determined according to the public key and the sharing data.Finally just by cipher-text information
It is sent to receive to share by the sharing object reception interface and shares object determined by object input instruction.In this way, sharing
Receiving end needs to carry out after accurately decrypting cipher-text information, could show sharing data and share receiving end, and then execute
With sharing data related service, therefore, the safety of above-mentioned computer equipment is higher.
The present invention also provides a kind of calculating corresponding with the above-mentioned data sharing method for running on sharing transmitting terminal and device
Machine storage medium is stored with computer program in the computer storage medium, when the computer program is executed by processor,
The step of realizing the data sharing method of above-mentioned sharing transmitting terminal.
It is obtained due to before sending sharing data, needing to be instructed according to the sharing from the third-party application
The public key of the default application, and cipher-text information is determined according to the public key and the sharing data.Finally just by cipher-text information
It is sent to receive to share by the sharing object reception interface and shares object determined by object input instruction.In this way, sharing
Receiving end needs to carry out after accurately decrypting cipher-text information, could show sharing data and share receiving end, and then execute
With sharing data related service, therefore, the safety of above-mentioned computer storage medium is higher.
The present invention also provides a kind of calculating corresponding with the above-mentioned data sharing method for running on sharing receiving end and device
Machine equipment including memory, processor and is stored in the computer journey that can be run on the memory and on the processor
The step of sequence, the processor realizes the data sharing method of above-mentioned sharing receiving end when executing the computer program.
Due to before showing to sharing data, needing to receive the ciphertext sharing transmitting terminal and sending by default application
Information just shows the sharing data when determining sharing data according to the private key and the cipher-text information of the default application
Show in the default application, and then could execute and sharing data related service, therefore, the safety of above-mentioned computer equipment
It is higher.
The present invention also provides a kind of calculating corresponding with the above-mentioned data sharing method for running on sharing receiving end and device
Machine storage medium is stored with computer program in the computer storage medium, when the computer program is executed by processor,
The step of realizing the data sharing method of above-mentioned sharing receiving end.
Due to before showing to sharing data, needing to receive the ciphertext sharing transmitting terminal and sending by default application
Information just shows the sharing data when determining sharing data according to the private key and the cipher-text information of the default application
Show in the default application, and then could execute and sharing data related service, therefore, the peace of above-mentioned computer storage medium
Full property is higher.
The data sharing device and above-mentioned data sharing method sharing transmitting terminal or share receiving end are run on due to above-mentioned
It corresponds to each other, for particular technique feature corresponding with the above method in device, therefore not to repeat here.Above-mentioned computer equipment and
Computer storage medium with above-mentioned data sharing method correspond, in computer equipment and storage medium with above-mentioned side
The corresponding technical characteristic of method, therefore not to repeat here.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Instruct relevant hardware to complete by computer program, program can be stored in one and non-volatile computer-readable deposit
In storage media, in the embodiment of the present invention, which be can be stored in the storage medium of computer system, and by the department of computer science
At least one processor in system executes, and includes the process such as the embodiment of above-mentioned each method with realization.Storage medium therein
It can be magnetic disk, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random
Access Memory, RAM) etc..
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to protection of the invention
Range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.
Claims (14)
1. a kind of data sharing method, which is characterized in that run on sharing transmitting terminal, comprising:
It is received on third-party application and shares sharing data to the sharing instruction of default application;
The public key of the default application is obtained from the third-party application according to the sharing instruction;
Cipher-text information is determined according to the public key and the sharing data, and jumps to the default application;
It is received by the default application and shares object input instruction;
It inputs instruction according to the sharing object and determines and share object, and the cipher-text information is sent by the default application
To the sharing object.
2. data sharing method according to claim 1, which is characterized in that described according to the public key and the sharing number
According to the step of determining cipher-text information, comprising:
Obtain symmetric key;
Symmetric cryptography is carried out to the sharing data using the symmetric key, obtains symmetrical ciphertext;
Asymmetric encryption is carried out to the symmetric key according to the public key, obtains asymmetric ciphertext, and by the symmetrical ciphertext
And the asymmetric ciphertext forms cipher-text information.
3. data sharing method according to claim 2, which is characterized in that the step of the acquisition symmetric key, comprising:
Obtain the application message of the third-party application;
It is instructed according to the sharing and obtains current time stamp, and obtain random number;
According to the application message, the current time stamp and the generating random number symmetric key.
4. data sharing method according to claim 1, which is characterized in that it is described according to sharing instruction from described the
Before the step of tripartite's application obtains the public key of the default application, further includes:
The server that the sharing data is sent to the default application is verified.
5. a kind of data sharing method, which is characterized in that run on and share receiving end, comprising:
The cipher-text information sharing transmitting terminal and sending is received by default application;
When determining sharing data according to the private key and the cipher-text information of the default application, the sharing data is shown
In the default application;The private key determines that public key used by the cipher-text information is corresponding with the sharing transmitting terminal, described
Public key be it is described sharing transmitting terminal according to share instruction obtain the default application, to authorized third application disclosed in
Key, sharing instruction be the sharing transmitting terminal on the third-party application it is received by the sharing data share to
The instruction of default application.
6. data sharing method according to claim 5, which is characterized in that the private key when according to the default application
And the sharing data is shown the step in the default application when determining sharing data by the cipher-text information, comprising:
When being decrypted to obtain symmetric key to the asymmetric ciphertext of the cipher-text information according to the private key of the default application,
It is decrypted according to symmetrical ciphertext of the symmetric key to the cipher-text information;
It is decrypted when according to symmetrical ciphertext of the symmetric key to the cipher-text information, it, will be described when obtaining sharing data
Sharing data is shown in the default application.
7. a kind of data sharing device, which is characterized in that run on sharing transmitting terminal, comprising:
Command reception module shares sharing data to the sharing instruction of default application for receiving on third-party application;
Public key acquisition module, for obtaining the public key of the default application from the third-party application according to the sharing instruction;
Ciphertext determining module for determining cipher-text information according to the public key and the sharing data, and jumps to described default
Using;
Object receiving module shares object input instruction for receiving by the default application;
Ciphertext sending module shares object for inputting instruction according to the sharing object and determining, and the cipher-text information is led to
It crosses the default application and is sent to the sharing object.
8. data sharing device according to claim 7, which is characterized in that the ciphertext determining module, comprising:
Key acquiring unit, for obtaining symmetric key;
Symmetric cryptography unit obtains symmetrical ciphertext for carrying out symmetric cryptography to the sharing data using the symmetric key;
Ciphertext forms unit, for, to symmetric key progress asymmetric encryption, obtaining asymmetric ciphertext according to the public key,
And the symmetrical ciphertext and the asymmetric ciphertext are formed into cipher-text information.
9. data sharing device according to claim 8, which is characterized in that the key acquiring unit, comprising:
First obtains subelement, for obtaining the application message of the third-party application;
Second obtains subelement, obtains current time stamp for instructing according to the sharing, and obtain random number;
Key generates subelement, for symmetrically close according to the application message, the current time stamp and the generating random number
Key.
10. data sharing device according to claim 7, which is characterized in that further include verification sending module;
The verification sending module, the server for the sharing data to be sent to the default application verify;
The public key acquisition module, for obtaining institute from the third-party application according to sharing instruction when verification passes through
State the public key of default application.
11. a kind of data sharing device, which is characterized in that run on and share receiving end, comprising:
Ciphertext receiving module, for receiving the cipher-text information sharing transmitting terminal and sending by default application;
Data disaply moudle, for inciting somebody to action when determining sharing data according to the private key and the cipher-text information of the default application
The sharing data is shown in the default application;The private key determines that the cipher-text information is adopted with the transmitting terminal of sharing
Public key is corresponding, the public key be the sharing transmitting terminal according to share the default application that instruction obtains, to having awarded
The third of power applies disclosed key, and the sharing instruction, which is that the sharing transmitting terminal is received on the third-party application, incites somebody to action
The sharing data is shared to the instruction of default application.
12. data sharing device according to claim 11, which is characterized in that further include cipher key decryption block;
The cipher key decryption block, for when according to the private key of the default application to the asymmetric ciphertext of the cipher-text information into
When row decryption obtains symmetric key, it is decrypted according to symmetrical ciphertext of the symmetric key to the cipher-text information;
The data disaply moudle, for working as the cipher key decryption block according to the symmetric key to pair of the cipher-text information
Claim ciphertext to be decrypted, when obtaining sharing data, the sharing data is shown in the default application.
13. a kind of computer equipment, including memory, processor and it is stored on the memory and can be on the processor
The computer program of operation, which is characterized in that the processor realizes that claim 1-6 is any when executing the computer program
The step of data sharing method described in one.
14. a kind of computer storage medium, computer program is stored in the computer storage medium, which is characterized in that institute
When stating computer program and being executed by processor, the step of realizing data sharing method as claimed in any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710488308.9A CN109120576B (en) | 2017-06-23 | 2017-06-23 | Data sharing method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710488308.9A CN109120576B (en) | 2017-06-23 | 2017-06-23 | Data sharing method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109120576A true CN109120576A (en) | 2019-01-01 |
CN109120576B CN109120576B (en) | 2020-11-03 |
Family
ID=64733321
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710488308.9A Active CN109120576B (en) | 2017-06-23 | 2017-06-23 | Data sharing method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109120576B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109981655A (en) * | 2019-03-29 | 2019-07-05 | 富士施乐实业发展(中国)有限公司 | A kind of method and device transmitted, receive information |
CN112769569A (en) * | 2021-03-04 | 2021-05-07 | 北京德风新征程科技有限公司 | Internet of things equipment secure communication method and equipment |
CN113032810A (en) * | 2021-04-07 | 2021-06-25 | 工银科技有限公司 | Information processing method, information processing apparatus, electronic device, information processing medium, and program product |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101466094A (en) * | 2007-12-18 | 2009-06-24 | 郭诺 | Method, server and deciphering device for protecting digital contents of mobile communication application |
CN101771532A (en) * | 2008-12-31 | 2010-07-07 | 华为技术有限公司 | Method, device and system for realizing resource sharing |
CN101989992A (en) * | 2009-07-31 | 2011-03-23 | 中国移动通信集团公司 | Downloading method, system and relevant device of wireless application protocol (WAP) services |
CN103379098A (en) * | 2012-04-19 | 2013-10-30 | 华为技术有限公司 | Content sharing method, device and network system thereof |
CN103442059A (en) * | 2013-08-27 | 2013-12-11 | 华为终端有限公司 | File sharing method and device |
CN103973736A (en) * | 2013-01-30 | 2014-08-06 | 华为终端有限公司 | Data sharing method and device |
US20150052253A1 (en) * | 2014-09-22 | 2015-02-19 | Weaved, Inc. | Multi-server fractional subdomain dns protocol |
CN105025019A (en) * | 2015-07-07 | 2015-11-04 | 深圳奥联信息安全技术有限公司 | Data safety sharing method |
CN105208007A (en) * | 2015-08-26 | 2015-12-30 | 中标软件有限公司 | Data sharing system |
CN106789008A (en) * | 2016-12-16 | 2017-05-31 | 北京瑞卓喜投科技发展有限公司 | Method, the apparatus and system being decrypted to sharable encryption data |
-
2017
- 2017-06-23 CN CN201710488308.9A patent/CN109120576B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101466094A (en) * | 2007-12-18 | 2009-06-24 | 郭诺 | Method, server and deciphering device for protecting digital contents of mobile communication application |
CN101771532A (en) * | 2008-12-31 | 2010-07-07 | 华为技术有限公司 | Method, device and system for realizing resource sharing |
CN101989992A (en) * | 2009-07-31 | 2011-03-23 | 中国移动通信集团公司 | Downloading method, system and relevant device of wireless application protocol (WAP) services |
CN103379098A (en) * | 2012-04-19 | 2013-10-30 | 华为技术有限公司 | Content sharing method, device and network system thereof |
CN103973736A (en) * | 2013-01-30 | 2014-08-06 | 华为终端有限公司 | Data sharing method and device |
CN103442059A (en) * | 2013-08-27 | 2013-12-11 | 华为终端有限公司 | File sharing method and device |
US20150052253A1 (en) * | 2014-09-22 | 2015-02-19 | Weaved, Inc. | Multi-server fractional subdomain dns protocol |
CN105025019A (en) * | 2015-07-07 | 2015-11-04 | 深圳奥联信息安全技术有限公司 | Data safety sharing method |
CN105208007A (en) * | 2015-08-26 | 2015-12-30 | 中标软件有限公司 | Data sharing system |
CN106789008A (en) * | 2016-12-16 | 2017-05-31 | 北京瑞卓喜投科技发展有限公司 | Method, the apparatus and system being decrypted to sharable encryption data |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109981655A (en) * | 2019-03-29 | 2019-07-05 | 富士施乐实业发展(中国)有限公司 | A kind of method and device transmitted, receive information |
CN112769569A (en) * | 2021-03-04 | 2021-05-07 | 北京德风新征程科技有限公司 | Internet of things equipment secure communication method and equipment |
CN112769569B (en) * | 2021-03-04 | 2023-02-07 | 北京德风新征程科技有限公司 | Internet of things equipment secure communication method and equipment |
CN113032810A (en) * | 2021-04-07 | 2021-06-25 | 工银科技有限公司 | Information processing method, information processing apparatus, electronic device, information processing medium, and program product |
Also Published As
Publication number | Publication date |
---|---|
CN109120576B (en) | 2020-11-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10142107B2 (en) | Token binding using trust module protected keys | |
US8379857B1 (en) | Secure key distribution for private communication in an unsecured communication channel | |
Choi et al. | Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger | |
CN113572743B (en) | Data encryption and decryption methods and devices, computer equipment and storage medium | |
CN113422679B (en) | Key generation method, device and system, encryption method, electronic device and computer readable storage medium | |
CN112564887A (en) | Key protection processing method, device, equipment and storage medium | |
CN102821098A (en) | System and method for self-dissolving instant messaging under cloud environment | |
CN103327034A (en) | Safe login method, system and device | |
TW202031010A (en) | Data storage method and device, and apparatus | |
CN112765642A (en) | Data processing method, data processing apparatus, electronic device, and medium | |
Tung et al. | Pandora messaging: An enhanced self-message-destructing secure instant messaging architecture for mobile devices | |
CN116601914A (en) | Hybrid key derivation to protect data | |
CN109120576A (en) | Data sharing method and device, computer equipment and storage medium | |
CN110557367B (en) | Secret key updating method and system for quantum computing secure communication resistance based on certificate cryptography | |
CN113365264B (en) | Block chain wireless network data transmission method, device and system | |
Fahl et al. | Trustsplit: usable confidentiality for social network messaging | |
EP2892206B1 (en) | System and method for push framework security | |
CN106453069B (en) | A kind of instant communication message sends, checks, checking control method and its equipment | |
CN115801252B (en) | Safe cloud desktop system combined with quantum encryption technology | |
CN116599719A (en) | User login authentication method, device, equipment and storage medium | |
CN113243093A (en) | System and method for message transmission and retrieval using blockchains | |
Braga | Integrated technologies for communication security on mobile devices | |
US11683182B2 (en) | Message embedment in random values | |
CN110166226B (en) | Method and device for generating secret key | |
Vinh et al. | Constructing a Model Combining Zalo and End-to-End Encryption for Application in Digital Transformation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |