Sensitive data synchronization method, device and system, computer equipment and computer readable storage medium

A technology of sensitive data and computer programs, applied in the field of video, can solve problems such as poor user experience, and achieve the effect of ensuring forward security

Pending Publication Date: 2021-03-09
深圳依时货拉拉科技有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Users can also choose to manually enter sensitive information into a new device. Each time a device is added, the user needs to manually add it, which is a poor user experience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive data synchronization method, device and system, computer equipment and computer readable storage medium
  • Sensitive data synchronization method, device and system, computer equipment and computer readable storage medium
  • Sensitive data synchronization method, device and system, computer equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] figure 2 A flowchart of a method for synchronizing sensitive data according to Embodiment 1 of the present application is schematically shown. It can be understood that this method embodiment can be executed in the mobile terminal 13, and the flowchart of this method embodiment is not used to limit the sequence of execution steps.

[0056] Such as figure 2 As shown, the method for synchronizing sensitive data may include steps S200-S206, wherein:

[0057] Step S200, uploading the long-term public key and short-term public key of the first device, and obtaining the long-term public key and short-term public key of the second device;

[0058] Step S202, generating a shared key according to the long-term private key and short-term private key of the first device, the long-term public key of the second device, and the short-term public key of the second device;

[0059] Step S204, obtaining encrypted sensitive information of the second device from the server, where the...

Embodiment 2

[0098] Figure 4 A flow chart of a method for synchronizing sensitive data according to Embodiment 2 of the present application is schematically shown. It can be understood that this method embodiment can be executed in the mobile terminal 13, and the flowchart of this method embodiment is not used to limit the sequence of execution steps.

[0099] Such as Figure 4 As shown, the method for synchronizing sensitive data may include steps S400-S404, wherein:

[0100] Step S400, after receiving the request for synchronizing sensitive data, upload the long-term public key and short-term public key of the second device, and obtain the long-term public key and short-term public key of the first device;

[0101] Step S402, generating a shared key according to the long-term private key and short-term private key of the second device, the long-term public key of the first device, and the short-term public key of the first device;

[0102] Step S404, encrypting the sensitive data wit...

Embodiment 3

[0138] Figure 5 A flowchart of a method for synchronizing sensitive data according to Embodiment 3 of the present application is schematically shown. It can be understood that this method embodiment can be executed in the server 12, and the flowchart of this method embodiment is not used to limit the sequence of execution steps.

[0139] Step S500, receiving the long-term public key and short-term public key of the first device, and sending the long-term public key and short-term public key of the second device to the first device;

[0140] Step S502, receiving the long-term public key and short-term public key of the second device, and sending the long-term public key and short-term public key of the first device to the second device;

[0141] Step S504, receiving the encrypted sensitive information sent by the second device, and sending the encrypted sensitive information to the first device.

[0142] Specifically, 1. Each device of the user generates an identity key pair...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method, device and system for synchronizing sensitive data, computer equipment and a computer readable storage medium. The method comprises the following steps: uploading a first equipment long-term public key and a short-term public key, and obtaining the long-term public key and the short-term public key of second equipment; generating a shared key according to the first equipment long-term private key, the short-term private key, the long-term public key of the second equipment and the short-term public key of the second equipment; acquiring the encrypted sensitive information of the second device from a server, wherein the encrypted password is the shared key; and decrypting the encrypted sensitive information by using the shared key. Therefore, in the sensitive information synchronization process, the transmission of the sensitive information is always in an encrypted state, and the sensitive information is ensured not to be leaked to anintermediate server or other attackers. The newly generated shared key is used for the encryption key of the sensitive information each time, so that the forward security is ensured, and an attackercannot decrypt the previously encrypted information even if the attacker breaks through the latest encryption key.

Description

technical field [0001] The embodiments of the present application relate to the video field, and in particular to a method, device, system, computer equipment, and computer-readable storage medium for synchronizing sensitive data. Background technique [0002] Various apps of users need to synchronize sensitive personal information between different devices. Generally, there are three ways to synchronize sensitive information: first, Signal’s Seasame protocol is used to synchronize messages between different devices of the user. To ensure the forward security of each message, a redundant Double Ratchet is designed. X3DH key exchange protocol. The second is the general scheme of trusting the central server, which needs to trust a central server. The device uploads sensitive information to the server, and the server stores it. When other devices join, the sensitive data is sent to other devices. This solution needs to trust the central server. If the central server has insuf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/30H04L29/06
CPCH04L9/0861H04L9/085H04L9/3247H04L9/3066H04L63/06
Inventor 谈扬
Owner 深圳依时货拉拉科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products