CN117478785A - Methods, devices, storage media and electronic devices for exiting child mode - Google Patents
Methods, devices, storage media and electronic devices for exiting child mode Download PDFInfo
- Publication number
- CN117478785A CN117478785A CN202311540468.5A CN202311540468A CN117478785A CN 117478785 A CN117478785 A CN 117478785A CN 202311540468 A CN202311540468 A CN 202311540468A CN 117478785 A CN117478785 A CN 117478785A
- Authority
- CN
- China
- Prior art keywords
- electronic device
- public key
- child mode
- random number
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/724094—Interfacing with a device worn on the user's body to provide access to telephonic functionalities, e.g. accepting a call, reading or composing a message
- H04M1/724095—Worn on the wrist, hand or arm
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72412—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请公开了一种退出儿童模式的方法,应用于第一电子设备,该方法包括:接收退出儿童模式的请求信息,儿童模式为第一电子设备适合儿童使用的工作模式;基于请求信息,向第二电子设备发送询问信息,询问信息用于询问用户是否同意退出儿童模式;接收第二电子设备的反馈信息,反馈信息包括同意退出儿童模式或不同意退出儿童模式;若反馈信息为同意退出儿童模式,则第一电子设备退出儿童模式。本申请实施例提升通过儿童模式对儿童使用电子设备的限制约束效果。
This application discloses a method for exiting the child mode, which is applied to a first electronic device. The method includes: receiving request information to exit the child mode, which is a working mode of the first electronic device suitable for children; based on the request information, The second electronic device sends inquiry information, and the inquiry information is used to ask the user whether to agree to exit the child mode; receives feedback information from the second electronic device, the feedback information includes agreeing to exit the child mode or disagreeing to exit the child mode; if the feedback information is agree to exit the child mode, mode, the first electronic device exits the child mode. The embodiments of the present application improve the effect of restricting children's use of electronic devices through the child mode.
Description
技术领域Technical field
本申请属于电子技术领域,尤其涉及一种退出儿童模式的方法、装置、存储介质及电子设备。The present application belongs to the field of electronic technology, and in particular relates to a method, device, storage medium and electronic equipment for exiting child mode.
背景技术Background technique
随着技术的发展,电子设备比如智能手机的功能越来越丰富,越来越多的用户包括儿童也开始接触智能手机,儿童身心发展尚未成熟,为了使电子设备能够适应儿童身心发展的需求,因此在电子设备中开发了区别于正常模式的儿童模式,家长可以预先设置在儿童模式下儿童可以访问的应用程序范围、使用时长等,从而对儿童使用电子设备进行一定限制约束,相关技术中,可以通过输入密码以退出儿童模式,由于很多儿童知道密码,可以在家长不知情的情况下,轻易自行主动退出儿童模式,因此通过儿童模式对儿童使用电子设备进行限制约束的效果较差。With the development of technology, electronic devices such as smartphones are becoming more and more functional. More and more users, including children, are beginning to be exposed to smartphones. Children's physical and mental development is not yet mature. In order to make electronic devices adapt to the needs of children's physical and mental development, Therefore, a child mode that is different from the normal mode has been developed in electronic devices. Parents can pre-set the range of applications that children can access in the child mode, the duration of use, etc., thereby imposing certain restrictions on children's use of electronic devices. In related technologies, You can exit the children's mode by entering a password. Since many children know the password, they can easily exit the children's mode without their parents' knowledge. Therefore, the children's mode is less effective in restricting children's use of electronic devices.
发明内容Contents of the invention
本申请实施例提供一种退出儿童模式的方法、装置、存储介质、电子设备,儿童不能轻易自行退出儿童模式,提升通过儿童模式对儿童使用电子设备的限制约束效果。Embodiments of the present application provide a method, device, storage medium, and electronic device for exiting the child mode. Children cannot easily exit the child mode on their own, thereby improving the restriction effect of the child mode on children's use of electronic devices.
第一方面,本申请实施例提供一种退出儿童模式的方法,应用于第一电子设备,所述方法包括:In a first aspect, embodiments of the present application provide a method for exiting child mode, which is applied to a first electronic device. The method includes:
接收退出儿童模式的请求信息,所述儿童模式为所述第一电子设备适合儿童使用的工作模式;Receive request information to exit the child mode, where the child mode is an operating mode of the first electronic device suitable for use by children;
基于所述请求信息,向第二电子设备发送询问信息,所述询问信息用于询问用户是否同意退出所述儿童模式;Based on the request information, send inquiry information to the second electronic device, where the inquiry information is used to ask the user whether to agree to exit the child mode;
接收所述第二电子设备的反馈信息,所述反馈信息包括同意退出儿童模式或不同意退出儿童模式;Receive feedback information from the second electronic device, the feedback information including consent to exit the child mode or disagreement to exit the child mode;
若所述反馈信息为同意退出儿童模式,则所述第一电子设备退出儿童模式。If the feedback information indicates consent to exit the child mode, the first electronic device exits the child mode.
第二方面,本申请实施例提供一种退出儿童模式的方法,应用于第二电子设备,所述方法包括:In a second aspect, embodiments of the present application provide a method for exiting child mode, which is applied to a second electronic device. The method includes:
接收第一电子设备发送的询问信息,所述询问信息用于询问用户是否同意所述第一电子设备退出儿童模式;Receive inquiry information sent by the first electronic device, the inquiry information being used to ask the user whether he agrees with the first electronic device to exit the child mode;
基于所述询问信息,获取用户的反馈信息,所述反馈信息包括同意退出儿童模式或不同意退出儿童模式;Based on the query information, obtain feedback information from the user, where the feedback information includes agreement to exit the child mode or disagreement to exit the child mode;
向所述第一电子设备发送所述反馈信息,以使所述第一电子设备退出或不退出所述儿童模式。Send the feedback information to the first electronic device so that the first electronic device exits or does not exit the child mode.
第三方面,本申请实施例还提供一种退出儿童模式的装置,应用于第一电子设备,所述装置包括:In a third aspect, embodiments of the present application also provide a device for exiting child mode, which is applied to a first electronic device. The device includes:
第一接收模块,用于接收退出儿童模式的请求信息,所述儿童模式为所述第一电子设备适合儿童使用的工作模式;A first receiving module configured to receive request information to exit the child mode, where the child mode is a working mode of the first electronic device suitable for use by children;
第一发送模块,用于基于所述请求信息,向第二电子设备发送询问信息,所述询问信息用于询问用户是否同意退出所述儿童模式;A first sending module, configured to send inquiry information to the second electronic device based on the request information, where the inquiry information is used to ask the user whether to agree to exit the child mode;
第二接收模块,用于接收所述第二电子设备的反馈信息,所述反馈信息包括同意退出儿童模式或不同意退出儿童模式;a second receiving module, configured to receive feedback information from the second electronic device, where the feedback information includes agreement to exit the child mode or disagreement to exit the child mode;
退出模块,用于若所述反馈信息为同意退出儿童模式,则所述第一电子设备退出儿童模式。An exit module, configured to exit the child mode if the feedback information indicates consent to exit the child mode.
第四方面,本申请实施例还提供一种退出儿童模式的装置,应用于第二电子设备,所述装置包括:In a fourth aspect, embodiments of the present application also provide a device for exiting child mode, which is applied to a second electronic device. The device includes:
第三接收模块,用于接收第一电子设备发送的询问信息,所述询问信息用于询问用户是否同意所述第一电子设备退出儿童模式;A third receiving module, configured to receive inquiry information sent by the first electronic device, where the inquiry information is used to inquire whether the user agrees with the first electronic device to exit the child mode;
获取模块,用于基于所述询问信息,获取用户的反馈信息,所述反馈信息包括同意退出儿童模式或不同意退出儿童模式;An acquisition module, configured to obtain feedback information from the user based on the query information, where the feedback information includes agreement to exit the child mode or disagreement to exit the child mode;
发送模块,用于向所述第一电子设备发送所述反馈信息,以使所述第一电子设备退出或不退出所述儿童模式。A sending module, configured to send the feedback information to the first electronic device so that the first electronic device exits or does not exit the child mode.
第五方面,本申请实施例还提供一种计算机可读存储介质,其上存储有计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如本申请任一实施例提供的退出儿童模式的方法或退出儿童模式的方法。In a fifth aspect, embodiments of the present application also provide a computer-readable storage medium on which a computer program is stored. When the computer program is run on a computer, the computer is caused to execute the method provided by any embodiment of the present application. Ways to exit Kids Mode or ways to exit Kids Mode.
第六方面,本申请实施例还提供一种电子设备,包括处理器和存储器,所述存储器有计算机程序,所述处理器通过调用所述计算机程序,用于执行如本申请任一实施例提供的退出儿童模式的方法或任一实施例提供的退出儿童模式的方法。In a sixth aspect, embodiments of the present application further provide an electronic device, including a processor and a memory. The memory has a computer program. The processor invokes the computer program to execute as provided in any embodiment of the present application. The method for exiting the child mode or the method for exiting the child mode provided by any embodiment.
第七方面,本申请实施例提供的退出儿童模式的系统,包括第一电子设备和第二电子设备,所述第一电子设备包括第三方面所述的退出儿童模式的装置;所述第二电子设备包括第四方面所述的退出儿童模式的装置。In a seventh aspect, an embodiment of the present application provides a system for exiting the child mode, including a first electronic device and a second electronic device. The first electronic device includes the device for exiting the child mode described in the third aspect; the second electronic device The electronic device includes the device for exiting the child mode described in the fourth aspect.
本申请实施例中,儿童使用的第一电子设备处于儿童模式,当儿童需要退出儿童模式时,不能通过操作第一电子设备,比如输入密码的方式来退出儿童模式,而是会向家长设置的第二电子设备发送询问信息,正常情况下,家长持有第二电子设备,因此首先家长可以对儿童想要退出儿童模式的事件知情,其次可以由家长确定是否同意退出儿童模式,若家长同意退出儿童模式,则可以控制第二电子设备向第一电子设备返回同意退出儿童模式的反馈信息,第一电子设备接收到同意退出儿童模式的反馈信息,则退出儿童模式,第一电子设备工作在正常模式,若家长不同意退出儿童模式,则可以控制第二电子设备向第一电子设备返回不同意退出儿童模式的反馈信息,第一电子设备接收到不同意退出儿童模式的反馈信息,则保持工作在儿童模式;或者若家长不同意退出儿童模式,也可以不返回反馈信息,那么第一电子设备接收不到同意退出儿童模式的反馈信息,也会保持工作在儿童模式。因此通过采用本申请实施例中退出儿童模式的方式,儿童不会在家长不知情的情况下自行轻易退出儿童模式,避免了儿童自行退出儿童模式之后进行了不适当的操作,或者使用过多的时间,从而能够保证通过儿童模式对儿童使用电子设备的限制约束效果。In the embodiment of this application, the first electronic device used by the child is in the child mode. When the child needs to exit the child mode, he cannot exit the child mode by operating the first electronic device, such as entering a password. Instead, he will ask the parent to set the password. The second electronic device sends an inquiry message. Under normal circumstances, the parent holds the second electronic device. Therefore, first of all, the parent can be informed of the event that the child wants to exit the child mode. Secondly, the parent can determine whether to agree to exit the child mode. If the parent agrees to exit, child mode, the second electronic device can be controlled to return feedback information agreeing to exit the child mode to the first electronic device. The first electronic device receives the feedback information agreeing to exit the child mode, then exits the child mode, and the first electronic device works normally. mode, if the parent does not agree to exit the child mode, the second electronic device can be controlled to return feedback information that does not agree to exit the child mode to the first electronic device. The first electronic device will keep working after receiving the feedback information that it does not agree to exit the child mode. In the child mode; or if the parent does not agree to exit the child mode, feedback information does not need to be returned. Then the first electronic device does not receive the feedback information agreeing to exit the child mode and will continue to work in the child mode. Therefore, by adopting the method of exiting the child mode in the embodiment of the present application, the children will not easily exit the child mode without the parents' knowledge, thus preventing the children from performing inappropriate operations or using too much after exiting the child mode. time, so as to ensure the effect of restricting children's use of electronic devices through children's mode.
附图说明Description of the drawings
下面结合附图,通过对本申请的具体实施方式详细描述,将使本申请的技术方案及其有益效果显而易见。The technical solutions and beneficial effects of the present application will be apparent through a detailed description of the specific embodiments of the present application in conjunction with the accompanying drawings.
图1是本申请实施例提供的退出儿童模式方法的第一种流程示意图。Figure 1 is a schematic flowchart of a first method for exiting the child mode provided by an embodiment of the present application.
图2为本申请实施例提供的退出儿童模式方法的场景示意图。Figure 2 is a schematic diagram of a scenario of a method for exiting the child mode provided by an embodiment of the present application.
图3是本申请实施例提供的退出儿童模式方法的第二种流程示意图。FIG. 3 is a second flowchart of a method for exiting child mode provided by an embodiment of the present application.
图4为本申请实施例提供的退出儿童模式的方法的第三流程示意图。FIG. 4 is a third flowchart of a method for exiting child mode provided by an embodiment of the present application.
图5为本申请实施例提供的退出儿童模式的装置的第一种结构示意图。FIG. 5 is a first structural schematic diagram of a device for exiting child mode provided by an embodiment of the present application.
图6为本申请实施例提供的退出儿童模式的装置的第二种结构示意图。FIG. 6 is a second structural schematic diagram of a device for exiting child mode provided by an embodiment of the present application.
图7为本申请实施例提供的电子设备的第一种结构示意图。FIG. 7 is a first structural schematic diagram of an electronic device provided by an embodiment of the present application.
图8为本申请实施例提供的电子设备的第二种结构示意图。FIG. 8 is a second structural schematic diagram of an electronic device provided by an embodiment of the present application.
具体实施方式Detailed ways
请参照图示,其中相同的组件符号代表相同的组件,本申请的原理是以实施在一适当的运算环境中来举例说明。以下的说明是基于所例示的本申请具体实施例,其不应被视为限制本申请未在此详述的其它具体实施例。Please refer to the figures, in which the same component symbols represent the same components, and the principles of the present application are exemplified by implementation in a suitable computing environment. The following description is based on the illustrated specific embodiments of the present application, and should not be regarded as limiting other specific embodiments of the present application that are not described in detail here.
请参阅图1,图1是本申请实施例提供的退出儿童模式方法的第一种流程示意图。本申请实施例提供一种退出儿童模式的方法,应用于第一电子设备,退出儿童模式的方法该可以包括以下步骤:Please refer to FIG. 1 , which is a schematic flowchart of a first method for exiting the child mode provided by an embodiment of the present application. An embodiment of the present application provides a method for exiting the child mode, which is applied to a first electronic device. The method for exiting the child mode may include the following steps:
在101中,接收退出儿童模式的请求信息,儿童模式为第一电子设备适合儿童使用的工作模式;In 101, a request message to exit the child mode is received. The child mode is a working mode of the first electronic device suitable for use by children;
在102中,基于请求信息,向第二电子设备发送询问信息,询问信息用于询问用户是否同意退出儿童模式;In 102, based on the request information, send query information to the second electronic device, where the query information is used to ask the user whether to agree to exit the child mode;
在103中,接收第二电子设备的反馈信息,反馈信息包括同意退出儿童模式或不同意退出儿童模式;In 103, feedback information from the second electronic device is received, and the feedback information includes consent to exit the child mode or disagreement to exit the child mode;
在104中,若反馈信息为同意退出儿童模式,则第一电子设备退出儿童模式。In 104, if the feedback information indicates consent to exit the child mode, the first electronic device exits the child mode.
随着技术的发展,电子设备比如智能手机的功能越来越丰富,越来越多的用户包括儿童也开始接触智能手机,儿童身心发展尚未成熟,为了使电子设备能够适应儿童身心发展的需求,因此在电子设备中开发了区别于正常模式的儿童模式,家长可以预先设置在儿童模式下儿童可以访问的应用程序范围、使用时长等,从而对儿童使用电子设备进行一定限制约束。比如,在儿童模式下儿童可以使用家长预先设置的允许访问的应用程序进行比如看视频、听音频、看照片、玩游戏、阅读等适合儿童的操作,但是不能使用家长限制访问的应用程序,比如网络购物应用、聊天软件、邮件应用、工作软件等,从而使得在儿童模式下,电子设备既能满足儿童适当的需求,又避免儿童进行不适当的操作,比如进行支付购物、误删或改变数据等操作。With the development of technology, electronic devices such as smartphones are becoming more and more functional. More and more users, including children, are beginning to be exposed to smartphones. Children's physical and mental development is not yet mature. In order to make electronic devices adapt to the needs of children's physical and mental development, Therefore, a child mode that is different from the normal mode has been developed in electronic devices. Parents can pre-set the range of applications that children can access in child mode, the duration of use, etc., thereby imposing certain restrictions on children's use of electronic devices. For example, in child mode, children can use applications that parents have preset to allow access to perform operations suitable for children, such as watching videos, listening to audio, viewing photos, playing games, reading, etc., but they cannot use applications that parents have restricted access to, such as Online shopping applications, chat software, email applications, work software, etc., so that in children's mode, electronic devices can not only meet the appropriate needs of children, but also prevent children from performing inappropriate operations, such as paying for purchases, accidentally deleting or changing data Wait for operations.
相关技术中,家长在对儿童模式初始化设置时,一般需要设置密码,该密码可以为电子设备的锁屏密码,也可以为专门设置的密码,在以后每次可以通过输入该密码退出儿童模式,由于很多儿童知道密码,可以在家长不知情的情况下,轻易自行主动退出儿童模式,因此通过儿童模式对儿童使用电子设备进行限制约束的效果较差。In related technologies, when parents initialize settings for the child mode, they generally need to set a password. The password can be the lock screen password of the electronic device, or it can be a specially set password. In the future, the child mode can be exited by entering the password each time. Since many children know the password and can easily exit the children's mode without their parents' knowledge, the child mode is less effective in restricting children's use of electronic devices.
本申请实施例公开一种创新的退出儿童模式的方法,家长在对儿童模式初始化设置时,可以选择通过第二电子设备辅助确认是否退出儿童模式,第二电子设备可以区别于第一电子设备以外的另一个电子设备,第一电子设备和第二电子设备比如可以为智能手机、智能手表、平板电脑、掌上电脑、笔记本电脑、或者台式电脑等电子设备。本申请实施例不对第一电子设备、第二电子设备进行限制,第一电子设备和第二电子设备只要具备芯片安全存储、系统安全特性等方面的能力即可,其中,第一电子设备和第二电子设备可以为同一类型的设备,也可以为不同类型的设备。The embodiment of the present application discloses an innovative method for exiting the child mode. When initializing the setting of the child mode, parents can choose to use a second electronic device to assist in confirming whether to exit the child mode. The second electronic device can be different from the first electronic device. The other electronic device, the first electronic device and the second electronic device may be, for example, a smartphone, a smart watch, a tablet computer, a handheld computer, a notebook computer, or a desktop computer and other electronic devices. The embodiments of the present application do not limit the first electronic device and the second electronic device. The first electronic device and the second electronic device only need to have capabilities in chip secure storage, system security features, etc., wherein the first electronic device and the second electronic device The two electronic devices may be of the same type of equipment or of different types of equipment.
具体的,第一电子设备当前运行在儿童模式,当第一电子设备接收退出儿童模式的请求信息时,会基于请求信息,向第二电子设备发送询问信息,询问信息用于询问用户是否同意退出儿童模式;第二电子设备接收到询问信息后,基于询问信息,向第一电子设备发送反馈信息,反馈信息包括同意退出儿童模式或不同意退出儿童模式;第一电子设备接收到反馈信息,若反馈信息为同意退出儿童模式,则第一电子设备退出儿童模式;若反馈信息为不同意退出儿童模式,则第一电子设备继续工作在儿童模式。Specifically, the first electronic device is currently running in the child mode. When the first electronic device receives the request information to exit the child mode, it will send inquiry information to the second electronic device based on the request information. The inquiry information is used to ask the user whether to agree to exit. Child mode; after receiving the inquiry information, the second electronic device sends feedback information to the first electronic device based on the inquiry information, and the feedback information includes agreeing to exit the child mode or disagreeing to exit the child mode; the first electronic device receives the feedback information, if If the feedback information indicates that the user agrees to exit the child mode, the first electronic device exits the child mode; if the feedback information indicates that the user disagrees with the child mode exit, the first electronic device continues to work in the child mode.
示例性的,请参考图2,图2为本申请实施例提供的退出儿童模式方法的场景示意图,其中,第一电子设备可以为智能手机,第二电子设备可以为智能手表,家长可以在智能手机的设置页面,预先设置智能手机处于儿童模式时,允许儿童访问的应用程序以及允许儿童使用的时间,设置退出儿童模式的方式为:通过智能手表辅助确认,也即通过智能手表确认是否同意智能手机退出儿童模式,并建立智能手机和智能手表之间的通信连接,比如智能手机和智能手表之间可以建立蓝牙连接,进行蓝牙绑定,从而可以进行双方通信。For example, please refer to Figure 2. Figure 2 is a schematic diagram of a scenario for exiting the child mode provided by an embodiment of the present application. The first electronic device can be a smartphone, the second electronic device can be a smart watch, and the parent can On the mobile phone’s settings page, pre-set the applications that children are allowed to access and the time that children are allowed to use when the smartphone is in child mode. The way to exit child mode is to confirm through the smart watch, that is, confirm whether you agree to the smart watch through the smart watch. The mobile phone exits child mode and establishes a communication connection between the smartphone and the smart watch. For example, a Bluetooth connection can be established between the smartphone and the smart watch and Bluetooth binding can be performed, so that both parties can communicate.
当儿童使用智能手机时,切换智能手机工作于儿童模式,儿童可以在家长预先设置允许使用的时间内使用允许访问的应用程序,当允许使用的时间结束或者儿童需要访问不被允许的应用程序时,儿童操作智能手机想要退出儿童模式,智能手机接收到退出儿童模式的请求信息,那么智能手机可以向智能手表发送询问信息,询问信息用于询问用户是否同意退出儿童模式。比如,儿童在使用智能手机,家长佩戴智能手表,当智能手表接收到询问信息时,智能手表可以基于询问信息,向用户展示询问界面,家长可以通过询问界面,了解当前儿童想要退出儿童模式,并对询问界面进行点击操作以选择同意智能手机退出儿童模式或不同意智能手机退出儿童模式,具体的,家长若同意退出儿童模式,则通过智能手表发送同意退出儿童模式的反馈信息至智能手机,智能手机接收到同意退出儿童模式的反馈信息,则退出儿童模式,智能手机工作在正常模式;若家长不同意退出儿童模式,则通过智能手表发送不同意退出儿童模式的反馈信息至智能手机,智能手机接收到不同意退出儿童模式的反馈信息,则保持工作在儿童模式。因此除非儿童也同时获取了智能手表,否则儿童不能在家长不知情的情况下自行退出儿童模式,避免了儿童自行退出儿童模式之后进行了不适当的操作,或者使用过多的时间。需要说明的是,当智能手表接收到询问信息时,也可以通过语音等方式向用户询问用户是否同意智能手机退出儿童模式,家长也可以通过语音来反馈是否同意退出儿童模式,本申请实施例对此不进行限定。When a child uses a smartphone, switch the smartphone to work in child mode. The child can use the apps that are allowed to be accessed within the time that the parents have preset to allow use. When the time that is allowed to use ends or the child needs to access the apps that are not allowed, When a child operates a smartphone and wants to exit the child mode, and the smartphone receives the request message to exit the child mode, the smartphone can send a query message to the smart watch, and the query message is used to ask the user whether he agrees to exit the child mode. For example, a child is using a smartphone and a parent is wearing a smart watch. When the smart watch receives the inquiry information, the smart watch can display an inquiry interface to the user based on the inquiry information. Parents can use the inquiry interface to find out whether the current child wants to exit child mode. Click on the inquiry interface to choose to agree to the smartphone exiting the child mode or to disagree with the smartphone exiting the child mode. Specifically, if the parent agrees to exit the child mode, the parent will send feedback information agreeing to exit the child mode to the smartphone through the smart watch. When the smartphone receives feedback information agreeing to exit the child mode, it exits the child mode and the smartphone works in the normal mode; if the parent does not agree to exit the child mode, the smart watch sends feedback information not agreeing to exit the child mode to the smartphone, and the smart phone If the mobile phone receives the feedback message that it does not agree to exit the child mode, it will continue to work in the child mode. Therefore, unless the child also obtains a smart watch at the same time, the child cannot exit the child mode without the parent's knowledge, thus preventing the child from performing inappropriate operations or using the watch for too long after exiting the child mode. It should be noted that when the smart watch receives the query information, it can also ask the user through voice or other methods whether the user agrees to the smartphone exiting the child mode. Parents can also feedback through voice whether they agree to exit the child mode. The embodiment of this application is This is not limited.
因此本申请实施例中,儿童使用的第一电子设备处于儿童模式,当儿童需要退出儿童模式时,不能通过操作第一电子设备,比如输入密码的方式来退出儿童模式,而是会向家长设置的第二电子设备发送询问信息,正常情况下,家长持有第二电子设备,因此首先家长可以对儿童想要退出儿童模式的事件知情,其次可以由家长确定是否同意退出儿童模式,若家长同意退出儿童模式,则可以控制第二电子设备向第一电子设备返回同意退出儿童模式的反馈信息,第一电子设备接收到同意退出儿童模式的反馈信息,则退出儿童模式,第一电子设备工作在正常模式,若家长不同意退出儿童模式,则可以控制第二电子设备向第一电子设备返回不同意退出儿童模式的反馈信息,第一电子设备接收到不同意退出儿童模式的反馈信息,则保持工作在儿童模式;或者若家长不同意退出儿童模式,也可以不返回反馈信息,那么第一电子设备接收不到同意退出儿童模式的反馈信息,也会保持工作在儿童模式。因此通过采用本申请实施例中退出儿童模式的方式,儿童不会在家长不知情的情况下自行轻易退出儿童模式,避免了儿童自行退出儿童模式之后进行了不适当的操作,或者使用过多的时间,从而能够保证通过儿童模式对儿童使用电子设备的限制约束效果。Therefore, in the embodiment of the present application, the first electronic device used by the child is in the child mode. When the child needs to exit the child mode, he cannot exit the child mode by operating the first electronic device, such as entering a password. Instead, he will ask the parent to set the child mode. The second electronic device sends inquiry information. Under normal circumstances, the parent holds the second electronic device. Therefore, first of all, the parent can be informed of the event that the child wants to exit the child mode. Secondly, the parent can determine whether to agree to exit the child mode. If the parent agrees, To exit the child mode, the second electronic device can be controlled to return feedback information agreeing to exit the child mode to the first electronic device. The first electronic device receives the feedback information agreeing to exit the child mode, then exits the child mode, and the first electronic device works in In normal mode, if the parent does not agree to exit the child mode, the second electronic device can be controlled to return feedback information to the first electronic device indicating that the parent does not agree to exit the child mode. When the first electronic device receives feedback information indicating that the parent does not agree to exit the child mode, it will remain in normal mode. Work in the child mode; or if the parents do not agree to exit the child mode, they do not need to return feedback information. Then the first electronic device does not receive the feedback information agreeing to exit the child mode and will continue to work in the child mode. Therefore, by adopting the method of exiting the child mode in the embodiment of the present application, the children will not easily exit the child mode without the parents' knowledge, thus preventing the children from performing inappropriate operations or using too much after exiting the child mode. time, so as to ensure the effect of restricting children's use of electronic devices through children's mode.
请参阅图3,图3是本申请实施例提供的退出儿童模式方法的第二种流程示意图。应用于第一电子设备。该方法可以包括以下步骤:Please refer to FIG. 3 , which is a second schematic flowchart of a method for exiting the child mode provided by an embodiment of the present application. Applied to first electronic equipment. The method may include the following steps:
在201中,第一电子设备建立与第二电子设备的通信连接。In 201, the first electronic device establishes a communication connection with the second electronic device.
在一种实施方式中,家长可以在第一电子设备的设置页面,预先设置第一电子设备退出儿童模式的方式为允许通过第二电子设备辅助确认是否退出儿童模式。通过选择该方式,当儿童需要退出第一电子设备的儿童模式时,不能仅通过操作第一电子设备退出儿童模式,需要与第二电子设备进行通信连接,由第二电子设备辅助确认是否退出儿童模式。In one implementation, the parent can pre-set the method for the first electronic device to exit the child mode on the setting page of the first electronic device to allow the second electronic device to assist in confirming whether to exit the child mode. By selecting this method, when a child needs to exit the child mode of the first electronic device, he cannot exit the child mode just by operating the first electronic device, but needs to communicate with the second electronic device, and the second electronic device assists in confirming whether to exit the child mode. model.
示例性的,第一电子设备和第二电子设备可以进行蓝牙绑定,从而第一电子设备和第二电子设备可以快速建立蓝牙连接。家长比如可以在第一电子设备的设置页面,设置了允许通过第二电子设备辅助确认是否退出儿童模式,第二电子设备可以加载有对应的应用软件,用户可以通过该应用软件开启辅助确认第一电子设备是否退出儿童模式的功能。For example, the first electronic device and the second electronic device can perform Bluetooth binding, so that the first electronic device and the second electronic device can quickly establish a Bluetooth connection. For example, parents can set on the settings page of the first electronic device to allow the second electronic device to assist in confirming whether to exit the child mode. The second electronic device can be loaded with corresponding application software, and the user can turn on the assistive confirmation through the application software. Whether the electronic device exits the child mode function.
在202中,生成第一随机数,并生成第一临时私钥和对应的第一临时公钥;In 202, generate a first random number, and generate a first temporary private key and a corresponding first temporary public key;
在203中,将第一随机数、第一临时公钥发送给第二电子设备;In 203, send the first random number and the first temporary public key to the second electronic device;
在204中,接收第二电子设备生成的第二随机数、第二临时公钥;In 204, receive the second random number and the second temporary public key generated by the second electronic device;
在205中,基于第一临时私钥和第二临时公钥生成第一共享秘密值,第一共享秘密值与第二电子设备基于第二临时私钥和第一临时公钥生成的第二共享秘密值相同;In 205, a first shared secret value is generated based on the first temporary private key and the second temporary public key, and the first shared secret value is shared with a second shared secret value generated by the second electronic device based on the second temporary private key and the first temporary public key. The secret values are the same;
在206中,基于第一共享秘密值、第一随机数、第二随机数生成对称会话秘钥。In 206, a symmetric session key is generated based on the first shared secret value, the first random number, and the second random number.
第一电子设备和第二电子设备建立通信连接之后,为了使得第一电子设备和第二电子设备之间建立安全信道,防范传递的信息被攻击,因此第一电子设备和第二电子设备基于ECDHE-ECDSA算法生成对称会话密钥。通过该对称会话密钥对双方传递的信息进行加密和解密,提升本申请实施例中退出儿童模式的方法的安全性。After the first electronic device and the second electronic device establish a communication connection, in order to establish a secure channel between the first electronic device and the second electronic device and prevent the transmitted information from being attacked, the first electronic device and the second electronic device use ECDHE -ECDSA algorithm generates symmetric session keys. The symmetric session key is used to encrypt and decrypt the information transmitted by both parties, thereby improving the security of the method for exiting the child mode in the embodiment of the present application.
具体的,第一电子设备运行在儿童模式,每一次第一电子设备接收到退出儿童模式的请求信息,需要与第二电子设备之间进行通信传递信息时,都会生成一个第一随机数,并生成第一临时私钥和对应的第一临时公钥,然后将第一随机数、第一临时公钥发送给第二电子设备;第二电子设备也会生成一个第二随机数,并生成第二临时私钥和对应的第二临时公钥,然后将第二随机数、第二临时公钥发送给第一电子设备。那么第一电子设备会基于第一临时私钥和第二临时公钥生成第一共享秘密值,第二电子设备会基于第二临时私钥和第一临时公钥生成的第二共享秘密值,其中,第一共享秘密值和第二共享秘密值。第一电子设备和第二电子设备基于第一共享秘密值、第一随机数、第二随机数生成对称会话秘钥。由于每一次第一电子设备接收到退出儿童模式的请求信息,通过第二电子设备辅助确认是否退出儿童模式时,第一电子设备和第二电子设备都会分别临时生成一个随机数,并分别生成一对临时公私钥对,进行密钥协商和派生对称会话密钥,通过对称会话密钥对传输的信息进行加解密,也即,每一次退出儿童模式时,第一电子设备和第二电子设备都会生成一个全新的对称会话密钥对本次传输的信息进行加解密,从而可以提高信息传输的安全性,而且可以防范信息重放的攻击,即使攻击者将拦截之前加密的反馈信息传输至第一电子设备,第一电子设备也无法采用当前的对称会话密钥进行解密,不能欺骗第一电子设备退出儿童模式。Specifically, the first electronic device runs in the child mode. Every time the first electronic device receives a request to exit the child mode and needs to communicate with the second electronic device to transfer information, it will generate a first random number, and Generate the first temporary private key and the corresponding first temporary public key, and then send the first random number and the first temporary public key to the second electronic device; the second electronic device will also generate a second random number, and generate a third two temporary private keys and corresponding second temporary public keys, and then send the second random number and the second temporary public key to the first electronic device. Then the first electronic device will generate a first shared secret value based on the first temporary private key and the second temporary public key, and the second electronic device will generate a second shared secret value based on the second temporary private key and the first temporary public key, Among them, the first shared secret value and the second shared secret value. The first electronic device and the second electronic device generate a symmetric session key based on the first shared secret value, the first random number, and the second random number. Since every time the first electronic device receives the request information to exit the child mode and assists in confirming whether to exit the child mode through the second electronic device, the first electronic device and the second electronic device will temporarily generate a random number and generate a random number respectively. Perform key negotiation and derive a symmetric session key for the temporary public and private key pair, and encrypt and decrypt the transmitted information through the symmetric session key. That is, each time the child mode is exited, the first electronic device and the second electronic device will Generate a new symmetric session key to encrypt and decrypt the information transmitted this time, which can improve the security of information transmission and prevent information replay attacks, even if the attacker intercepts the previously encrypted feedback information and transmits it to the first The electronic device, the first electronic device cannot use the current symmetric session key to decrypt, and cannot deceive the first electronic device to exit the child mode.
在一种实施方式中,每一次退出儿童模式,第一电子设备和第二电子设备会传输用于密钥协商的数据,为了确保第一电子设备接收到正确未被篡改的第二电子设备的第二随机数、第二临时公钥,以及第一电子设备能够安全将一随机数、第一临时公钥发送给第二电子设备,因此本申请实施例中会对传输的密钥协商数据进行签名保护。In one implementation, each time the child mode is exited, the first electronic device and the second electronic device will transmit data for key agreement, in order to ensure that the first electronic device receives the correct and untampered key of the second electronic device. The second random number, the second temporary public key, and the first electronic device can safely send a random number and the first temporary public key to the second electronic device. Therefore, in the embodiment of the present application, the transmitted key agreement data will be Signature protection.
具体的,第一电子设备包括第一长期私钥和对应的第一长期公钥,若第一电子设备与第二电子设备第一次生成对称会话密钥,通过第一长期私钥将第一电子设备的第一标识信息、第一临时公钥、第一随机数、第一长期公钥进行签名,得到第一签名值;将第一标识信息、第一临时公钥、第一随机数、第一长期公钥和第一签名值发送第二电子设备,以使第二电子设备通过第一长期公钥对第一签名值进行校验通过之后,确认接收到正确的第一标识信息、第一临时公钥、第一随机数和第一长期公钥,并将第一长期公钥和第一标识信息进行关联和保存;若第一电子设备与第二电子设备第二次及以后生成对称会话密钥,则通过第一长期私钥将第一电子设备的第一标识信息、第一临时公钥、第一随机数进行签名,得到第二签名值;将第一标识信息、第一临时公钥、第一随机数和第二签名值发送第二电子设备,以使第二电子设备根据接收到的第一标识信息获取第一长期公钥,并通过第一长期公钥对第二签名值进行校验通过之后,确认接收到正确的第一电子设备的第一临时公钥、第一随机数。Specifically, the first electronic device includes a first long-term private key and a corresponding first long-term public key. If the first electronic device and the second electronic device generate a symmetric session key for the first time, the first long-term private key is used to convert the first electronic device to the second electronic device. Sign the first identification information, the first temporary public key, the first random number, and the first long-term public key of the electronic device to obtain the first signature value; combine the first identification information, the first temporary public key, the first random number, The first long-term public key and the first signature value are sent to the second electronic device, so that after the second electronic device passes the verification of the first signature value through the first long-term public key, it confirms receipt of the correct first identification information and the first signature value. A temporary public key, a first random number and a first long-term public key, and associate and save the first long-term public key with the first identification information; if the first electronic device and the second electronic device generate symmetry for the second and subsequent times session key, then use the first long-term private key to sign the first identification information, the first temporary public key, and the first random number of the first electronic device to obtain the second signature value; use the first identification information, the first temporary The public key, the first random number and the second signature value are sent to the second electronic device, so that the second electronic device obtains the first long-term public key according to the received first identification information, and signs the second signature through the first long-term public key After the value is verified and passed, it is confirmed that the correct first temporary public key and first random number of the first electronic device have been received.
在一种实施方式中,若第一电子设备与第二电子设备第一次生成对称会话密钥,接收第二电子设备发送的第二电子设备的第二标识信息、第二临时公钥、第二随机数、第二长期公钥和第三签名值,第三签名值为第二电子设备通过第二长期私钥将第二标识信息、第二临时公钥、第二随机数、第二长期公钥进行签名得到;通过第二长期公钥对第三签名值进行校验通过之后,确定接收到正确的第二标识信息、第二临时公钥、第二随机数和第二长期公钥,并将第二长期公钥和第二标识信息进行关联和保存;若第一电子设备与第二电子设备第二次及以后生成对称会话密钥,接收第二电子设备发送的第二电子设备的第二标识信息、第二临时公钥、第二随机数和第四签名值,第四签名值为第二电子设备通过第二长期私钥将第二标识信息、第二临时公钥、第二随机数进行签名得到;通过第二长期公钥对第四签名值进行校验通过之后,确定接收到正确的第二标识信息、第二临时公钥和第二随机数。In one implementation, if the first electronic device and the second electronic device generate a symmetric session key for the first time, the second electronic device receives the second identification information, the second temporary public key, and the second electronic device sent by the second electronic device. two random numbers, a second long-term public key and a third signature value. The third signature value is the second identification information, the second temporary public key, the second random number, the second long-term private key used by the second electronic device through the second long-term private key. The public key is obtained for signature; after the third signature value is verified through the second long-term public key, it is determined that the correct second identification information, the second temporary public key, the second random number and the second long-term public key are received. And associate and save the second long-term public key and the second identification information; if the first electronic device and the second electronic device generate a symmetric session key for the second time and later, receive the second electronic device's key sent by the second electronic device. The second identification information, the second temporary public key, the second random number and the fourth signature value. The fourth signature value is the second identification information, the second temporary public key, the second signature value that the second electronic device uses through the second long-term private key. The random number is obtained by signing; after the fourth signature value is verified through the second long-term public key, it is determined that the correct second identification information, the second temporary public key and the second random number have been received.
示例性的,第一电子设备比如为智能手机,智能手机包括标识信息比如为ID_A,智能手机还包括一对长期的公私钥对,比如,智能手机的第一长期私钥为phoneLTSK,第一长期公钥为phoneLTPK,第二电子设备比如为智能手表,智能手表也包括标识信息比如为ID_B,智能手表也包括一对长期的公私钥对,比如智能手表的第二长期私钥为watchLTSK,第二长期公钥为watchLTPK。For example, the first electronic device is a smart phone, and the smart phone includes identification information such as ID_A. The smart phone also includes a pair of long-term public and private keys. For example, the first long-term private key of the smart phone is phoneLTSK, and the first long-term private key is phoneLTSK. The public key is phoneLTPK. The second electronic device is, for example, a smart watch. The smart watch also includes identification information, such as ID_B. The smart watch also includes a long-term public and private key pair. For example, the second long-term private key of the smart watch is watchLTSK. The second The long-term public key is watchLTPK.
一方面,若智能手机和智能手机第一次进行初始化绑定,比如家长在智能手机中设置了允许通过智能手表辅助确认是否退出儿童模式之后,智能手机第一次接收到退出儿童模式的请求信息,智能手机和智能手表第一次进行密钥协商,以生成对称密钥时,智能手机生成第一随机数RA_1,并生成第一临时私钥phoneSTSK_1和对应的第一临时公钥phoneSTPK_1,通过phoneLTSK对{ID_A、phoneSTPK_1、RA_1、phoneLTPK}进行签名,得到第一签名值Sig_phone_1,并将{ID_A、phoneSTPK_1、RA_1、phoneLTPK、Sig_phone_1}发送给智能手表,智能手表接收到智能手机发送的{ID_A、phoneSTPK_1、RA_1、phoneLTPK、Sig_phone_1}之后,会通过接收到的phoneLTPK对Sig_phone_1进行完整性校验,若验证通过,则说明本次接收到的{ID_A、phoneSTPK_1、RA_1、phoneLTPK}为未经篡改,正确可靠的数据,并将ID_A和phoneLTPK进行关联和保存。On the one hand, if the smart phone and the smart phone are initialized and bound for the first time, for example, after the parent sets up the smart watch to allow the smart watch to assist in confirming whether to exit the child mode, the smart phone receives the request information to exit the child mode for the first time. , when the smartphone and the smartwatch perform key negotiation for the first time to generate a symmetric key, the smartphone generates the first random number RA_1, and generates the first temporary private key phoneSTSK_1 and the corresponding first temporary public key phoneSTPK_1, through phoneLTSK Sign {ID_A, phoneSTPK_1, RA_1, phoneLTPK} to obtain the first signature value Sig_phone_1, and send {ID_A, phoneSTPK_1, RA_1, phoneLTPK, Sig_phone_1} to the smart watch. The smart watch receives {ID_A, phoneSTPK_1 sent by the smart phone. , RA_1, phoneLTPK, Sig_phone_1}, the integrity check of Sig_phone_1 will be performed through the received phoneLTPK. If the verification passes, it means that the {ID_A, phoneSTPK_1, RA_1, phoneLTPK} received this time has not been tampered with, is correct and reliable data, and associate and save ID_A with phoneLTPK.
若智能手机和智能手表第二次及以后生成对称会话密钥,也即,智能手机和智能手表不是第一次进行密钥协商了,之前已经进行了密钥协商,同样,智能手机会再次生成另一第一随机数RA_2,并生成另一第一临时私钥phoneSTSK_2和对应的第一临时公钥phoneSTPK_2,智能手机通过phoneLTSK对{ID_A、phoneSTPK_2、RA_2}进行签名,得到第二签名值Sig_phone_2,并将{ID_A、phoneSTPK_2、RA_2、Sig_phone_2}发送给智能手表,需要说明的是,由于智能手表中已经保存有智能手机的ID_A和对应的phoneLTPK,因此在之后密钥协商过程中,智能手机不再需要将phoneLTPK发送给智能手表,智能手表只需要通过接收到的ID_A获取对应的phoneLTPK,然后通过获取的phoneLTPK对Sig_phone_2进行完整性校验,若验证通过,则说明智能手表本次接收到的{ID_A、phoneSTPK_2、RA_2}为未经篡改,正确可靠的数据。If the smartphone and the smartwatch generate a symmetric session key for the second time and thereafter, that is, it is not the first time that the smartphone and the smartwatch perform key negotiation, but they have already performed key negotiation before. Likewise, the smartphone will generate the key again. Another first random number RA_2, and generate another first temporary private key phoneSTSK_2 and the corresponding first temporary public key phoneSTPK_2. The smartphone signs {ID_A, phoneSTPK_2, RA_2} through phoneLTSK to obtain the second signature value Sig_phone_2, And send {ID_A, phoneSTPK_2, RA_2, Sig_phone_2} to the smart watch. It should be noted that since the smart watch has already saved the ID_A of the smart phone and the corresponding phoneLTPK, the smart phone will no longer The phoneLTPK needs to be sent to the smart watch. The smart watch only needs to obtain the corresponding phoneLTPK through the received ID_A, and then perform integrity verification on Sig_phone_2 through the obtained phoneLTPK. If the verification passes, it means that the {ID_A received by the smart watch this time , phoneSTPK_2, RA_2} are correct and reliable data that have not been tampered with.
另一方面,若智能手机和智能手表第一次进行密钥协商,生成对称密钥时,智能手表也会生成第二随机数RB_1,并生成第二临时私钥watchSTSK_1和对应的第二临时公钥watchSTPK_1,通过watchLTSK对{ID_B、watchSTPK_1、RB_1、watchLTPK}进行签名,得到第三签名值Sig_watch_1,并将{ID_B、watchSTPK_1、RB_1、watchLTPK、Sig_watch_1}发送给智能手机,因此智能手机可以接收到智能手表发送的{ID_B、watchSTPK_1、RB_1、watchLTPK、Sig_watch_1},智能手机可以通过接收到的watchLTPK对Sig_watch_1进行完整性校验,若验证通过,则说明本次接收到的{ID_B、watchSTPK_1、RB_1、watchLTPK}为未经篡改,正确可靠的数据,并将ID_B和watchLTPK进行关联和保存。On the other hand, if the smart phone and the smart watch perform key negotiation for the first time and generate a symmetric key, the smart watch will also generate the second random number RB_1, and generate the second temporary private key watchSTSK_1 and the corresponding second temporary public key. key watchSTPK_1, sign {ID_B, watchSTPK_1, RB_1, watchLTPK} through watchLTSK to obtain the third signature value Sig_watch_1, and send {ID_B, watchSTPK_1, RB_1, watchLTPK, Sig_watch_1} to the smartphone, so the smartphone can receive the smart phone {ID_B, watchSTPK_1, RB_1, watchLTPK, Sig_watch_1} sent by the watch, the smartphone can perform integrity verification on Sig_watch_1 through the received watchLTPK. If the verification passes, it means that the {ID_B, watchSTPK_1, RB_1, watchLTPK received this time } is untampered, correct and reliable data, and associates and saves ID_B and watchLTPK.
若智能手机和智能手表第二次及以后生成对称会话密钥,也即,智能手机和智能手表不是第一次进行密钥协商了,之前已经进行了密钥协商,同样,智能手表也会再次生成另一第二随机数RB_2,并生成另一第二临时私钥watchSTSK_2和对应的第二临时公钥watchSTPK_2,智能手表通过watchLTSK对{ID_B、watchSTPK_2、RB_2}进行签名,得到第二签名值Sig_watch_2,并将{ID_B、watchSTPK_2、RB_2、Sig_watch_2}发送给智能手表,需要说明的是,由于智能手机中以及保存了智能手表的ID_B和对应的watchLTPK,因此在之后密钥协商过程中,智能手机不再需要将watchLTPK发送给智能手表,智能手表只需要通过接收到的ID_B获取对应的watchLTPK,然后通过获取的watchLTPK对Sig_watch_2进行完整性校验,若验证通过,则说明本次接收到的{ID_B、watchSTPK_2、RB_2}为未经篡改,正确可靠的数据。If the smartphone and the smart watch generate a symmetric session key for the second time and thereafter, that is, the smartphone and the smart watch do not perform key negotiation for the first time, but have already performed key negotiation before. Similarly, the smart watch will also perform key negotiation again. Generate another second random number RB_2, and generate another second temporary private key watchSTSK_2 and the corresponding second temporary public key watchSTPK_2. The smart watch signs {ID_B, watchSTPK_2, RB_2} through watchLTSK to obtain the second signature value Sig_watch_2 , and sends {ID_B, watchSTPK_2, RB_2, Sig_watch_2} to the smart watch. It should be noted that since the smart watch’s ID_B and the corresponding watchLTPK are saved in the smart phone, the smart phone will not Then the watchLTPK needs to be sent to the smart watch. The smart watch only needs to obtain the corresponding watchLTPK through the received ID_B, and then perform integrity verification on Sig_watch_2 through the obtained watchLTPK. If the verification passes, it means that the {ID_B, watchSTPK_2, RB_2} are correct and reliable data that have not been tampered with.
因此,当智能手机和智能手表第一次生成对称会话密钥时,基于智能手机确定接收到正确的{ID_B、watchSTPK_1、RB_1、watchLTPK},智能手表确定接收到正确的{ID_A、phoneSTPK_1、RA_1、phoneLTPK},那么智能手机可以基于自身的phoneSTSK_1和智能手表端的watchSTPK_1生成第一共享秘密值;智能手表可以基于自身的watchSTSK_1和智能手机端的phoneSTPK_1生成第二共享秘密值。当智能手机和智能手表第二次及以后生成对称会话密钥时,基于智能手机确定接收到正确的{ID_B、watchSTPK_2、RB_2},智能手表确定接收到正确的{ID_A、phoneSTPK_2、RA_2},那么智能手机可以基于自身的phoneSTSK_2和智能手表端的watchSTPK_2生成第一共享秘密值;智能手表可以基于自身的watchSTSK_2和智能手机端的phoneSTPK_2生成第二共享秘密值,其中,第一共享秘密值和第二共享秘密值相同,从而智能手机和智能手表端基于第一共享秘密值(第二共享秘密值)、第一随机数、第二随机数能够生成对称会话密钥,通过对称会话密钥对传输的通信数据进行加解密,保证传输信息的安全性。而且,本申请实施例中智能手机和只能手表之间可以建立安全信道,通过将对端的标识信息与对应的长期密钥进行关联保存,在每一次请求退出儿童模式,采用对应的长期密钥进行签名检验,双向验证对端的身份信息,可防范恶意设备的身份仿冒攻击。Therefore, when the smartphone and smartwatch first generate a symmetric session key, the smartwatch determines that it has received the correct {ID_B, watchSTPK_1, RB_1, watchLTPK}, and the smartwatch determines that it has received the correct {ID_A, phoneSTPK_1, RA_1, phoneLTPK}, then the smartphone can generate the first shared secret value based on its own phoneSTSK_1 and the smartwatch's watchSTPK_1; the smartwatch can generate the second shared secret value based on its own watchSTSK_1 and the smartphone's phoneSTPK_1. When the smartphone and the smartwatch generate a symmetric session key for the second and subsequent times, based on the smartphone determining to receive the correct {ID_B, watchSTPK_2, RB_2} and the smartwatch determining to receiving the correct {ID_A, phoneSTPK_2, RA_2}, then The smart phone can generate the first shared secret value based on its own phoneSTSK_2 and the watchSTPK_2 on the smart watch side; the smart watch can generate the second shared secret value based on its own watchSTSK_2 and the phoneSTPK_2 on the smart phone side, where the first shared secret value and the second shared secret value The values are the same, so that the smart phone and the smart watch can generate a symmetric session key based on the first shared secret value (the second shared secret value), the first random number, and the second random number, and the communication data transmitted through the symmetric session key pair Encrypt and decrypt to ensure the security of transmitted information. Moreover, in the embodiment of the present application, a secure channel can be established between the smart phone and the smart watch. By associating and storing the identification information of the peer with the corresponding long-term key, each time a request is made to exit the child mode, the corresponding long-term key is used. Perform signature verification and bidirectionally verify the peer's identity information to prevent identity spoofing attacks from malicious devices.
在一种实施方式中,在第一电子设备与第二电子设备第一次生成对称会话密钥时,为了进一步确保第一电子设备安全将第一长期公钥发送给第二电子设备,第一电子设备还可以包括第一ECC公钥证书,第一ECC公钥证书中包括第一长期公钥,也即,第一电子设备可以将第一长期公钥直接发送给第二电子设备,也可以将第一长期公钥以第一ECC公钥证书的形式发送给第二电子设备,其中,以第一ECC公钥证书的形式发送给第二电子设备,使得第二电子设备接收到第一ECC公钥证书时,能够通过业界标准的校验流程去检验第一ECC公钥证书,证明当前第一ECC公钥证书是从一个合法来源签发的,比如合法的网点签发,而不是来自一个不合法的来源,从而可以辅助证实第一ECC公钥证书中的第一长期公钥是未经篡改的。In one implementation, when the first electronic device and the second electronic device generate a symmetric session key for the first time, in order to further ensure the security of the first electronic device, the first long-term public key is sent to the second electronic device. The electronic device may also include a first ECC public key certificate, and the first ECC public key certificate includes the first long-term public key. That is, the first electronic device may directly send the first long-term public key to the second electronic device, or it may The first long-term public key is sent to the second electronic device in the form of the first ECC public key certificate, wherein the first long-term public key is sent to the second electronic device in the form of the first ECC public key certificate, so that the second electronic device receives the first ECC When issuing a public key certificate, the first ECC public key certificate can be verified through the industry standard verification process to prove that the current first ECC public key certificate was issued from a legal source, such as a legal outlet, and not from an illegal one. The source of the certificate can assist in verifying that the first long-term public key in the first ECC public key certificate has not been tampered with.
同理,第二电子设备也可以包括第二ECC公钥证书,第二ECC公钥证书中包括第二长期公钥,也即,第二电子设备可以将第二长期公钥直接发送给第一电子设备,也可以将第二长期公钥以第二ECC公钥证书的形式发送给第一电子设备,第一电子设备接收到第二ECC公钥证书时,能够通过业界标准的校验流程去检验第二ECC公钥证书,证明当前第二ECC公钥证书是从一个合法来源签发的,比如合法的网点签发,而不是来自一个不合法的来源,从而可以辅助证实第二ECC公钥证书中的第二长期公钥是未经篡改的。Similarly, the second electronic device may also include a second ECC public key certificate, and the second ECC public key certificate may include a second long-term public key. That is, the second electronic device may directly send the second long-term public key to the first The electronic device can also send the second long-term public key to the first electronic device in the form of a second ECC public key certificate. When the first electronic device receives the second ECC public key certificate, it can pass the industry standard verification process. Verify the second ECC public key certificate to prove that the current second ECC public key certificate was issued from a legal source, such as a legal outlet, and not from an illegal source, which can assist in verifying the content of the second ECC public key certificate. The second long-term public key is untampered with.
具体的,一方面,若第一电子设备与第二电子设备第一次生成对称会话密钥,通过第一长期私钥将第一电子设备的第一标识信息、第一临时公钥、第一随机数、第一ECC公钥证书进行签名,得到第一签名值;将第一电子设备的第一标识信息、第一临时公钥、第一随机数、第一ECC公钥证书和第一签名值发送第二电子设备,以使第二电子设备验证第一ECC公钥证书有效,并通过第一ECC公钥证书中的第一长期公钥对第一签名值进行完整性校验通过之后,确定接收到的第一标识信息、第一临时公钥、第一随机数和第一ECC公钥证书正确,并将第一ECC公钥证书和第一标识信息进行关联并保存。若第一电子设备与第二电子设备第二次及以后生成对称会话密钥,则通过第一长期私钥将第一电子设备的第一标识信息、第一临时公钥、第一随机数进行签名,得到第二签名值;将第一电子设备的第一标识信息、第一临时公钥、第一随机数和第二签名值发送第二电子设备,以使第二电子设备根据接收到的第一标识信息获取第一ECC公钥证书,并通过第一ECC公钥证书中的第一长期公钥对第二签名值进行完整性校验通过之后,确定接收到正确的第一电子设备的第一临时公钥、第一随机数。Specifically, on the one hand, if the first electronic device and the second electronic device generate a symmetric session key for the first time, the first identification information of the first electronic device, the first temporary public key, the first Sign the random number and the first ECC public key certificate to obtain the first signature value; combine the first identification information of the first electronic device, the first temporary public key, the first random number, the first ECC public key certificate and the first signature. The value is sent to the second electronic device, so that the second electronic device verifies that the first ECC public key certificate is valid, and after the integrity check of the first signature value passes through the first long-term public key in the first ECC public key certificate, Determine that the received first identification information, first temporary public key, first random number and first ECC public key certificate are correct, and associate and save the first ECC public key certificate and the first identification information. If the first electronic device and the second electronic device generate a symmetric session key for the second and subsequent times, the first identification information of the first electronic device, the first temporary public key, and the first random number are processed through the first long-term private key. Sign to obtain the second signature value; send the first identification information, the first temporary public key, the first random number and the second signature value of the first electronic device to the second electronic device, so that the second electronic device can obtain the second signature value according to the received signature. The first identification information obtains the first ECC public key certificate, and after the integrity check of the second signature value passes through the first long-term public key in the first ECC public key certificate, it is determined that the correct first electronic device has been received. The first temporary public key and the first random number.
另一方面,若第一电子设备与第二电子设备第一次生成对称会话密钥,接收第二电子设备发送的第二电子设备的第二标识信息、第二临时公钥、第二随机数、第二ECC公钥证书和第三签名值,第三签名值为第二电子设备通过第二长期私钥将第二标识信息、第二临时公钥、第二随机数、第二ECC公钥证书进行签名得到;通过验证第二ECC公钥证书有效,并通过第二长期公钥对第三签名值进行校验通过之后,确定接收到正确的第二标识信息、第二临时公钥、第二随机数和第二ECC公钥证书,并将第二ECC公钥证书和第二标识信息进行关联和保存;若第一电子设备与第二电子设备第二次及以后生成对称会话密钥,接收第二电子设备发送的第二标识信息、第二临时公钥、第二随机数和第四签名值,第四签名值为第二电子设备通过第二长期私钥将第二标识信息、第二临时公钥、第二随机数进行签名得到;根据接收到的第二标识信息获取第二ECC公钥证书,并通过第二ECC公钥证书中的第二长期公钥对第四签名值进行完整性校验通过之后,确定接收到正确的第二标识信息、第二临时公钥、第二随机数。On the other hand, if the first electronic device and the second electronic device generate a symmetric session key for the first time, receive the second identification information, the second temporary public key, and the second random number of the second electronic device sent by the second electronic device. , the second ECC public key certificate and the third signature value. The third signature value is the second identification information, the second temporary public key, the second random number, and the second ECC public key that the second electronic device uses through the second long-term private key. The certificate is obtained by signing; by verifying that the second ECC public key certificate is valid and verifying the third signature value through the second long-term public key, it is determined that the correct second identification information, the second temporary public key, and the third signature value have been received. 2 random numbers and the second ECC public key certificate, and associate and save the second ECC public key certificate and the second identification information; if the first electronic device and the second electronic device generate a symmetric session key for the second and subsequent times, Receive the second identification information, the second temporary public key, the second random number and the fourth signature value sent by the second electronic device. The fourth signature value is the second identification information, the second signature value sent by the second electronic device through the second long-term private key. The second temporary public key and the second random number are obtained by signing; the second ECC public key certificate is obtained according to the received second identification information, and the fourth signature value is processed through the second long-term public key in the second ECC public key certificate. After the integrity check passes, it is determined that the correct second identification information, the second temporary public key, and the second random number have been received.
需要说明的是,本申请实施例中第一电子设备的第一长期公钥、第二电子设备的第二长期公钥也可以使用其他类型证书进行传递,比如,还可以为ESA证书,那么可以采用采用ECDHE-RSA算法进行密钥协商。若第一电子设备的第一长期公钥、第二电子设备的第二长期公钥不采用证书传输,也可以在初始化阶段随机生成交换双方的长期公钥,当需要生成对称会话密钥时,可以采用采用ECDHE-ECDSA算法进行密钥协商。It should be noted that in the embodiment of this application, the first long-term public key of the first electronic device and the second long-term public key of the second electronic device can also be transferred using other types of certificates, for example, they can also be ESA certificates, then it can The ECDHE-RSA algorithm is used for key negotiation. If the first long-term public key of the first electronic device and the second long-term public key of the second electronic device do not use certificate transmission, the long-term public keys of both exchange parties can also be randomly generated during the initialization phase. When it is necessary to generate a symmetric session key, The ECDHE-ECDSA algorithm can be used for key negotiation.
在一种实施方式中,第一电子设备在与第二电子设备基于ECDHE-ECDSA算法生成对称会话密钥时,第一电子设备还可以将相应的第一时间信息发送给第二电子设备,从而第二电子设备可以基于该第一时间信息判断当前接收到的数据是否有效;和/或,第二电子设备也可以将相应的第二时间信息发送给第一电子设备,从而第一电子设备可以基于该第二时间信息判断当前接收到的数据是否有效。In one implementation, when the first electronic device generates a symmetric session key with the second electronic device based on the ECDHE-ECDSA algorithm, the first electronic device may also send the corresponding first time information to the second electronic device, so that The second electronic device can determine whether the currently received data is valid based on the first time information; and/or the second electronic device can also send the corresponding second time information to the first electronic device, so that the first electronic device can Determine whether the currently received data is valid based on the second time information.
具体的,将第一随机数、第一时间信息、第一临时公钥发送给第二电子设备,以使第二电子设备判断若第一时间信息处于预设时间范围内,则基于第二临时私钥和第一临时公钥生成的第二共享秘密值;和/或接收第二电子设备生成的第二随机数、第二时间信息、第二临时公钥;若第二时间信息处于预设时间范围内,则基于第一临时私钥和第二临时公钥生成第一共享秘密值。Specifically, the first random number, the first time information, and the first temporary public key are sent to the second electronic device, so that the second electronic device determines that if the first time information is within the preset time range, then based on the second temporary The second shared secret value generated by the private key and the first temporary public key; and/or receiving the second random number, the second time information, and the second temporary public key generated by the second electronic device; if the second time information is in the preset Within the time range, a first shared secret value is generated based on the first temporary private key and the second temporary public key.
可以理解的,当第一电子设备接收到退出儿童模式的请求信息时,第一电子设备会及时地与第二电子设备进行密钥协商,因此第二电子设备接收到的用于密钥协商的数据,比如第一随机数和第一临时公钥,其对应的第一时间信息应当与当前时间信息是处于一个合理的时间差范围内,也即处于预设时间范围内,若第一时间信息与当前时间信息差距过大,则第二电子设备可以认为当前接收到的是不合理的密钥协商的数据,因此第二电子设备不会基于第二临时私钥和第一临时公钥生成的第二共享秘密值,从而不会生成对称会话密钥;同理,第二电子设备接收到第一电子设备发送的用于密钥协商的数据,也会及时将自身用于密钥协商的数据返回给第一电子设备,因此第一电子设备接收到用于密钥协商的数据比如第二随机数和第二临时公钥,其及对应的第二时间信息也应当与当前时间信息处于一个合理的时间差范围内,也即处于预设时间范围内,若第二时间信息与当前时间信息差距过大,则第一电子设备也可以认为当前接收到的是不合理的密钥协商的数据,因此第一电子设备也不会基于第一临时私钥和第二临时公钥生成的第一共享秘密值,从而也不会生成对称会话密钥。因此本申请实施例能够防止攻击者拦截之前的密钥协商数据,然后过一段时间后再发送,欺骗第一电子设备和第二电子设备生成对称会话密钥以加解密通信信息,避免重放攻击,提升本申请退出儿童模式方法的安全性。It can be understood that when the first electronic device receives the request information to exit the child mode, the first electronic device will promptly perform key negotiation with the second electronic device. Therefore, the second electronic device receives the key negotiation information for key negotiation. Data, such as the first random number and the first temporary public key, the corresponding first time information should be within a reasonable time difference range from the current time information, that is, within the preset time range. If the first time information is different from the current time information, If the current time information gap is too large, the second electronic device may consider that the currently received data is unreasonable key negotiation data, so the second electronic device will not generate the third temporary private key based on the second temporary private key and the first temporary public key. The two share the secret value, so that a symmetric session key will not be generated; similarly, when the second electronic device receives the data used for key negotiation sent by the first electronic device, it will also return its own data used for key negotiation in a timely manner. to the first electronic device, so the first electronic device receives the data used for key negotiation such as the second random number and the second temporary public key, and its corresponding second time information should also be in a reasonable position with the current time information. Within the time difference range, that is, within the preset time range, if the difference between the second time information and the current time information is too large, the first electronic device may also consider that the currently received data is unreasonable key negotiation data, so the first electronic device may An electronic device will not generate a first shared secret value based on the first temporary private key and the second temporary public key, and thus will not generate a symmetric session key. Therefore, the embodiment of the present application can prevent an attacker from intercepting the previous key negotiation data and then sending it again after a period of time, deceiving the first electronic device and the second electronic device to generate a symmetric session key to encrypt and decrypt the communication information, and avoid replay attacks. , to improve the security of this application’s method of exiting child mode.
示例性的,第一时间信息和第二时间信息也可以为时间戳信息,可以理解的,第一电子设备每一次接收到第二电子设备发送的用于密钥协商的数据,其对应的时间戳信息都是递增的,若第一电子设备接收到第二电子设备用于密钥协商的数据的时间戳信息发生倒退,那么第一电子设备可以认为本次接收到的用于密钥协商的数据是无效的,是不合理的。同理,第二电子设备每一次接收到第一电子设备发送的用于密钥协商的数据,其对应的时间戳信息也都是递增的,若第二电子设备接收到第一电子设备用于密钥协商的数据的时间戳信息发生倒退,那么第二电子设备也可以认为本次接收到的用于密钥协商的数据是无效的,是不合理的。从而避免重放攻击,不能欺骗第一电子设备退出儿童模式。For example, the first time information and the second time information may also be timestamp information. It can be understood that each time the first electronic device receives the data used for key negotiation sent by the second electronic device, the corresponding time The stamp information is incremental. If the first electronic device receives the timestamp information of the data used for key negotiation by the second electronic device and goes backwards, then the first electronic device can consider that the time stamp information used for key negotiation received this time. The data is invalid and unreasonable. In the same way, every time the second electronic device receives the data used for key negotiation sent by the first electronic device, its corresponding timestamp information is also incremented. If the second electronic device receives the data used by the first electronic device for key negotiation, If the timestamp information of the key negotiation data is regressed, the second electronic device may also consider that the data used for key negotiation received this time is invalid and unreasonable. Thus, replay attacks are avoided and the first electronic device cannot be tricked into exiting the child mode.
在一种实施方式中,第一电子设备在与第二电子设备基于ECDHE-ECDSA算法相互发送用于密钥协商的数据时,还可以发一些其它需要的数据,比如可以发送一些需要的业务层面的信息,业务层面的信息比如为:开发者的日志信息等,本申请实施例对此不进行限定。In one implementation, when the first electronic device and the second electronic device send data for key negotiation to each other based on the ECDHE-ECDSA algorithm, they can also send some other required data, for example, they can send some required business level data. Information at the business level is, for example, developer log information, etc., which is not limited in the embodiments of this application.
在207中,通过对称会话秘钥对询问信息进行加密,得到加密的询问信息,并将加密的询问信息发送给第二电子设备;In 207, the query information is encrypted using the symmetric session key to obtain encrypted query information, and the encrypted query information is sent to the second electronic device;
在208中,接收第二电子设备发送的加密的反馈信息,加密的反馈信息为第二电子设备通过对称会话密钥对反馈信息进行加密得到;In 208, receive the encrypted feedback information sent by the second electronic device. The encrypted feedback information is obtained by the second electronic device encrypting the feedback information using the symmetric session key;
在209中,通过对称会话秘钥对加密的反馈信息进行解密,得到反馈信息;In 209, the encrypted feedback information is decrypted using the symmetric session key to obtain the feedback information;
在210中,若反馈信息为同意退出儿童模式,则第一电子设备退出儿童模式。In 210, if the feedback information is consent to exit the child mode, the first electronic device exits the child mode.
第一电子设备和第二电子设备基于ECDHE-ECDSA算法进行密钥协商,生成对称会话密钥之后,可以通过会话密钥对询问信息进行加密,将加密后的询问信息发送给第二电子设备,第二电子设备可以采用会话密钥对加密后的询问信息进行解密,第二电子设备向第一电子设备返回反馈信息时,也可以通过会话密钥对反馈信息进行加密,第一电子设备通过会话密钥对加密后的反馈信息进行解密,从而根据解密后的反馈信息确定第一电子设备是否退出儿童模式,若反馈信息为同意退出儿童模式,则第一电子设备退出儿童模式,进入正常模式,若反馈信息为不同意退出儿童模式,则第一电子设备不退出儿童模式。第一电子设备和第二电子设备通过使用会话密钥对两者之间传输的信息进行加密传输,减少了信息传输途中泄露的可能性,即使攻击者获取了加密后的通信信息,比如加密后的询问请求或加密后的反馈信息,由于没有会话密钥也不能得到询问请求或反馈信息,也不能对询问请求或反馈信息进行恶意篡改,从而提高了信息传输的安全性。The first electronic device and the second electronic device perform key negotiation based on the ECDHE-ECDSA algorithm. After generating a symmetric session key, the query information can be encrypted using the session key, and the encrypted query information can be sent to the second electronic device. The second electronic device can use the session key to decrypt the encrypted query information. When the second electronic device returns feedback information to the first electronic device, it can also encrypt the feedback information using the session key. The first electronic device uses the session key to decrypt the encrypted query information. The key decrypts the encrypted feedback information, thereby determining whether the first electronic device exits the child mode based on the decrypted feedback information. If the feedback information indicates consent to exit the child mode, the first electronic device exits the child mode and enters the normal mode. If the feedback information indicates that the user does not agree to exit the child mode, the first electronic device does not exit the child mode. The first electronic device and the second electronic device encrypt and transmit the information transmitted between them by using the session key, thereby reducing the possibility of information leakage during transmission. Even if the attacker obtains the encrypted communication information, such as The inquiry request or encrypted feedback information cannot be obtained without the session key, nor can the inquiry request or feedback information be maliciously tampered with, thereby improving the security of information transmission.
在一种实施方式中,家长也可以在智能手机的设置页面,设置退出儿童模式的方式为:通过指纹解锁,必须输入家长指纹才能退出儿童模式,从而儿童也无法通过输入密钥而绕开家长退出儿童模式,也会提高儿童模式的限制约束效果。本申请实施例中第一电子设备可以提供多种退出儿童模式的方法,比如,第一电子设备的设置页面上可以显示退出儿童模式的方法包括:输入密码退出、输入指纹退出、通过第二电子设备辅助确认退出等方式,以供家长进行灵活选择或组合选择。In one implementation, parents can also set the method of exiting the child mode on the settings page of the smartphone as: unlocking through fingerprints, and the parent's fingerprint must be entered to exit the child mode, so that children cannot bypass the parent by entering a key. Exiting the child mode will also increase the restriction effect of the child mode. In the embodiment of the present application, the first electronic device may provide multiple methods for exiting the child mode. For example, the settings page of the first electronic device may display methods for exiting the child mode including: entering a password to exit, entering a fingerprint to exit, and exiting through the second electronic device. Device-assisted confirmation and exit methods provide parents with flexible choices or combinations of choices.
请参阅图4,图4是本申请实施例提供的退出儿童模式方法的第三种流程示意图。应用于第二电子设备。该可以包括以下步骤:Please refer to FIG. 4 , which is a third flowchart of a method for exiting the child mode provided by an embodiment of the present application. Applied to the second electronic device. This can include the following steps:
在301中,接收第一电子设备发送的询问信息,询问信息用于询问用户是否同意第一电子设备退出儿童模式;In 301, receive inquiry information sent by the first electronic device. The inquiry information is used to ask the user whether to agree to the first electronic device exiting the child mode;
在302中,基于询问信息,获取用户的反馈信息,反馈信息包括同意退出儿童模式或不同意退出儿童模式;In 302, based on the inquiry information, the user's feedback information is obtained, and the feedback information includes agreement to exit the child mode or disagreement to exit the child mode;
在303中,向第一电子设备发送反馈信息,以使第一电子设备退出或不退出儿童模式。In 303, feedback information is sent to the first electronic device so that the first electronic device exits or does not exit the child mode.
家长在对第一电子设备的儿童模式初始化设置时,可以选择通过第二电子设备辅助确认是否退出儿童模式,第二电子设备可以区别于第一电子设备以外的另一个电子设备,具体的,第一电子设备当前运行在儿童模式,当第一电子设备接收退出儿童模式的请求信息时,会基于请求信息,向第二电子设备发送询问信息,询问信息用于询问用户是否同意退出儿童模式;第二电子设备接收到询问信息后,基于询问信息,比如可以向用户展示询问界面,家长可以通过询问界面,了解当前儿童想要退出儿童模式,并对询问界面进行点击操作,以反馈同意退出儿童模式或不同意退出儿童模式;再比如,第二电子设备也可以通过语音等方式向询问用户是否同意第一电子设备退出儿童模式,家长也可以通过语音来反馈同意退出儿童模式或不同意退出儿童模式;第二电子设备接收到用户的反馈信息之后,可以向第一电子设备发送反馈信息,以使第一电子设备退出或不退出儿童模式。具体的,第一电子设备接收到同意退出儿童模式的反馈信息,则退出儿童模式,智能手机工作在正常模式,若第一电子设备接收到不同意退出儿童模式的反馈信息或没有接收到反馈信息,则保持工作在儿童模式。因此通过采用本申请实施例中退出儿童模式的方式,儿童不会在家长不知情的情况下,绕过家长的管控,自行轻易退出儿童模式,避免了儿童自行退出儿童模式之后进行了不适当的操作,或者使用了过多的时间,从而能够保证通过儿童模式对儿童使用电子设备的限制约束效果,提升了儿童模式退出机制的完备性,而且本申请实施例退出儿童模式的方法,操作方式很简单,有利于提高用户的使用体验。When initializing the child mode settings of the first electronic device, parents can choose to use the second electronic device to assist in confirming whether to exit the child mode. The second electronic device can be distinguished from another electronic device other than the first electronic device. Specifically, the second electronic device An electronic device is currently running in the child mode. When the first electronic device receives the request information to exit the child mode, it will send inquiry information to the second electronic device based on the request information. The inquiry information is used to ask the user whether to agree to exit the child mode; the third After the second electronic device receives the inquiry information, based on the inquiry information, for example, the inquiry interface can be displayed to the user. Parents can use the inquiry interface to understand that the current child wants to exit the child mode, and click on the inquiry interface to provide feedback and consent to exit the child mode. or does not agree to exit the child mode; for another example, the second electronic device can also ask the user whether to agree to the first electronic device exiting the child mode through voice or other methods, and the parent can also feedback through voice that he agrees to exit the child mode or does not agree to exit the child mode. ; After receiving the feedback information from the user, the second electronic device can send feedback information to the first electronic device so that the first electronic device exits or does not exit the child mode. Specifically, if the first electronic device receives feedback information agreeing to exit the child mode, it will exit the child mode, and the smartphone works in the normal mode. If the first electronic device receives feedback information not agreeing to exit the child mode or does not receive feedback information , then keep working in child mode. Therefore, by adopting the method of exiting the child mode in the embodiment of the present application, the children will not bypass the parents' control and easily exit the child mode without the parents' knowledge, thus preventing the children from performing inappropriate actions after exiting the child mode on their own. operation, or using too much time, thereby ensuring the restriction effect on children's use of electronic devices through the children's mode, improving the completeness of the children's mode exit mechanism, and the method of exiting the children's mode in the embodiment of the present application is very easy to operate. Simple and conducive to improving user experience.
在一种实施方式中,第一电子设备和第二电子设备可以进行蓝牙绑定,从而第一电子设备和第二电子设备可以自动快速建立蓝牙连接。其中,第二电子设备可以加载有对应的应用软件,用户可以通过该应用软件开启辅助确认第一电子设备是否退出儿童模式的功能。示例性的,用户也可以通过第二电子设备的应用软件主动发起与第一电子设备的通信蓝牙连接。In one implementation, the first electronic device and the second electronic device can perform Bluetooth binding, so that the first electronic device and the second electronic device can automatically and quickly establish a Bluetooth connection. Wherein, the second electronic device can be loaded with corresponding application software, and the user can use the application software to enable a function to assist in confirming whether the first electronic device exits the child mode. For example, the user can also actively initiate a Bluetooth communication connection with the first electronic device through the application software of the second electronic device.
第一电子设备和第二电子设备建立通信连接之后,为了使得第一电子设备和第二电子设备之间建立安全信道,防范传输的信息被攻击,因此第一电子设备和第二电子设备基于ECDHE-ECDSA算法进行密钥协商,以生成对称会话密钥。After the first electronic device and the second electronic device establish a communication connection, in order to establish a secure channel between the first electronic device and the second electronic device and prevent the transmitted information from being attacked, the first electronic device and the second electronic device use ECDHE -ECDSA algorithm performs key negotiation to generate symmetric session keys.
每一次第一电子设备请求退出儿童模式,第一电子设备与第二电子设备都会生成分别生成用于密钥协商的数据,具体的,第一电子设备生成一个第一随机数,并生成第一临时私钥和对应的第一临时公钥;第二电子设备生成一个第二随机数,并生成第二临时私钥和对应的第二临时公钥;第二电子设备会接收第一电子设备发送的用于密钥协商的数据:第一随机数、第一临时公钥,第二电子设备也会向第一电子设备发送用于密钥协商的数据:第二随机数、第二临时公钥。第一电子设备会基于第一临时私钥和第二临时公钥生成第一共享秘密值,第二电子设备也会基于第二临时私钥和第一临时公钥生成的第二共享秘密值,其中,第一共享秘密值和第二共享秘密值。第一电子设备和第二电子设备都基于第一共享秘密值、第一随机数、第二随机数生成对称会话秘钥。每一次请求退出儿童模式时,第一电子设备和第二电子设备都会生成一个新的对称会话密钥对通信信息进行加解密,从而攻击者无法使用过去的对称会话密钥,去加解密第一电子设备和第二电子设备基于本次请求而传输的询问信息、反馈信息等,也不能对传输过程中的询问信息、反馈信息等进行篡改,因此可以提高退出儿童模式方法的安全性。Each time the first electronic device requests to exit the child mode, the first electronic device and the second electronic device will generate data for key negotiation. Specifically, the first electronic device generates a first random number and generates a first random number. The temporary private key and the corresponding first temporary public key; the second electronic device generates a second random number, and generates a second temporary private key and the corresponding second temporary public key; the second electronic device receives the message sent by the first electronic device The data used for key negotiation: the first random number, the first temporary public key, and the second electronic device will also send the data used for key negotiation: the second random number, the second temporary public key to the first electronic device. . The first electronic device will generate a first shared secret value based on the first temporary private key and the second temporary public key, and the second electronic device will also generate a second shared secret value based on the second temporary private key and the first temporary public key, Among them, the first shared secret value and the second shared secret value. Both the first electronic device and the second electronic device generate a symmetric session key based on the first shared secret value, the first random number, and the second random number. Each time a request is made to exit the child mode, the first electronic device and the second electronic device will generate a new symmetric session key to encrypt and decrypt the communication information, so that the attacker cannot use the past symmetric session key to encrypt and decrypt the first electronic device. The inquiry information, feedback information, etc. transmitted by the electronic device and the second electronic device based on this request cannot be tampered with during the transmission process. Therefore, the security of the method of exiting the child mode can be improved.
在一种实施方式中,每一次退出儿童模式,第一电子设备和第二电子设备会传输用于密钥协商的数据,为了确保第二电子设备接收到正确的未被篡改的第一电子设备的第一随机数、第一临时公钥,第二电子设备能够安全将第二随机数、第二临时公钥发送给第一电子设备,因此本申请实施例中会对传输的密钥协商数据进行签名保护。In one implementation, each time the child mode is exited, the first electronic device and the second electronic device will transmit data for key agreement, in order to ensure that the second electronic device receives the correct first electronic device that has not been tampered with. The first random number and the first temporary public key, the second electronic device can safely send the second random number and the second temporary public key to the first electronic device. Therefore, in the embodiment of this application, the transmitted key agreement data will be Signature protection.
具体的,第二电子设备包括第二长期私钥和对应的第二长期公钥,若第一电子设备与第二电子设备第一次生成对称会话密钥时,第一电子设备可以通过第一长期私钥将第一电子设备的第一标识信息、第一临时公钥、第一随机数、第一长期公钥进行签名,得到第一签名值,将第一电子设备的第一标识信息、第一临时公钥、第一随机数、第一长期公钥和第一签名值发送第二电子设备,第二电子设备通过第一长期公钥对第一签名值进行校验,校验通过之后,确认接收到正确的第一标识信息、第一临时公钥、第一随机数和第一长期公钥,并将第一长期公钥和第一标识信息进行关联和保存。Specifically, the second electronic device includes a second long-term private key and a corresponding second long-term public key. If the first electronic device and the second electronic device generate a symmetric session key for the first time, the first electronic device can pass the first The long-term private key signs the first identification information of the first electronic device, the first temporary public key, the first random number, and the first long-term public key to obtain the first signature value, and the first identification information of the first electronic device, The first temporary public key, the first random number, the first long-term public key and the first signature value are sent to the second electronic device. The second electronic device verifies the first signature value through the first long-term public key. After the verification passes , confirm receipt of the correct first identification information, first temporary public key, first random number and first long-term public key, and associate and save the first long-term public key and the first identification information.
需要说明的是,第一电子设备可以将第一长期公钥直接发送给第二电子设备,第一电子设备也可以将第一长期公钥以第一ECC公钥证书的形式发送给第二电子设备,第一ECC公钥证书中包括第一长期公钥,具体的,第一电子设备可以通过第一长期私钥将第一电子设备的第一标识信息、第一临时公钥、第一随机数、第一ECC公钥证书进行签名,得到第一签名值。将将第一电子设备的第一标识信息、第一临时公钥、第一随机数、第一ECC公钥证书和第一签名值发送第二电子设备。当第二电子设备接收到第一ECC公钥证书时,能够通过业界标准的校验流程去检验第一ECC公钥证书,证明当前第一ECC公钥证书是从一个合法来源签发的,比如合法的网点签发,而不是来自一个不合法的来源,从而可以辅助证实第一ECC公钥证书中的第一长期公钥是未经篡改的。It should be noted that the first electronic device can directly send the first long-term public key to the second electronic device, and the first electronic device can also send the first long-term public key to the second electronic device in the form of a first ECC public key certificate. The first ECC public key certificate includes the first long-term public key. Specifically, the first electronic device can use the first long-term private key to obtain the first identification information, the first temporary public key, and the first random key of the first electronic device. number, and the first ECC public key certificate is signed to obtain the first signature value. The first identification information, the first temporary public key, the first random number, the first ECC public key certificate and the first signature value of the first electronic device will be sent to the second electronic device. When the second electronic device receives the first ECC public key certificate, it can verify the first ECC public key certificate through the industry standard verification process to prove that the current first ECC public key certificate is issued from a legal source, such as legal issued by a network rather than from an illegal source, thus helping to prove that the first long-term public key in the first ECC public key certificate has not been tampered with.
若第一电子设备与第二电子设备第一次生成对称会话密钥,且第一电子设备的第一长期公钥是以第一ECC公钥证书的形式发送给第二电子设备,那么第二电子设备可以将第一标识信息和第一ECC公钥证书进行关联和保存。If the first electronic device and the second electronic device generate a symmetric session key for the first time, and the first long-term public key of the first electronic device is sent to the second electronic device in the form of a first ECC public key certificate, then the second electronic device The electronic device can associate and save the first identification information and the first ECC public key certificate.
若第一电子设备与第二电子设备第二次及以后生成对称会话密钥,则第一电子设备通过第一长期私钥将第一电子设备的第一标识信息、第一临时公钥、第一随机数进行签名,得到第二签名值;将第一电子设备的第一标识信息、第一临时公钥、第一随机数和第二签名值发送第二电子设备,第二电子设备根据接收到的第一标识信息获取第一长期公钥或第一ECC公钥证书中的第一长期公钥,并通过第一长期公钥对第二签名值进行完整性校验通过之后,确定接收到正确的第一电子设备的第一临时公钥、第一随机数。If the first electronic device and the second electronic device generate a symmetric session key for the second and subsequent times, the first electronic device uses the first long-term private key to transfer the first identification information of the first electronic device, the first temporary public key, and the third Sign a random number to obtain a second signature value; send the first identification information, the first temporary public key, the first random number and the second signature value of the first electronic device to the second electronic device, and the second electronic device receives the The first identification information obtained obtains the first long-term public key or the first long-term public key in the first ECC public key certificate, and after the integrity check of the second signature value is passed through the first long-term public key, it is determined that the received The correct first temporary public key and first random number of the first electronic device.
同理,若第一电子设备与第二电子设备第一次生成对称会话密钥,第二电子设备可以通过第二长期私钥将第二电子设备的第二标识信息、第二临时公钥、第二随机数、第二长期公钥进行签名,得到第三签名值,将第二标识信息、第二临时公钥、第二随机数、第二长期公钥和第二签名值发送第二电子设备,第二电子设备通过第一长期公钥对第一签名值进行校验,校验通过之后,确认接收到正确的未被篡改的第一标识信息、第一临时公钥、第一随机数和第一长期公钥,并将第一长期公钥和第一标识信息进行关联和保存。Similarly, if the first electronic device and the second electronic device generate a symmetric session key for the first time, the second electronic device can use the second long-term private key to transfer the second identification information, the second temporary public key, and the second temporary public key of the second electronic device to The second random number and the second long-term public key are signed to obtain a third signature value, and the second identification information, the second temporary public key, the second random number, the second long-term public key and the second signature value are sent to the second electronic device, the second electronic device verifies the first signature value through the first long-term public key, and after passing the verification, confirms receipt of the correct untampered first identification information, the first temporary public key, and the first random number. and the first long-term public key, and associate and save the first long-term public key with the first identification information.
需要说明的是,第二电子设备可以将第二长期公钥直接发送给第一电子设备,第二电子设备也可以将第二长期公钥以第二ECC公钥证书的形式发送给第一电子设备,第二ECC公钥证书中包括第二长期公钥,具体的,第二电子设备可以通过第二长期私钥将第二电子设备的第二标识信息、第二临时公钥、第二随机数、第二ECC公钥证书进行签名,得到第三签名值。将第二标识信息、第二临时公钥、第二随机数、第二ECC公钥证书和第三签名值发送第一电子设备。当第一电子设备接收到第二ECC公钥证书时,能够通过业界标准的校验流程去检验第二ECC公钥证书,证明当前第二ECC公钥证书是从二个合法来源签发的,比如合法的网点签发,而不是来自二个不合法的来源,从而可以辅助证实第二ECC公钥证书中的第二长期公钥是未经篡改的。It should be noted that the second electronic device can directly send the second long-term public key to the first electronic device, and the second electronic device can also send the second long-term public key to the first electronic device in the form of a second ECC public key certificate. device, the second ECC public key certificate includes a second long-term public key. Specifically, the second electronic device can use the second long-term private key to obtain the second identification information of the second electronic device, the second temporary public key, and the second random number, and the second ECC public key certificate is signed to obtain the third signature value. Send the second identification information, the second temporary public key, the second random number, the second ECC public key certificate and the third signature value to the first electronic device. When the first electronic device receives the second ECC public key certificate, it can verify the second ECC public key certificate through the industry standard verification process to prove that the current second ECC public key certificate is issued from two legal sources, such as It is issued by a legitimate network, rather than from two illegal sources, which can help prove that the second long-term public key in the second ECC public key certificate has not been tampered with.
若第一电子设备与第二电子设备第一次生成对称会话密钥,将第二长期公钥以第二ECC公钥证书的形式发送给第一电子设备,那么第一电子设备可以将第二标识信息和第二ECC公钥证书进行关联和保存。If the first electronic device and the second electronic device generate a symmetric session key for the first time and send the second long-term public key to the first electronic device in the form of a second ECC public key certificate, then the first electronic device can send the second The identification information is associated and saved with the second ECC public key certificate.
若第一电子设备与第二电子设备第二次及以后生成对称会话密钥,则第二电子设备通过第二长期私钥将第二电子设备的第二标识信息、第二临时公钥、第二随机数进行签名,得到第四签名值;将第二电子设备的第二标识信息、第二临时公钥、第二随机数和第四签名值发送第一电子设备,第一电子设备根据接收到的第二标识信息获取第二长期公钥或第二ECC公钥证书中的第二长期公钥,并通过第二长期公钥对第一签名值进行完整性校验通过之后,确定接收到正确的第二电子设备的第二临时公钥、第二随机数。If the first electronic device and the second electronic device generate a symmetric session key for the second and subsequent times, the second electronic device uses the second long-term private key to obtain the second identification information of the second electronic device, the second temporary public key, and the second electronic device. Sign two random numbers to obtain a fourth signature value; send the second identification information, the second temporary public key, the second random number and the fourth signature value of the second electronic device to the first electronic device, and the first electronic device receives the The second identification information obtained obtains the second long-term public key or the second long-term public key in the second ECC public key certificate, and after the integrity check of the first signature value is passed through the second long-term public key, it is determined that the received The correct second temporary public key and second random number of the second electronic device.
示例性的,第一电子设备比如为智能手机,智能手机包括标识信息比如为ID_A,智能手机还包括一对长期的公私钥对,比如,智能手机的第一长期私钥为phoneLTSK,第一长期公钥为phoneLTPK,智能手机部署有第一ECC公钥证书phoneCert(其中包含有phoneLTPK),第二电子设备比如为智能手表,智能手表也包括标识信息比如为ID_B,智能手表也包括一对长期的公私钥对,比如智能手表的第二长期私钥为watchLTSK,第二长期公钥为watchLTPK,智能手表部署有第二ECC公钥证书watchCert(其中包含有watchLTPK)。For example, the first electronic device is a smart phone, and the smart phone includes identification information such as ID_A. The smart phone also includes a pair of long-term public and private keys. For example, the first long-term private key of the smart phone is phoneLTSK, and the first long-term private key is phoneLTSK. The public key is phoneLTPK. The smartphone is deployed with the first ECC public key certificate phoneCert (which contains phoneLTPK). The second electronic device is, for example, a smart watch. The smart watch also includes identification information such as ID_B. The smart watch also includes a pair of long-term Public and private key pairs, for example, the second long-term private key of a smart watch is watchLTSK, the second long-term public key is watchLTPK, and the smart watch is deployed with a second ECC public key certificate watchCert (which contains watchLTPK).
一方面,若智能手机和智能手机第一次进行初始化绑定,比如家长在智能手机中设置了允许通过智能手表辅助确认是否退出儿童模式之后,智能手机第一次接收到退出儿童模式的请求信息,智能手机和智能手表第一次进行密钥协商,以生成对称密钥时,智能手机生成第一随机数RA_1,并生成第一临时私钥phoneSTSK_1和对应的第一临时公钥phoneSTPK_1,通过phoneLTSK对{ID_A、phoneSTPK_1、RA_1、phoneCert}进行签名,得到第一签名值Sig_phone_1,并将{ID_A、phoneSTPK_1、RA_1、phoneCert、Sig_phone_1}发送给智能手表,智能手表接收到智能手机发送的{ID_A、phoneSTPK_1、RA_1、phoneCert、Sig_phone_1}之后,会根据业界标准流程对phoneCert进行验证,验证通过后,通过phoneCert中的phoneLTPK对Sig_phone_1进行完整性校验,若验证通过,则说明本次接收到的{ID_A、phoneSTPK_1、RA_1、phoneCert}为未经篡改,正确可靠的数据,并将ID_A和phoneCert进行关联和保存。On the one hand, if the smart phone and the smart phone are initialized and bound for the first time, for example, after the parent sets up the smart watch to allow the smart watch to assist in confirming whether to exit the child mode, the smart phone receives the request information to exit the child mode for the first time. , when the smartphone and the smartwatch perform key negotiation for the first time to generate a symmetric key, the smartphone generates the first random number RA_1, and generates the first temporary private key phoneSTSK_1 and the corresponding first temporary public key phoneSTPK_1, through phoneLTSK Sign {ID_A, phoneSTPK_1, RA_1, phoneCert} to obtain the first signature value Sig_phone_1, and send {ID_A, phoneSTPK_1, RA_1, phoneCert, Sig_phone_1} to the smart watch. The smart watch receives {ID_A, phoneSTPK_1 sent by the smart phone. , RA_1, phoneCert, Sig_phone_1}, the phoneCert will be verified according to the industry standard process. After the verification is passed, the integrity of Sig_phone_1 will be verified through the phoneLTPK in phoneCert. If the verification passes, it means that the {ID_A, phoneSTPK_1, RA_1, phoneCert} are untampered, correct and reliable data, and ID_A and phoneCert are associated and saved.
若智能手机和智能手表第二次及以后生成对称会话密钥,也即,智能手机和智能手表不是第一次进行密钥协商了,之前已经进行了密钥协商,同样,智能手机会再次生成另一第一随机数RA_2,并生成另一第一临时私钥phoneSTSK_2和对应的第一临时公钥phoneSTPK_2,智能手机通过phoneLTSK对{ID_A、phoneSTPK_2、RA_2}进行签名,得到第二签名值Sig_phone_2,并将{ID_A、phoneSTPK_2、RA_2、Sig_phone_2}发送给智能手表,需要说明的是,由于智能手表中已经保存有智能手机的ID_A和对应的phoneCert,因此在之后密钥协商过程中,智能手机不再需要将phoneCert发送给智能手表,避免敏感数据的再次传递,智能手表只需要通过接收到的ID_A获取对应的phoneCert,然后通过phoneCert中的phoneLTPK对Sig_phone_2进行完整性校验,若验证通过,则说明智能手表本次接收到的{ID_A、phoneSTPK_2、RA_2}为未经篡改,正确可靠的数据。If the smartphone and the smartwatch generate a symmetric session key for the second time and thereafter, that is, it is not the first time that the smartphone and the smartwatch perform key negotiation, but they have already performed key negotiation before. Likewise, the smartphone will generate the key again. Another first random number RA_2, and generate another first temporary private key phoneSTSK_2 and the corresponding first temporary public key phoneSTPK_2. The smartphone signs {ID_A, phoneSTPK_2, RA_2} through phoneLTSK to obtain the second signature value Sig_phone_2, And send {ID_A, phoneSTPK_2, RA_2, Sig_phone_2} to the smart watch. It should be noted that since the smart watch has already saved the ID_A of the smart phone and the corresponding phoneCert, during the subsequent key negotiation process, the smart phone will no longer The phoneCert needs to be sent to the smart watch to avoid the re-transmission of sensitive data. The smart watch only needs to obtain the corresponding phoneCert through the received ID_A, and then perform integrity verification on Sig_phone_2 through the phoneLTPK in phoneCert. If the verification passes, it means the smart watch The {ID_A, phoneSTPK_2, RA_2} received by the watch this time are correct and reliable data that have not been tampered with.
另一方面,若智能手机和智能手表第一次进行密钥协商,生成对称密钥时,智能手表也会生成第二随机数RB_1,并生成第二临时私钥watchSTSK_1和对应的第二临时公钥watchSTPK_1,通过watchLTSK对{ID_B、watchSTPK_1、RB_1、watchCert}进行签名,得到第三签名值Sig_watch_1,并将{ID_B、watchSTPK_1、RB_1、watchCert、Sig_watch_1}发送给智能手机,因此智能手机可以接收到智能手表发送的{ID_B、watchSTPK_1、RB_1、watchCert、Sig_watch_1},智能手机可以对按照业界流程watchCert进行沿着,验证通过之后,通过watchCert中的watchLTPK对Sig_watch_1进行完整性校验,若验证通过,则说明本次接收到的{ID_B、watchSTPK_1、RB_1、watchCert}为未经篡改,正确可靠的数据,并将ID_B和watchCert进行关联和保存。On the other hand, if the smart phone and the smart watch perform key negotiation for the first time and generate a symmetric key, the smart watch will also generate the second random number RB_1, and generate the second temporary private key watchSTSK_1 and the corresponding second temporary public key. key watchSTPK_1, sign {ID_B, watchSTPK_1, RB_1, watchCert} through watchLTSK, obtain the third signature value Sig_watch_1, and send {ID_B, watchSTPK_1, RB_1, watchCert, Sig_watch_1} to the smartphone, so the smartphone can receive the smart phone {ID_B, watchSTPK_1, RB_1, watchCert, Sig_watch_1} sent by the watch, the smartphone can verify the watchCert according to the industry process. After the verification is passed, the integrity verification of Sig_watch_1 is performed through the watchLTPK in the watchCert. If the verification is passed, it means The {ID_B, watchSTPK_1, RB_1, watchCert} received this time are untampered, correct and reliable data, and ID_B and watchCert are associated and saved.
若智能手机和智能手表第二次及以后生成对称会话密钥,也即,智能手机和智能手表不是第一次进行密钥协商了,之前已经进行了密钥协商,同样,智能手表也会再次生成另一第二随机数RB_2,并生成另一第二临时私钥watchSTSK_2和对应的第二临时公钥watchSTPK_2,智能手表通过watchLTSK对{ID_B、watchSTPK_2、RB_2}进行签名,得到第二签名值Sig_watch_2,并将{ID_B、watchSTPK_2、RB_2、Sig_watch_2}发送给智能手表,需要说明的是,由于智能手机中以及保存了智能手表的ID_B和对应的watchCert,因此在之后密钥协商过程中,智能手机不再需要将watchCert发送给智能手表,不需要再次传递敏感数据,智能手表只需要通过接收到的ID_B获取对应的watchCert,然后通过watchCert的watchLTPK对Sig_watch_2进行完整性校验,若验证通过,则说明本次接收到的{ID_B、watchSTPK_2、RB_2}为未经篡改,正确可靠的数据。If the smartphone and the smart watch generate a symmetric session key for the second time and thereafter, that is, the smartphone and the smart watch do not perform key negotiation for the first time, but have already performed key negotiation before. Similarly, the smart watch will also perform key negotiation again. Generate another second random number RB_2, and generate another second temporary private key watchSTSK_2 and the corresponding second temporary public key watchSTPK_2. The smart watch signs {ID_B, watchSTPK_2, RB_2} through watchLTSK to obtain the second signature value Sig_watch_2 , and sends {ID_B, watchSTPK_2, RB_2, Sig_watch_2} to the smart watch. It should be noted that since the smart watch’s ID_B and the corresponding watchCert are saved in the smart phone, the smart phone will not There is no need to send watchCert to the smart watch again. There is no need to transfer sensitive data again. The smart watch only needs to obtain the corresponding watchCert through the received ID_B, and then perform integrity verification on Sig_watch_2 through watchLTPK of watchCert. If the verification passes, it means this The {ID_B, watchSTPK_2, RB_2} received this time are correct and reliable data that have not been tampered with.
因此,当智能手机和智能手表第一次生成对称会话密钥时,基于智能手机确定接收到正确的{ID_B、watchSTPK_1、RB_1、watchCert},智能手表确定接收到正确的{ID_A、phoneSTPK_1、RA_1、phoneCert},那么智能手机可以基于自身的phoneSTSK_1和智能手表端的watchSTPK_1生成第一共享秘密值;智能手表可以基于自身的watchSTSK_1和智能手机端的phoneSTPK_1生成第二共享秘密值,当智能手机和智能手表第二次及以后生成对称会话密钥时,基于智能手机确定接收到正确的{ID_B、watchSTPK_2、RB_2},智能手表确定接收到正确的{ID_A、phoneSTPK_2、RA_2},那么智能手机可以基于自身的phoneSTSK_2和智能手表端的watchSTPK_2生成第一共享秘密值;智能手表可以基于自身的watchSTSK_2和智能手机端的phoneSTPK_2生成第二共享秘密值,其中,第一共享秘密值和第二共享秘密值相同,从而智能手机和智能手表端基于第一共享秘密值(第二共享秘密值)、第一随机数、第二随机数能够生成对称会话密钥,通过对称会话密钥对传输的通信数据进行加解密,保证传输信息的安全性。Therefore, when the smartphone and smartwatch first generate a symmetric session key, the smartwatch determines that it received the correct {ID_B, watchSTPK_1, RB_1, watchCert}, and the smartwatch determines that it received the correct {ID_A, phoneSTPK_1, RA_1, phoneCert}, then the smartphone can generate the first shared secret value based on its own phoneSTSK_1 and the smartwatch's watchSTPK_1; the smartwatch can generate the second shared secret value based on its own watchSTSK_1 and the smartphone's phoneSTPK_1. When the smartphone and smartwatch second When generating a symmetric session key twice and later, based on the smartphone confirming that it has received the correct {ID_B, watchSTPK_2, RB_2}, and the smartwatch confirming that it has received the correct {ID_A, phoneSTPK_2, RA_2}, then the smartphone can use its own phoneSTSK_2 and The watchSTPK_2 on the smart watch side generates the first shared secret value; the smart watch can generate the second shared secret value based on its own watchSTSK_2 and the phoneSTPK_2 on the smart phone side, where the first shared secret value and the second shared secret value are the same, so the smart phone and the smart phone The watch end can generate a symmetric session key based on the first shared secret value (the second shared secret value), the first random number, and the second random number, and use the symmetric session key to encrypt and decrypt the transmitted communication data to ensure the authenticity of the transmitted information. safety.
在一种实施方式中,第一电子设备在与第二电子设备基于ECDHE-ECDSA算法相互发送用于密钥协商的数据时,还可以发一些其它数据,比如时间信息、业务信息等,在此不再赘述。In one implementation, when the first electronic device and the second electronic device send data for key negotiation to each other based on the ECDHE-ECDSA algorithm, they can also send some other data, such as time information, service information, etc. Here, No longer.
第一电子设备和第二电子设备基于ECDHE-ECDSA算法进行密钥协商,生成对称会话密钥之后,可以通过会话密钥对询问信息进行加密,将加密后的询问信息发送给第二电子设备,第二电子设备可以采用会话密钥对加密后的询问信息进行解密,第二电子设备向第一电子设备返回反馈信息时,也可以通过会话密钥对反馈信息进行加密,第一电子设备通过会话密钥对加密后的反馈信息进行解密,从而根据解密后的反馈信息确定第一电子设备是否退出儿童模式。第一电子设备和第二电子设备通过使用会话密钥对两者之间的传输的信息进行加密传输,即使攻击者获取了加密后的询问请求或加密后的反馈信息,由于没有本次对称会话密钥也不能得到询问请求或反馈信息的明文,也不能对询问请求或反馈信息进行恶意篡改,从而提高了通信信息的安全性。The first electronic device and the second electronic device perform key negotiation based on the ECDHE-ECDSA algorithm. After generating a symmetric session key, the query information can be encrypted using the session key, and the encrypted query information can be sent to the second electronic device. The second electronic device can use the session key to decrypt the encrypted query information. When the second electronic device returns feedback information to the first electronic device, it can also encrypt the feedback information using the session key. The first electronic device uses the session key to decrypt the encrypted query information. The key decrypts the encrypted feedback information, thereby determining whether the first electronic device exits the child mode based on the decrypted feedback information. The first electronic device and the second electronic device encrypt and transmit the information transmitted between them by using the session key. Even if the attacker obtains the encrypted inquiry request or the encrypted feedback information, since there is no symmetric session The key cannot obtain the plain text of the inquiry request or feedback information, nor can the inquiry request or feedback information be maliciously tampered with, thereby improving the security of the communication information.
请参阅图5,图5为本申请实施例提供的退出儿童模式的装置的第一种结构示意图,其中该退出儿童模式的装置400应用于第一电子设备,该退出儿童模式的装置400包括第一接收模块401、第一发送模块402、第二接收模块403以及退出模块404,如下:Please refer to Figure 5. Figure 5 is a first structural schematic diagram of a device for exiting the child mode provided by an embodiment of the present application. The device 400 for exiting the child mode is applied to a first electronic device. The device 400 for exiting the child mode includes a third A receiving module 401, a first sending module 402, a second receiving module 403 and an exit module 404, as follows:
第一接收模块401,用于接收退出儿童模式的请求信息,儿童模式为第一电子设备适合儿童使用的工作模式;The first receiving module 401 is used to receive request information to exit the child mode. The child mode is a working mode of the first electronic device suitable for use by children;
第一发送模块402,用于基于请求信息,向第二电子设备发送询问信息,询问信息用于询问用户是否同意退出儿童模式;The first sending module 402 is configured to send inquiry information to the second electronic device based on the request information, where the inquiry information is used to ask the user whether to agree to exit the child mode;
第二接收模块403,用于接收第二电子设备的反馈信息,反馈信息包括同意退出儿童模式或不同意退出儿童模式;The second receiving module 403 is configured to receive feedback information from the second electronic device, where the feedback information includes agreement to exit the child mode or disagreement to exit the child mode;
退出模块404,用于若反馈信息为同意退出儿童模式,则第一电子设备退出儿童模式。The exit module 404 is used to exit the child mode of the first electronic device if the feedback information indicates consent to exit the child mode.
在一种实施方式中,退出儿童模式的装置还包括第一通信模块405,第一通信模块405可以用于:第一电子设备建立与第二电子设备的通信连接;第一电子设备与第二电子设备基于ECDHE-ECDSA算法生成对称会话密钥;第一发送模块402可以用于:通过对称会话秘钥对询问信息进行加密,得到加密的询问信息,并将加密的询问信息发送给第二电子设备;第二接收模块403可以用于:接收第二电子设备发送的加密的反馈信息,加密的反馈信息为第二电子设备通过对称会话密钥对反馈信息进行加密得到;通过对称会话秘钥对加密的反馈信息进行解密,得到反馈信息。In one implementation, the device for exiting the child mode further includes a first communication module 405. The first communication module 405 can be used for: the first electronic device to establish a communication connection with the second electronic device; the first electronic device to communicate with the second electronic device. The electronic device generates a symmetric session key based on the ECDHE-ECDSA algorithm; the first sending module 402 can be used to: encrypt the query information using the symmetric session key, obtain the encrypted query information, and send the encrypted query information to the second electronic device. device; the second receiving module 403 may be used to: receive encrypted feedback information sent by the second electronic device, where the encrypted feedback information is obtained by encrypting the feedback information by the second electronic device through a symmetric session key; through a symmetric session key pair The encrypted feedback information is decrypted to obtain the feedback information.
在一种实施方式中,第一通信模块405可以用于:生成第一随机数,并生成第一临时私钥和对应的第一临时公钥;将第一随机数、第一临时公钥发送给第二电子设备;接收第二电子设备生成的第二随机数、第二临时公钥;基于第一临时私钥和第二临时公钥生成第一共享秘密值,第一共享秘密值与第二电子设备基于第二临时私钥和第一临时公钥生成的第二共享秘密值相同;基于第一共享秘密值、第一随机数、第二随机数生成对称会话秘钥。In one implementation, the first communication module 405 may be used to: generate a first random number, and generate a first temporary private key and a corresponding first temporary public key; send the first random number and the first temporary public key. to the second electronic device; receiving the second random number and the second temporary public key generated by the second electronic device; generating a first shared secret value based on the first temporary private key and the second temporary public key, and the first shared secret value is the same as the second temporary public key. The second shared secret value generated by the two electronic devices based on the second temporary private key and the first temporary public key is the same; and the symmetric session secret key is generated based on the first shared secret value, the first random number, and the second random number.
在一种实施方式中,第一电子设备包括第一长期私钥和对应的第一长期公钥,第一发送模块402可以用于:若第一电子设备与第二电子设备第一次生成对称会话密钥,通过第一长期私钥将第一电子设备的第一标识信息、第一临时公钥、第一随机数、第一长期公钥进行签名,得到第一签名值;将第一标识信息、第一临时公钥、第一随机数、第一长期公钥和第一签名值发送第二电子设备,以使第二电子设备通过第一长期公钥对第一签名值进行校验通过之后,确认接收到正确的第一标识信息、第一临时公钥、第一随机数和第一长期公钥,并将第一长期公钥和第一标识信息进行关联和保存;若第一电子设备与第二电子设备第二次及以后生成对称会话密钥,则通过第一长期私钥将第一标识信息、第一临时公钥、第一随机数进行签名,得到第二签名值;将第一标识信息、第一临时公钥、第一随机数和第二签名值发送第二电子设备,以使第二电子设备根据接收到的第一标识信息获取第一长期公钥,并通过第一长期公钥对第二签名值进行校验通过之后,确认接收到正确的第一电子设备的第一临时公钥、第一随机数。In one implementation, the first electronic device includes a first long-term private key and a corresponding first long-term public key. The first sending module 402 can be used to: if the first electronic device and the second electronic device generate symmetry for the first time, The session key uses the first long-term private key to sign the first identification information of the first electronic device, the first temporary public key, the first random number, and the first long-term public key to obtain the first signature value; the first identification The information, the first temporary public key, the first random number, the first long-term public key and the first signature value are sent to the second electronic device, so that the second electronic device verifies the first signature value through the first long-term public key. Afterwards, it is confirmed that the correct first identification information, first temporary public key, first random number and first long-term public key are received, and the first long-term public key and the first identification information are associated and saved; if the first electronic When the device and the second electronic device generate a symmetric session key for the second and subsequent times, the first identification information, the first temporary public key, and the first random number are signed using the first long-term private key to obtain the second signature value; The first identification information, the first temporary public key, the first random number and the second signature value are sent to the second electronic device, so that the second electronic device obtains the first long-term public key according to the received first identification information, and passes the first identification information to the second electronic device. After a long-term public key passes the verification of the second signature value, it is confirmed that the correct first temporary public key and first random number of the first electronic device have been received.
在一种实施方式中,第二电子设备包括第二长期私钥和对应的第二长期公钥,第二接收模块403可以用于:若第一电子设备与第二电子设备第一次生成对称会话密钥,接收第二电子设备发送的第二电子设备的第二标识信息、第二临时公钥、第二随机数、第二长期公钥和第三签名值,第三签名值为第二电子设备通过第二长期私钥将第二标识信息、第二临时公钥、第二随机数、第二长期公钥进行签名得到;通过第二长期公钥对第三签名值进行校验通过之后,确定接收到正确的第二标识信息、第二临时公钥、第二随机数和第二长期公钥,并将第二长期公钥和第二标识信息进行关联和保存;若第一电子设备与第二电子设备第二次及以后生成对称会话密钥,接收第二电子设备发送的第二电子设备的第二标识信息、第二临时公钥、第二随机数和第四签名值,第四签名值为第二电子设备通过第二长期私钥将第二标识信息、第二临时公钥、第二随机数进行签名得到;根据接收到的第二标识信息获取第二长期公钥,并通过第二长期公钥对第四签名值进行校验通过之后,确定接收到正确的第二标识信息、第二临时公钥和第二随机数。In one implementation, the second electronic device includes a second long-term private key and a corresponding second long-term public key. The second receiving module 403 can be used to: if the first electronic device and the second electronic device generate symmetry for the first time, The session key receives the second identification information of the second electronic device, the second temporary public key, the second random number, the second long-term public key and the third signature value sent by the second electronic device, and the third signature value is the second The electronic device uses the second long-term private key to sign the second identification information, the second temporary public key, the second random number, and the second long-term public key; after the third signature value is verified and passed through the second long-term public key , confirm that the correct second identification information, second temporary public key, second random number and second long-term public key are received, and associate and save the second long-term public key and the second identification information; if the first electronic device Generate a symmetric session key with the second electronic device for the second and subsequent times, receive the second identification information, the second temporary public key, the second random number and the fourth signature value of the second electronic device sent by the second electronic device, The four-signature value is obtained by the second electronic device signing the second identification information, the second temporary public key, and the second random number through the second long-term private key; obtaining the second long-term public key according to the received second identification information, and After the fourth signature value is verified through the second long-term public key, it is determined that the correct second identification information, the second temporary public key and the second random number have been received.
在一种实施方式中,第一电子设备包括第一ECC公钥证书,第一ECC公钥证书包括第一长期公钥,第二电子设备包括第二ECC公钥证书,第二ECC公钥证书包括第二长期公钥,第一发送模块402可以用于:若第一电子设备与第二电子设备第一次生成对称会话密钥,通过第一长期私钥将第一电子设备的第一标识信息、第一临时公钥、第一随机数、第一ECC公钥证书进行签名,得到第一签名值。将第一电子设备的第一标识信息、第一临时公钥、第一随机数、第一ECC公钥证书和第一签名值发送第二电子设备,以使第二电子设备验证第一ECC公钥证书有效,并通过第一ECC公钥证书中的第一长期公钥对第一签名值进行完整性校验通过之后,得到第一标识信息、第一临时公钥、第一随机数和第一ECC公钥证书,并将第一ECC公钥证书和第一标识信息进行关联并保存;若第一电子设备与第二电子设备第二次及以后生成对称会话密钥,则通过第一长期私钥将第一电子设备的第一标识信息、第一临时公钥、第一随机数进行签名,得到第二签名值;将第一电子设备的第一标识信息、第一临时公钥、第一随机数和第二签名值发送第二电子设备,以使第二电子设备根据接收到的第一标识信息获取第一ECC公钥证书,并通过第一ECC公钥证书中的第一长期公钥对第二签名值进行完整性校验通过之后,确定接收到正确的第一电子设备的第一临时公钥、第一随机数;In one embodiment, the first electronic device includes a first ECC public key certificate, the first ECC public key certificate includes a first long-term public key, the second electronic device includes a second ECC public key certificate, and the second ECC public key certificate Including the second long-term public key, the first sending module 402 can be used to: if the first electronic device and the second electronic device generate a symmetric session key for the first time, send the first identification of the first electronic device through the first long-term private key. The information, the first temporary public key, the first random number, and the first ECC public key certificate are signed to obtain the first signature value. The first identification information, the first temporary public key, the first random number, the first ECC public key certificate and the first signature value of the first electronic device are sent to the second electronic device, so that the second electronic device verifies the first ECC public key. The key certificate is valid, and after the integrity verification of the first signature value passes through the first long-term public key in the first ECC public key certificate, the first identification information, the first temporary public key, the first random number and the first random number are obtained. An ECC public key certificate, and associate and save the first ECC public key certificate with the first identification information; if the first electronic device and the second electronic device generate a symmetric session key for the second and subsequent times, through the first long-term The private key signs the first identification information of the first electronic device, the first temporary public key, and the first random number to obtain the second signature value; the first identification information of the first electronic device, the first temporary public key, and the first random number are signed. A random number and a second signature value are sent to the second electronic device, so that the second electronic device obtains the first ECC public key certificate according to the received first identification information, and passes the first long-term public key certificate in the first ECC public key certificate. After the key passes the integrity check on the second signature value, it is determined that the correct first temporary public key and first random number of the first electronic device are received;
第二接收模块403可以用于:若第一电子设备与第二电子设备第一次生成对称会话密钥,接收第二电子设备发送的第二电子设备的第二标识信息、第二临时公钥、第二随机数、第二ECC公钥证书和第三签名值,第三签名值为第二电子设备通过第二长期私钥将第二标识信息、第二临时公钥、第二随机数、第二ECC公钥证书进行签名得到;通过验证第二ECC公钥证书有效,并通过第二长期公钥对第三签名值进行校验通过之后,确定接收到正确的第二标识信息、第二临时公钥、第二随机数和第二ECC公钥证书,并将第二ECC公钥证书和第二标识信息进行关联和保存;若第一电子设备与第二电子设备第二次及以后生成对称会话密钥,接收第二电子设备发送的第二标识信息、第二临时公钥、第二随机数和第四签名值,第四签名值为第二电子设备通过第二长期私钥将第二标识信息、第二临时公钥、第二随机数进行签名得到;根据接收到的第二标识信息获取第二ECC公钥证书,并通过第二ECC公钥证书中的第二长期公钥对第四签名值进行完整性校验通过之后,确定接收到正确的第二电子设备的第二标识信息、第二临时公钥、第二随机数。The second receiving module 403 may be used to: if the first electronic device and the second electronic device generate a symmetric session key for the first time, receive the second identification information and the second temporary public key of the second electronic device sent by the second electronic device. , the second random number, the second ECC public key certificate and the third signature value. The third signature value is the second identification information, the second temporary public key, the second random number, The second ECC public key certificate is signed; by verifying that the second ECC public key certificate is valid and verifying the third signature value through the second long-term public key, it is determined that the correct second identification information and the second The temporary public key, the second random number and the second ECC public key certificate, and associate and save the second ECC public key certificate and the second identification information; if the first electronic device and the second electronic device generate the second and subsequent The symmetric session key receives the second identification information, the second temporary public key, the second random number and the fourth signature value sent by the second electronic device. The fourth signature value is the second electronic device using the second long-term private key. The second identification information, the second temporary public key, and the second random number are obtained by signing; the second ECC public key certificate is obtained according to the received second identification information, and the second long-term public key pair in the second ECC public key certificate is obtained. After the fourth signature value passes the integrity check, it is determined that the correct second identification information, the second temporary public key, and the second random number of the second electronic device have been received.
在一种实施方式中,第一发送模块402可以用于:将第一随机数、第一时间信息、第一临时公钥发送给第二电子设备,以使第二电子设备判断若第一时间信息处于预设时间范围内,则基于第二临时私钥和第一临时公钥生成的第二共享秘密值;第二接收模块403可以用于:接收第二电子设备生成的第二随机数、第二时间信息、第二临时公钥,以使第一电子设备判断若第二时间信息处于预设时间范围内,则基于第一临时私钥和第二临时公钥生成第一共享秘密值。In one implementation, the first sending module 402 may be used to: send the first random number, the first time information, and the first temporary public key to the second electronic device, so that the second electronic device determines if the first time If the information is within the preset time range, the second shared secret value generated based on the second temporary private key and the first temporary public key; the second receiving module 403 may be used to: receive the second random number generated by the second electronic device, The second time information and the second temporary public key enable the first electronic device to determine that if the second time information is within the preset time range, generate a first shared secret value based on the first temporary private key and the second temporary public key.
请参阅图6,图6为本申请实施例提供的退出儿童模式的装置的第二种结构示意图,其中该退出儿童模式的装置500应用于第二电子设备,该退出儿童模式的装置500包括第三接收模块501、获取模块502以及发送模块503,如下:Please refer to Figure 6. Figure 6 is a second structural schematic diagram of a device for exiting the child mode provided by an embodiment of the present application. The device 500 for exiting the child mode is applied to a second electronic device. The device 500 for exiting the child mode includes a third Three receiving modules 501, obtaining modules 502 and sending modules 503 are as follows:
第三接收模块501,用于接收第一电子设备发送的询问信息,询问信息用于询问用户是否同意第一电子设备退出儿童模式;The third receiving module 501 is used to receive inquiry information sent by the first electronic device. The inquiry information is used to ask the user whether he agrees with the first electronic device to exit the child mode;
获取模块502,用于基于询问信息,获取用户的反馈信息,反馈信息包括同意退出儿童模式或不同意退出儿童模式;The acquisition module 502 is used to obtain the user's feedback information based on the inquiry information. The feedback information includes agreement to exit the child mode or disagreement to exit the child mode;
发送模块503,用于向第一电子设备发送反馈信息,以使第一电子设备退出或不退出儿童模式。The sending module 503 is used to send feedback information to the first electronic device so that the first electronic device exits or does not exit the child mode.
本申请实施例提供一种计算机可读的存储介质,其上存储有计算机程序,当计算机程序在计算机上执行时,使得计算机执行如本实施例提供的退出儿童模式的方法中的流程。An embodiment of the present application provides a computer-readable storage medium on which a computer program is stored. When the computer program is executed on a computer, the computer is caused to execute the process of the method for exiting child mode provided by this embodiment.
本申请实施例还提供一种电子设备。其中,电子设备可以为第一电子设备或第二电子设备,请参阅图7,图7为本申请实施例提供的电子设备的结构示意图。电子设备600包括处理器601和存储器602。其中,处理器601与存储器602电性连接。An embodiment of the present application also provides an electronic device. The electronic device may be a first electronic device or a second electronic device. Please refer to FIG. 7 . FIG. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application. Electronic device 600 includes processor 601 and memory 602. Among them, the processor 601 is electrically connected to the memory 602.
处理器601是电子设备600的控制中心,利用各种接口和线路连接整个电子设备的各个部分,通过运行或调用存储在存储器602内的计算机程序,以及调用存储在存储器602内的数据,执行电子设备的各种功能和处理数据,从而对电子设备进行整体监控。The processor 601 is the control center of the electronic device 600. It uses various interfaces and lines to connect various parts of the entire electronic device, and executes electronic tasks by running or calling computer programs stored in the memory 602 and calling data stored in the memory 602. The various functions of the device and process data to provide overall monitoring of the electronic device.
存储器602可用于存储计算机程序和数据。存储器602存储的计算机程序中包含有可在处理器中执行的信息。计算机程序可以组成各种功能模块。处理器601通过调用存储在存储器602的计算机程序,从而执行各种功能应用以及数据处理。Memory 602 may be used to store computer programs and data. The computer program stored in memory 602 contains information that can be executed in the processor. Computer programs can be composed of various functional modules. The processor 601 executes various functional applications and data processing by calling computer programs stored in the memory 602 .
在本实施例中,当电子设备600为第一电子设备时,第一电子设备中的处理器601会按照如下的步骤,将一个或一个以上的计算机程序的进程对应的信息加载到存储器602中,并由处理器601来运行存储在存储器602中的计算机程序,从而实现功能:In this embodiment, when the electronic device 600 is a first electronic device, the processor 601 in the first electronic device will load information corresponding to the processes of one or more computer programs into the memory 602 according to the following steps. , and the processor 601 runs the computer program stored in the memory 602 to implement the functions:
接收退出儿童模式的请求信息,儿童模式为第一电子设备适合儿童使用的工作模式;Receive request information to exit the child mode, which is a working mode of the first electronic device suitable for use by children;
基于请求信息,向第二电子设备发送询问信息,询问信息用于询问用户是否同意退出儿童模式;Based on the request information, send inquiry information to the second electronic device, where the inquiry information is used to ask the user whether to agree to exit the child mode;
接收第二电子设备的反馈信息,反馈信息包括同意退出儿童模式或不同意退出儿童模式;Receive feedback information from the second electronic device, the feedback information includes consent to exit the children's mode or disagreement to exit the children's mode;
若反馈信息为同意退出儿童模式,则第一电子设备退出儿童模式。If the feedback information is consent to exit the child mode, the first electronic device exits the child mode.
在一种实施方式中,处理器601接收退出儿童模式的请求信息之前,可以执行:第一电子设备建立与第二电子设备的通信连接;In one implementation, before the processor 601 receives the request information to exit the child mode, it may perform: the first electronic device establishes a communication connection with the second electronic device;
第一电子设备与第二电子设备基于ECDHE-ECDSA算法生成对称会话密钥;The first electronic device and the second electronic device generate a symmetric session key based on the ECDHE-ECDSA algorithm;
向第二电子设备发送询问信息包括:Sending query information to the second electronic device includes:
通过对称会话秘钥对询问信息进行加密,得到加密的询问信息,并将加密的询问信息发送给第二电子设备;Encrypt the query information using the symmetric session key to obtain the encrypted query information, and send the encrypted query information to the second electronic device;
接收第二电子设备的反馈信息包括:Receiving feedback information from the second electronic device includes:
接收第二电子设备发送的加密的反馈信息,加密的反馈信息为第二电子设备通过对称会话密钥对反馈信息进行加密得到;Receive encrypted feedback information sent by the second electronic device, where the encrypted feedback information is obtained by the second electronic device encrypting the feedback information using the symmetric session key;
通过对称会话秘钥对加密的反馈信息进行解密,得到反馈信息。The encrypted feedback information is decrypted using the symmetric session key to obtain the feedback information.
在一种实施方式中,处理器601在第一电子设备与第二电子设备基于ECDHE-ECDSA算法生成对称会话密钥中,可以执行:生成第一随机数,并生成第一临时私钥和对应的第一临时公钥;In one implementation, when the first electronic device and the second electronic device generate a symmetric session key based on the ECDHE-ECDSA algorithm, the processor 601 may perform: generate a first random number, and generate a first temporary private key and the corresponding the first temporary public key;
将第一随机数、第一临时公钥发送给第二电子设备;Send the first random number and the first temporary public key to the second electronic device;
接收第二电子设备生成的第二随机数、第二临时公钥;Receive the second random number and the second temporary public key generated by the second electronic device;
基于第一临时私钥和第二临时公钥生成第一共享秘密值,第一共享秘密值与第二电子设备基于第二临时私钥和第一临时公钥生成的第二共享秘密值相同;Generate a first shared secret value based on the first temporary private key and the second temporary public key, the first shared secret value being the same as the second shared secret value generated by the second electronic device based on the second temporary private key and the first temporary public key;
基于第一共享秘密值、第一随机数、第二随机数生成对称会话秘钥。Generate a symmetric session key based on the first shared secret value, the first random number, and the second random number.
在一种实施方式中,第一电子设备包括第一长期私钥和对应的第一长期公钥,处理器601在将第一随机数、第一临时公钥发送给第二电子设备中,可以执行:若第一电子设备与第二电子设备第一次生成对称会话密钥,通过第一长期私钥将第一电子设备的第一标识信息、第一临时公钥、第一随机数、第一长期公钥进行签名,得到第一签名值;In one implementation, the first electronic device includes a first long-term private key and a corresponding first long-term public key. When sending the first random number and the first temporary public key to the second electronic device, the processor 601 can Execution: If the first electronic device and the second electronic device generate a symmetric session key for the first time, use the first long-term private key to combine the first identification information of the first electronic device, the first temporary public key, the first random number, and the first random number. Sign with a long-term public key to obtain the first signature value;
将第一标识信息、第一临时公钥、第一随机数、第一长期公钥和第一签名值发送第二电子设备,以使第二电子设备通过第一长期公钥对第一签名值进行校验通过之后,确认接收到正确的第一标识信息、第一临时公钥、第一随机数和第一长期公钥,并将第一长期公钥和第一标识信息进行关联和保存;The first identification information, the first temporary public key, the first random number, the first long-term public key and the first signature value are sent to the second electronic device, so that the second electronic device uses the first long-term public key to verify the first signature value. After passing the verification, confirm receipt of the correct first identification information, first temporary public key, first random number and first long-term public key, and associate and save the first long-term public key and the first identification information;
若第一电子设备与第二电子设备第二次及以后生成对称会话密钥,则通过第一长期私钥将第一标识信息、第一临时公钥、第一随机数进行签名,得到第二签名值;If the first electronic device and the second electronic device generate a symmetric session key for the second and subsequent times, the first identification information, the first temporary public key, and the first random number are signed using the first long-term private key to obtain the second signature value;
将第一标识信息、第一临时公钥、第一随机数和第二签名值发送第二电子设备,以使第二电子设备根据接收到的第一标识信息获取第一长期公钥,并通过第一长期公钥对第二签名值进行校验通过之后,确认接收到正确的第一电子设备的第一临时公钥、第一随机数。Send the first identification information, the first temporary public key, the first random number and the second signature value to the second electronic device, so that the second electronic device obtains the first long-term public key according to the received first identification information and passes After the first long-term public key passes the verification of the second signature value, it is confirmed that the correct first temporary public key and first random number of the first electronic device have been received.
在本实施例中,第二电子设备包括第二长期私钥和对应的第二长期公钥,处理器601在接收第二电子设备生成的第二随机数、第二临时公钥中,可以执行:若第一电子设备与第二电子设备第一次生成对称会话密钥,接收第二电子设备发送的第二电子设备的第二标识信息、第二临时公钥、第二随机数、第二长期公钥和第三签名值,第三签名值为第二电子设备通过第二长期私钥将第二标识信息、第二临时公钥、第二随机数、第二长期公钥进行签名得到;In this embodiment, the second electronic device includes a second long-term private key and a corresponding second long-term public key. In receiving the second random number and the second temporary public key generated by the second electronic device, the processor 601 can execute : If the first electronic device and the second electronic device generate a symmetric session key for the first time, receive the second identification information, the second temporary public key, the second random number and the second random number of the second electronic device sent by the second electronic device. The long-term public key and the third signature value, the third signature value is obtained by the second electronic device signing the second identification information, the second temporary public key, the second random number, and the second long-term public key through the second long-term private key;
通过第二长期公钥对第三签名值进行校验通过之后,确定接收到正确的第二标识信息、第二临时公钥、第二随机数和第二长期公钥,并将第二长期公钥和第二标识信息进行关联和保存;After the third signature value is verified through the second long-term public key, it is determined that the correct second identification information, the second temporary public key, the second random number and the second long-term public key are received, and the second long-term public key is received. The key and the second identification information are associated and saved;
若第一电子设备与第二电子设备第二次及以后生成对称会话密钥,接收第二电子设备发送的第二电子设备的第二标识信息、第二临时公钥、第二随机数和第四签名值,第四签名值为第二电子设备通过第二长期私钥将第二标识信息、第二临时公钥、第二随机数进行签名得到;If the first electronic device and the second electronic device generate a symmetric session key for the second and subsequent times, receive the second identification information, the second temporary public key, the second random number and the second random number of the second electronic device sent by the second electronic device. Four signature values, the fourth signature value is obtained by the second electronic device signing the second identification information, the second temporary public key, and the second random number through the second long-term private key;
根据接收到的第二标识信息获取第二长期公钥,并通过第二长期公钥对第四签名值进行校验通过之后,确定接收到正确的第二标识信息、第二临时公钥和第二随机数。The second long-term public key is obtained according to the received second identification information, and after the fourth signature value is verified through the second long-term public key, it is determined that the correct second identification information, the second temporary public key and the third signature value are received. Two random numbers.
在一种实施方式中,第一电子设备包括第一ECC公钥证书,第一ECC公钥证书包括第一长期公钥,第二电子设备包括第二ECC公钥证书,第二ECC公钥证书包括第二长期公钥,处理器600在将第一随机数、第一临时公钥发送给第二电子设备中,可以执行:若第一电子设备与第二电子设备第一次生成对称会话密钥,通过第一长期私钥将第一电子设备的第一标识信息、第一临时公钥、第一随机数、第一ECC公钥证书进行签名,得到第一签名值;In one embodiment, the first electronic device includes a first ECC public key certificate, the first ECC public key certificate includes a first long-term public key, the second electronic device includes a second ECC public key certificate, and the second ECC public key certificate Including the second long-term public key, when sending the first random number and the first temporary public key to the second electronic device, the processor 600 can perform: If the first electronic device and the second electronic device generate a symmetric session key for the first time, Key, use the first long-term private key to sign the first identification information of the first electronic device, the first temporary public key, the first random number, and the first ECC public key certificate to obtain the first signature value;
将第一电子设备的第一标识信息、第一临时公钥、第一随机数、第一ECC公钥证书和第一签名值发送第二电子设备,以使第二电子设备验证第一ECC公钥证书有效,并通过第一ECC公钥证书中的第一长期公钥对第一签名值进行完整性校验通过之后,确定接收到正确的第一标识信息、第一临时公钥、第一随机数和第一ECC公钥证书,并将第一ECC公钥证书和第一标识信息进行关联并保存;The first identification information, the first temporary public key, the first random number, the first ECC public key certificate and the first signature value of the first electronic device are sent to the second electronic device, so that the second electronic device verifies the first ECC public key. The key certificate is valid, and after the integrity check of the first signature value is passed through the first long-term public key in the first ECC public key certificate, it is determined that the correct first identification information, first temporary public key, first The random number and the first ECC public key certificate, and associate and save the first ECC public key certificate and the first identification information;
若第一电子设备与第二电子设备第二次及以后生成对称会话密钥,则通过第一长期私钥将第一电子设备的第一标识信息、第一临时公钥、第一随机数进行签名,得到第二签名值;将第一电子设备的第一标识信息、第一临时公钥、第一随机数和第二签名值发送第二电子设备,以使第二电子设备根据接收到的第一标识信息获取第一ECC公钥证书,并通过第一ECC公钥证书中的第一长期公钥对第二签名值进行完整性校验通过之后,确定接收到正确的第一电子设备的第一临时公钥、第一随机数;If the first electronic device and the second electronic device generate a symmetric session key for the second and subsequent times, the first identification information of the first electronic device, the first temporary public key, and the first random number are processed through the first long-term private key. Sign to obtain the second signature value; send the first identification information, the first temporary public key, the first random number and the second signature value of the first electronic device to the second electronic device, so that the second electronic device can obtain the second signature value according to the received signature. The first identification information obtains the first ECC public key certificate, and after the integrity check of the second signature value passes through the first long-term public key in the first ECC public key certificate, it is determined that the correct first electronic device has been received. The first temporary public key, the first random number;
处理器600在接收第二电子设备生成的第二随机数、第二临时公钥中,可以执行:若第一电子设备与第二电子设备第一次生成对称会话密钥,接收第二电子设备发送的第二电子设备的第二标识信息、第二临时公钥、第二随机数、第二ECC公钥证书和第三签名值,第三签名值为第二电子设备通过第二长期私钥将第二标识信息、第二临时公钥、第二随机数、第二ECC公钥证书进行签名得到;In receiving the second random number and the second temporary public key generated by the second electronic device, the processor 600 may perform: if the first electronic device and the second electronic device generate a symmetric session key for the first time, receive the second electronic device The second identification information of the second electronic device, the second temporary public key, the second random number, the second ECC public key certificate and the third signature value are sent. The third signature value is the second electronic device through the second long-term private key. Sign the second identification information, the second temporary public key, the second random number, and the second ECC public key certificate to obtain;
通过验证第二ECC公钥证书有效,并通过第二长期公钥对第三签名值进行校验通过之后,确定接收到正确的第二标识信息、第二临时公钥、第二随机数和第二ECC公钥证书,并将第二ECC公钥证书和第二标识信息进行关联和保存;By verifying that the second ECC public key certificate is valid and verifying the third signature value through the second long-term public key, it is determined that the correct second identification information, the second temporary public key, the second random number and the third signature value have been received. two ECC public key certificates, and associate and save the second ECC public key certificate and the second identification information;
若第一电子设备与第二电子设备第二次及以后生成对称会话密钥,接收第二电子设备发送的第二标识信息、第二临时公钥、第二随机数和第四签名值,第四签名值为第二电子设备通过第二长期私钥将第二标识信息、第二临时公钥、第二随机数进行签名得到;If the first electronic device and the second electronic device generate a symmetric session key for the second and subsequent times and receive the second identification information, the second temporary public key, the second random number and the fourth signature value sent by the second electronic device, the second The four-signature value is obtained by the second electronic device signing the second identification information, the second temporary public key, and the second random number through the second long-term private key;
根据接收到的第二标识信息获取第二ECC公钥证书,并通过第二ECC公钥证书中的第二长期公钥对第四签名值进行完整性校验通过之后,确定接收到正确的第二标识信息、第二临时公钥、第二随机数。The second ECC public key certificate is obtained according to the received second identification information, and after the integrity check of the fourth signature value is passed through the second long-term public key in the second ECC public key certificate, it is determined that the correct third signature value has been received. 2. identification information, 2nd temporary public key, 2nd random number.
在一种实施方式中,处理器600在将第一随机数、第一临时公钥发送给第二电子设备中,可以执行:将第一随机数、第一时间信息、第一临时公钥发送给第二电子设备,以使第二电子设备判断若第一时间信息处于预设时间范围内,则基于第二临时私钥和第一临时公钥生成的第二共享秘密值;和/或In one implementation, when sending the first random number and the first temporary public key to the second electronic device, the processor 600 may perform: sending the first random number, the first time information, and the first temporary public key. To the second electronic device, so that the second electronic device determines that if the first time information is within the preset time range, the second shared secret value generated based on the second temporary private key and the first temporary public key; and/or
接收第二电子设备生成的第二随机数、第二临时公钥,基于第一临时私钥和第二临时公钥生成第一共享秘密值包括:Receiving the second random number and the second temporary public key generated by the second electronic device, and generating the first shared secret value based on the first temporary private key and the second temporary public key includes:
接收第二电子设备生成的第二随机数、第二时间信息、第二临时公钥,以使第一电子设备判断若第二时间信息处于预设时间范围内,则基于第一临时私钥和第二临时公钥生成第一共享秘密值。Receive the second random number, the second time information, and the second temporary public key generated by the second electronic device, so that the first electronic device determines that if the second time information is within the preset time range, based on the first temporary private key and The second temporary public key generates the first shared secret value.
当电子设备600为第二电子设备时,第二电子设备中的处理器601会按照如下的步骤,将一个或一个以上的计算机程序的进程对应的信息加载到存储器602中,并由处理器601来运行存储在存储器602中的计算机程序,从而实现功能:When the electronic device 600 is a second electronic device, the processor 601 in the second electronic device will load the information corresponding to the process of one or more computer programs into the memory 602 according to the following steps, and the processor 601 will To run the computer program stored in memory 602 to implement the functions:
接收第一电子设备发送的询问信息,询问信息用于询问用户是否同意第一电子设备退出儿童模式;Receive inquiry information sent by the first electronic device, where the inquiry information is used to ask the user whether he agrees with the first electronic device to exit the child mode;
基于询问信息,获取用户的反馈信息,反馈信息包括同意退出儿童模式或不同意退出儿童模式;Based on the inquiry information, obtain the user's feedback information. The feedback information includes agreement to exit the child mode or disagreement to exit the child mode;
向第一电子设备发送反馈信息,以使第一电子设备退出或不退出儿童模式。Send feedback information to the first electronic device so that the first electronic device exits or does not exit the child mode.
请参阅图8,图8为本申请实施例提供的电子设备的第二种结构示意图。电子设备600还包括:射频电路603、显示屏604、控制电路605、输入单元606、音频电路607、传感器608以及电源609。其中,处理器601分别与射频电路603、显示屏606、控制电路605、输入单元606、音频电路607、传感器608以及电源609电性连接。Please refer to FIG. 8 , which is a second structural schematic diagram of an electronic device provided by an embodiment of the present application. The electronic device 600 also includes: a radio frequency circuit 603, a display screen 604, a control circuit 605, an input unit 606, an audio circuit 607, a sensor 608 and a power supply 609. Among them, the processor 601 is electrically connected to the radio frequency circuit 603, the display screen 606, the control circuit 605, the input unit 606, the audio circuit 607, the sensor 608 and the power supply 609 respectively.
射频电路603用于收发射频信号,以通过无线通信与网络设备或其他电子设备进行通信。The radio frequency circuit 603 is used to transmit and receive radio frequency signals to communicate with network equipment or other electronic equipment through wireless communication.
显示屏606可用于显示由用户输入的信息或提供给用户的信息以及电子设备的各种图形用户接口,这些图形用户接口可以由图像、文本、图标、视频和其任意组合来构成。The display screen 606 can be used to display information input by the user or information provided to the user as well as various graphical user interfaces of the electronic device. These graphical user interfaces can be composed of images, text, icons, videos, and any combination thereof.
控制电路605与显示屏604电性连接,用于控制显示屏604显示信息。The control circuit 605 is electrically connected to the display screen 604 and is used to control the display screen 604 to display information.
输入单元606可用于接收输入的数字、字符信息或用户特征信息(例如指纹),以及产生与用户设置以及功能控制有关的键盘、鼠标、操作杆、光学或者轨迹球信号输入。其中,输入单元606可以包括指纹识别模组。The input unit 606 may be used to receive inputted numbers, character information, or user characteristic information (such as fingerprints), and to generate keyboard, mouse, joystick, optical, or trackball signal input related to user settings and function control. The input unit 606 may include a fingerprint recognition module.
音频电路607可通过扬声器、传声器提供用户与电子设备之间的音频接口。其中,音频电路607包括麦克风。麦克风与处理器601电性连接。麦克风用于接收用户输入的语音信息。The audio circuit 607 can provide an audio interface between the user and the electronic device through speakers and microphones. Among them, the audio circuit 607 includes a microphone. The microphone is electrically connected to the processor 601. The microphone is used to receive voice information input by the user.
传感器608用于采集外部环境信息。传感器608可以包括环境亮度传感器、加速度传感器、陀螺仪等传感器中的一种或多种。Sensor 608 is used to collect external environment information. The sensor 608 may include one or more sensors such as an ambient brightness sensor, an acceleration sensor, and a gyroscope.
电源609用于给电子设备600的各个部件供电。在一些实施方式中,电源609可以通过电源管理系统与处理器601逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The power supply 609 is used to power various components of the electronic device 600 . In some embodiments, the power supply 609 can be logically connected to the processor 601 through a power management system, so that functions such as charging, discharging, and power consumption management can be implemented through the power management system.
虽然图中未示出,电子设备600还可以包括摄像头、蓝牙模块等,在此不再赘述。Although not shown in the figure, the electronic device 600 may also include a camera, a Bluetooth module, etc., which will not be described again here.
本申请实施例还提供一种退出儿童模式的系统,包括:第一电子设备以及第二电子设备。An embodiment of the present application also provides a system for exiting child mode, including: a first electronic device and a second electronic device.
该第一电子设备,用于接收退出儿童模式的请求信息,儿童模式为第一电子设备适合儿童使用的工作模式;基于请求信息,向第二电子设备发送询问信息,询问信息用于询问用户是否同意退出儿童模式;接收第二电子设备的反馈信息,反馈信息包括同意退出儿童模式或不同意退出儿童模式;若反馈信息为同意退出儿童模式,则第一电子设备退出儿童模式。The first electronic device is used to receive request information to exit the child mode. The child mode is a working mode suitable for children to use the first electronic device; based on the request information, send inquiry information to the second electronic device, and the inquiry information is used to ask the user whether Agree to exit the children's mode; receive feedback information from the second electronic device, the feedback information includes agreement to exit the children's mode or disagreement to exit the children's mode; if the feedback information is agreement to exit the children's mode, the first electronic device exits the children's mode.
该第二电子设备,用于接收第一电子设备发送的询问信息,询问信息用于询问用户是否同意第一电子设备退出儿童模式;基于询问信息,获取用户的反馈信息,反馈信息包括同意退出儿童模式或不同意退出儿童模式;向第一电子设备发送反馈信息,以使第一电子设备退出或不退出儿童模式。The second electronic device is used to receive inquiry information sent by the first electronic device. The inquiry information is used to inquire whether the user agrees with the first electronic device to exit the child mode; based on the inquiry information, obtain feedback information from the user, and the feedback information includes consent to exit the child mode. mode or does not agree to exit the child mode; sending feedback information to the first electronic device so that the first electronic device exits or does not exit the child mode.
由于该第一电子设备可以执行本申请实施例所提供的任一种退出儿童模式的方法,其具体实现过程详见上述退出儿童模式的方法实施例,此处不再赘述。该第二电子设备可以执行本申请实施例所提供的任一种退出儿童模式的方法,其具体实现过程详见上述退出儿童模式的方法实施例,此处不再赘述。Since the first electronic device can execute any of the methods for exiting the child mode provided by the embodiments of the present application, the specific implementation process can be found in the above-mentioned method embodiments for exiting the child mode, which will not be described again here. The second electronic device can perform any of the methods for exiting the child mode provided by the embodiments of the present application. The specific implementation process can be found in the above-mentioned method embodiments for exiting the child mode, which will not be described again here.
需要说明的是,本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过计算机程序来信息相关的硬件来完成,计算机程序可以存储于计算机可读存储介质中,存储介质可以包括但不限于:只读存储器(ROM,Read Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁盘或光盘等。It should be noted that those of ordinary skill in the art can understand that all or part of the steps in the various methods of the above embodiments can be completed by computer programs and information-related hardware, and the computer programs can be stored in computer-readable storage media. The storage medium may include but is not limited to: read only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk, etc.
此外,本申请中的术语“第一”、“第二”和“第三”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或模块的过程、方法、系统、产品或设备没有限定于已列出的步骤或模块,而是某些实施例还包括没有列出的步骤或模块,或某些实施例还包括对于这些过程、方法、产品或设备固有的其它步骤或模块。In addition, the terms “first”, “second”, “third”, etc. in this application are used to distinguish different objects, rather than describing a specific sequence. Furthermore, the terms "including" and "having" and any variations thereof are intended to cover non-exclusive inclusion. For example, a process, method, system, product or device that includes a series of steps or modules is not limited to the listed steps or modules, but some embodiments also include unlisted steps or modules, or some embodiments Other steps or modules inherent to such processes, methods, products or devices are also included.
以上对本申请实施例所提供的退出儿童模式的方法、退出儿童模式的方法、装置、存储介质及电子设备进行了详细介绍。本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上,本说明书内容不应理解为对本申请的限制。The method for exiting the child mode, the method, the device, the storage medium and the electronic device for exiting the child mode provided by the embodiments of the present application have been introduced in detail. This article uses specific examples to illustrate the principles and implementation methods of the present application. The description of the above embodiments is only used to help understand the method of the present application and its core ideas; at the same time, for those skilled in the art, based on the application of Thoughts, there may be changes in the specific implementation and scope of application. In summary, the content of this specification should not be understood as a limitation of the present application.
Claims (12)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311540468.5A CN117478785A (en) | 2023-11-17 | 2023-11-17 | Methods, devices, storage media and electronic devices for exiting child mode |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311540468.5A CN117478785A (en) | 2023-11-17 | 2023-11-17 | Methods, devices, storage media and electronic devices for exiting child mode |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN117478785A true CN117478785A (en) | 2024-01-30 |
Family
ID=89639583
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202311540468.5A Pending CN117478785A (en) | 2023-11-17 | 2023-11-17 | Methods, devices, storage media and electronic devices for exiting child mode |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN117478785A (en) |
-
2023
- 2023-11-17 CN CN202311540468.5A patent/CN117478785A/en active Pending
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10601795B2 (en) | Service processing method and electronic device | |
| CN109479049B (en) | System, device and method for key provisioning delegation | |
| US10880097B2 (en) | Flexible provisioning of attestation keys in secure enclaves | |
| US12041189B2 (en) | Method for storing and recovering key for blockchain-based system, and device therefor | |
| TWI672648B (en) | Business process method and device, data share system, and storage medium | |
| US12381728B2 (en) | Accessory assisted account recovery | |
| CN115484275B (en) | Dynamic group membership of devices | |
| US9386045B2 (en) | Device communication based on device trustworthiness | |
| WO2021022701A1 (en) | Information transmission method and apparatus, client terminal, server, and storage medium | |
| TWI734854B (en) | Information security verification method, device and system | |
| KR20190104401A (en) | System access using a mobile device | |
| CN105069864A (en) | Door lock control secure communication scheme based on NFC (near field communication) function of smart phone | |
| TWI827906B (en) | Message transmitting system, user device and hardware security module for use therein | |
| CN116547959A (en) | Electronic device for sharing data by using blockchain network and operation method thereof | |
| CN115001841A (en) | Identity authentication method, identity authentication device and storage medium | |
| WO2015019821A1 (en) | Information processing device, information processing method, and computer program | |
| CN117240475A (en) | A communication method, system, equipment and medium for smart door locks | |
| CN108696361A (en) | Configuration method, generation method and the device of smart card | |
| US20150264048A1 (en) | Information processing apparatus, information processing method, and recording medium | |
| TWI633800B (en) | Methods for device pairing and data transmission in handheld communication devices | |
| CN112765628B (en) | Information interaction method and electronic equipment | |
| CN2914498Y (en) | Information security device based on universal serial bus human-computer interaction type device | |
| CN117478785A (en) | Methods, devices, storage media and electronic devices for exiting child mode | |
| CN112449143B (en) | Implementation method and implementation system of secure video | |
| CN101212295B (en) | System, device, and method for applying for electronic evidence and transmitting key for mobile electronic device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |