CN102495983B - Method for encrypting and decrypting data of intelligent mobile terminal in real time - Google Patents

Method for encrypting and decrypting data of intelligent mobile terminal in real time Download PDF

Info

Publication number
CN102495983B
CN102495983B CN201110406400.9A CN201110406400A CN102495983B CN 102495983 B CN102495983 B CN 102495983B CN 201110406400 A CN201110406400 A CN 201110406400A CN 102495983 B CN102495983 B CN 102495983B
Authority
CN
China
Prior art keywords
data
mobile terminal
real
intelligent
intelligent mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110406400.9A
Other languages
Chinese (zh)
Other versions
CN102495983A (en
Inventor
孙紫阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Caiyun Withub Information Technology Co., Ltd.
Original Assignee
孙紫阳
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 孙紫阳 filed Critical 孙紫阳
Priority to CN201110406400.9A priority Critical patent/CN102495983B/en
Publication of CN102495983A publication Critical patent/CN102495983A/en
Application granted granted Critical
Publication of CN102495983B publication Critical patent/CN102495983B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to a method for encrypting and decrypting data of an intelligent mobile terminal; and the method can lead the data stored in the intelligent terminal to be always kept in an encrypting storage state in a non-normal state and belongs to the technical field of security technology of the intelligent mobile terminal. The method comprises the following steps of: step one. storing keys of subscribers in the intelligent terminal, and obtaining and maintaining an IMSI (International Mobile Subscriber Identity) as an original value; step two. respectively encrypting and decrypting data in real time when operating the intelligent terminal; and step three. encrypting and storing data generated in real time; for data extracted from a storage medium of the intelligent mobile terminal, decrypting and restoring data for the normal use of the subscribers after finishing verification. The method is low in using cost and is convenient to operate; according to the method, when the intelligent mobile terminal is normally operated, no manual operation is needed, the real-time decryption is carried out on the data through the IMSI and network verification feedback, encryption and decryption processes are automatically judged and carried out in a system background, the problem that information in the intelligent mobile terminal is stolen is effectively solved, and the privacy of the subscribers is fully protected.

Description

A kind of real-time encrypted method with deciphering of intelligent mobile terminal data
Technical field
The present invention relates to a kind of method that intelligent mobile terminal data are real-time encrypted and decipher, belong to intelligent mobile terminal safety technique field.
Background technology
Development along with 3G technology, smart mobile phone, panel computer are more and more popularized, and its powerful function has been brought in advance application widely, and the more privacy of user is preserved wherein, but due to the also appearance again and again of privacy exposure that terminal loss causes, even case impact is national.Intelligent mobile terminal mainly refers to has installed Android(Android), Symbian(Saipan), mobile phone or the panel computer of IOS (Apple) operating system; Data mainly refer to message registration, address list, photo, picture, video and the alternative document being stored in storage card (SIM, UIM, SD) in terminal and that terminal is carried.
Summary of the invention
Technical matters to be solved by this invention is, the shortcoming existing for above prior art, a kind of method that intelligent mobile terminal data are real-time encrypted and decipher is proposed, make the data of intelligent terminal storage under abnomal condition, remain the state of encrypting storage, being devoted to provides a kind of effective ways for preventing that the privacy of intelligent terminal from revealing.
The technical scheme that the present invention solves above technical matters is: a kind of method that intelligent mobile terminal data are real-time encrypted and decipher is provided, and the method comprises the following steps:
The first step deposits user's secret key in intelligent terminal, and makes intelligent terminal obtain IMSI and remain initial value;
Second step, when intelligent terminal is operated, carries out real-time encrypted and real time decrypting to data respectively;
The 3rd step, is directly encrypted preservation to the data of real-time generation; To extracting data from the storage medium of the moving terminal of intelligence, after completing real-time verification, implement deciphering reduction, for user normally.
The technical scheme that the present invention further limits is: the real-time encrypted method with deciphering of aforesaid intelligent mobile terminal data, and the verification in described the 3rd step comprises the following steps:
Step 1, first checks whether the screen of intelligent terminal locks, if screen locking first requires to carry out unlocking screen;
Step 2, through judgement, if IMSI is consistent with initial value, and the success of the authentication responses of network-feedback, complete data deciphering reduction; Otherwise proceed to step 3;
Step 3, prompting user inputs secret key, and secret key is correct, completes data deciphering reduction; Secret key mistake, the reduction of refusal data deciphering.
Further, the real-time encrypted method with deciphering of aforesaid intelligent mobile terminal data, described storage medium comprises internal memory and external memory, external memory includes the storage cards such as SIM card, UIM card and SD.
The invention has the beneficial effects as follows: use cost of the present invention is low; easy to operate; when normal running intelligent mobile terminal, do not need to increase any operation of end user; by IMSI and network verification feedback log certificate, carry out real-time encrypted and deciphering; the process of encryption and decryption is all carried out at system backstage automatic decision; effectively solved the problem that the information in intelligent mobile terminal is stolen, the user's that adequately protected privacy.
Accompanying drawing explanation
Fig. 1 is the processing flow chart of the embodiment of the present invention.
Embodiment
embodiment 1
The present embodiment provide a kind of intelligent mobile terminal data real-time encrypted and deciphering method, treatment scheme as shown in the figure, the method comprises the following steps: the first step deposits user's secret key in, and makes intelligent terminal obtain IMSI and remain initial value in intelligent terminal; Second step, when intelligent terminal is operated, carries out real-time encrypted and real time decrypting to data respectively; The 3rd step, is directly encrypted preservation to the data of real-time generation; To extracting data from the storage medium of the moving terminal of intelligence, after completing real-time verification, implement deciphering reduction, for user normally.
In deciphering reduction process, by following steps, realized; Step 1, first checks whether the screen of intelligent terminal locks, if screen locking first requires to carry out unlocking screen; Step 2, through judgement, if IMSI is consistent with initial value, and the success of the authentication responses of network-feedback, complete data deciphering reduction; Otherwise proceed to step 3; Step 3, prompting user inputs secret key, and secret key is correct, completes data deciphering reduction; Secret key mistake, the reduction of refusal data deciphering.
The concrete use procedure of the present embodiment: first corresponding program is installed in intelligent terminal, and is set user's secret key, make intelligent terminal obtain IMSI and remain initial value; After intelligent mobile terminal start, this program runs on system backstage; When monitoring intelligent terminal and have incoming call, note or mail transmission/reception, address book modification, photo or video capture, this program is carried out real-time encrypted operation, will increase file newly and extract after respective segments and work out and be saved in storage medium; When monitoring intelligent terminal and have operation message registration, operation note, operation address book, operation video or picture, operation alternative document data to transmit data by modes such as USB, bluetooth, Wi-Fi to outside, first check that whether screen is locked, if screen locking prompting locking, the operation of execution unlocking screen, after unlocking screen, judge that whether IMSI is consistent with initial value, whether the authentication responses of network-feedback is successful, if condition meets, the data that satisfy condition are deciphered automatically, respective segments reduction by extracting in ciphering process, can normally read file; If condition does not meet, prompting input user cipher, after password is correct, file data is deciphered reduction automatically, password mistake, the operation of program refusal.
The present invention carries out real-time guard by IMSI and network verification feedback log certificate to data, after once mobile intelligent terminal is lost, first can prevent leaking of data by the own screen locking function of terminal, can the SIM card in mobile terminal, UIM card be lost efficacy by the mode of reporting the loss in addition, to reach network verification feedback neutralization, thereby data cannot be extracted; In addition when the intelligent mobile terminal of user's use cannot obtain the data of storing in network area extraction terminal, can manually decipher by user cipher, to realize user, in all case can use, eliminate blind spot when this program is used.
In addition to the implementation, the present invention can also have other embodiments.All employings are equal to the technical scheme of replacement or equivalent transformation formation, all drop on the protection domain of requirement of the present invention.

Claims (2)

  1. Intelligent mobile terminal data real-time encrypted and deciphering a method, the method comprises the following steps:
    The first step deposits user's secret key in intelligent terminal,
    Second step, when intelligent terminal is operated, selects the real-time encrypted and real time decrypting of data respectively;
    The 3rd step, is encrypted preservation to the data of real-time generation, to extracting data from the storage medium of the moving terminal of intelligence, after completing verification, implements deciphering reduction, for user normally;
    It is characterized in that:
    In the first step, after depositing user's secret key in, intelligent terminal obtains IMSI and remains initial value;
    In the 3rd step, to the data of real-time generation, give IMSI and be encrypted preservation;
    Verification in described the 3rd step comprises the following steps:
    Step 1, first checks whether the screen of intelligent terminal locks, if screen locking first carries out unlocking screen;
    Step 2, judges that whether IMSI is consistent with initial value, and the no success of authentication responses of network-feedback, if condition meets, completes data deciphering reduction;
    Step 3, if do not meet a wherein condition, refusal operation, prompting user inputs secret key, and secret key is correct, returns to step 2 and completes data deciphering reduction; Secret key mistake, the reduction of refusal data deciphering.
  2. 2. the real-time encrypted method with deciphering of intelligent mobile terminal data according to claim 1, is characterized in that: described storage medium comprises internal memory and external memory.
CN201110406400.9A 2011-12-08 2011-12-08 Method for encrypting and decrypting data of intelligent mobile terminal in real time Expired - Fee Related CN102495983B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110406400.9A CN102495983B (en) 2011-12-08 2011-12-08 Method for encrypting and decrypting data of intelligent mobile terminal in real time

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110406400.9A CN102495983B (en) 2011-12-08 2011-12-08 Method for encrypting and decrypting data of intelligent mobile terminal in real time

Publications (2)

Publication Number Publication Date
CN102495983A CN102495983A (en) 2012-06-13
CN102495983B true CN102495983B (en) 2014-08-27

Family

ID=46187808

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110406400.9A Expired - Fee Related CN102495983B (en) 2011-12-08 2011-12-08 Method for encrypting and decrypting data of intelligent mobile terminal in real time

Country Status (1)

Country Link
CN (1) CN102495983B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102891749A (en) * 2012-09-25 2013-01-23 东莞宇龙通信科技有限公司 Method and communication terminal for data encryption
CN104182706B (en) * 2013-05-24 2019-01-04 中兴通讯股份有限公司 A kind of time slot scrambling, device and the mobile terminal of mobile terminal storage card
CN104239809A (en) * 2013-06-17 2014-12-24 中兴通讯股份有限公司 File protecting method, file protecting device, file decryption method, file decryption device and terminal
CN104135605B (en) * 2013-06-21 2015-08-05 腾讯科技(深圳)有限公司 Photographic method and device
CN104301317B (en) * 2014-10-13 2019-03-08 国家电网公司 Power telecom network scene operation/maintenance data encrypted transmission verification method
CN105577631B (en) * 2015-05-22 2019-12-10 宇龙计算机通信科技(深圳)有限公司 data transmission method and terminal
CN105530637A (en) * 2015-12-11 2016-04-27 北京元心科技有限公司 Method for protecting subscriber privacy of intelligent terminal and intelligent terminal
CN105471894A (en) * 2015-12-28 2016-04-06 国家电网公司 Electric power communication mobile operation and maintenance site data encryption, verification and transmission method
CN109117656A (en) * 2018-08-27 2019-01-01 惠州Tcl移动通信有限公司 A kind of method automatically saving information data, storage medium and mobile terminal

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6356753B1 (en) * 1998-04-24 2002-03-12 Ericsson Inc Management of authentication and encryption user information in digital user terminals
CN101795450A (en) * 2009-02-03 2010-08-04 沈阳晨讯希姆通科技有限公司 Method and device for carrying out security protection on mobile phone data

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100446018C (en) * 2006-07-11 2008-12-24 北京飞天诚信科技有限公司 Secure information storage method and information security apparatus thereof
CN101772018B (en) * 2010-01-21 2016-03-30 中兴通讯股份有限公司 The theft preventing method of theft preventing mobile terminal and mobile terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6356753B1 (en) * 1998-04-24 2002-03-12 Ericsson Inc Management of authentication and encryption user information in digital user terminals
CN101795450A (en) * 2009-02-03 2010-08-04 沈阳晨讯希姆通科技有限公司 Method and device for carrying out security protection on mobile phone data

Also Published As

Publication number Publication date
CN102495983A (en) 2012-06-13

Similar Documents

Publication Publication Date Title
CN102495983B (en) Method for encrypting and decrypting data of intelligent mobile terminal in real time
CN102196422B (en) Method for preventing leakage of lost file of handheld communication terminal
CN108055235A (en) A kind of control method of smart lock, relevant device and system
CN101674575B (en) Method for protecting security of mobile communication terminal data and device thereof
CN104834868A (en) Electronic data protection method, device and terminal equipment
CN102819702B (en) File encryption operation method and file encryption operational system
CN102065148A (en) Memory system access authorizing method based on communication network
CN102938032A (en) Method and system for encrypting and decrypting application program on communication terminal as well as terminal
CN102647279B (en) Encryption method, encrypted card, terminal equipment and interlocking of phone and card device
CN100353787C (en) Security guarantee for memory data information of mobile terminal
US9276748B2 (en) Data-encrypting method and decrypting method for a mobile phone
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
CN103200009A (en) System and method for fingerprint encryption and decryption
CN102136048A (en) Mobile phone Bluetooth-based ambient intelligent computer protection device and method
CN102866960A (en) Method for realizing encryption in storage card, decrypting method and device
CN105405185A (en) Safety verifying method and apparatus thereof
CN101895881B (en) Method for realizing GBA secret key and pluggable equipment of terminal
CN104144411A (en) Encryption and decryption terminal and encryption and decryption method applied to encryption terminal and decryption terminal
KR101281099B1 (en) An Authentication method for preventing damages from lost and stolen smart phones
CN101860850B (en) Method for realizing mobile terminal to lock network or card by utilizing driver
CN101711028B (en) Method for automatically protecting user data on mobile terminal
CN101262669B (en) A secure guarantee method for information stored in a mobile terminal
CN103200562A (en) Communication terminal locking method and communication terminal
CN104955029A (en) Address book protection method, address book protection device and communication system
CN103324971B (en) A kind of smart card system and dynamic key thereof upgrade authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: JIANGSU CAIYUN WITHUB INFORMATION TECHNOLOGY CO.,

Free format text: FORMER OWNER: SUN ZIYANG

Effective date: 20141215

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 210008 NANJING, JIANGSU PROVINCE TO: 210009 NANJING, JIANGSU PROVINCE

TR01 Transfer of patent right

Effective date of registration: 20141215

Address after: 210009 D, 27 floor, No. 68 Shanxi Road, Gulou District, Jiangsu, Nanjing

Patentee after: Jiangsu Caiyun Withub Information Technology Co., Ltd.

Address before: Gulou District of Nanjing City, Jiangsu province 210008 Fu Zuolu No. 5 Building 3 room 103

Patentee before: Sun Ziyang

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140827

Termination date: 20171208