A kind of real-time encrypted method with deciphering of intelligent mobile terminal data
Technical field
The present invention relates to a kind of method that intelligent mobile terminal data are real-time encrypted and decipher, belong to intelligent mobile terminal safety technique field.
Background technology
Development along with 3G technology, smart mobile phone, panel computer are more and more popularized, and its powerful function has been brought in advance application widely, and the more privacy of user is preserved wherein, but due to the also appearance again and again of privacy exposure that terminal loss causes, even case impact is national.Intelligent mobile terminal mainly refers to has installed Android(Android), Symbian(Saipan), mobile phone or the panel computer of IOS (Apple) operating system; Data mainly refer to message registration, address list, photo, picture, video and the alternative document being stored in storage card (SIM, UIM, SD) in terminal and that terminal is carried.
Summary of the invention
Technical matters to be solved by this invention is, the shortcoming existing for above prior art, a kind of method that intelligent mobile terminal data are real-time encrypted and decipher is proposed, make the data of intelligent terminal storage under abnomal condition, remain the state of encrypting storage, being devoted to provides a kind of effective ways for preventing that the privacy of intelligent terminal from revealing.
The technical scheme that the present invention solves above technical matters is: a kind of method that intelligent mobile terminal data are real-time encrypted and decipher is provided, and the method comprises the following steps:
The first step deposits user's secret key in intelligent terminal, and makes intelligent terminal obtain IMSI and remain initial value;
Second step, when intelligent terminal is operated, carries out real-time encrypted and real time decrypting to data respectively;
The 3rd step, is directly encrypted preservation to the data of real-time generation; To extracting data from the storage medium of the moving terminal of intelligence, after completing real-time verification, implement deciphering reduction, for user normally.
The technical scheme that the present invention further limits is: the real-time encrypted method with deciphering of aforesaid intelligent mobile terminal data, and the verification in described the 3rd step comprises the following steps:
Step 1, first checks whether the screen of intelligent terminal locks, if screen locking first requires to carry out unlocking screen;
Step 2, through judgement, if IMSI is consistent with initial value, and the success of the authentication responses of network-feedback, complete data deciphering reduction; Otherwise proceed to step 3;
Step 3, prompting user inputs secret key, and secret key is correct, completes data deciphering reduction; Secret key mistake, the reduction of refusal data deciphering.
Further, the real-time encrypted method with deciphering of aforesaid intelligent mobile terminal data, described storage medium comprises internal memory and external memory, external memory includes the storage cards such as SIM card, UIM card and SD.
The invention has the beneficial effects as follows: use cost of the present invention is low; easy to operate; when normal running intelligent mobile terminal, do not need to increase any operation of end user; by IMSI and network verification feedback log certificate, carry out real-time encrypted and deciphering; the process of encryption and decryption is all carried out at system backstage automatic decision; effectively solved the problem that the information in intelligent mobile terminal is stolen, the user's that adequately protected privacy.
Accompanying drawing explanation
Fig. 1 is the processing flow chart of the embodiment of the present invention.
Embodiment
embodiment 1
The present embodiment provide a kind of intelligent mobile terminal data real-time encrypted and deciphering method, treatment scheme as shown in the figure, the method comprises the following steps: the first step deposits user's secret key in, and makes intelligent terminal obtain IMSI and remain initial value in intelligent terminal; Second step, when intelligent terminal is operated, carries out real-time encrypted and real time decrypting to data respectively; The 3rd step, is directly encrypted preservation to the data of real-time generation; To extracting data from the storage medium of the moving terminal of intelligence, after completing real-time verification, implement deciphering reduction, for user normally.
In deciphering reduction process, by following steps, realized; Step 1, first checks whether the screen of intelligent terminal locks, if screen locking first requires to carry out unlocking screen; Step 2, through judgement, if IMSI is consistent with initial value, and the success of the authentication responses of network-feedback, complete data deciphering reduction; Otherwise proceed to step 3; Step 3, prompting user inputs secret key, and secret key is correct, completes data deciphering reduction; Secret key mistake, the reduction of refusal data deciphering.
The concrete use procedure of the present embodiment: first corresponding program is installed in intelligent terminal, and is set user's secret key, make intelligent terminal obtain IMSI and remain initial value; After intelligent mobile terminal start, this program runs on system backstage; When monitoring intelligent terminal and have incoming call, note or mail transmission/reception, address book modification, photo or video capture, this program is carried out real-time encrypted operation, will increase file newly and extract after respective segments and work out and be saved in storage medium; When monitoring intelligent terminal and have operation message registration, operation note, operation address book, operation video or picture, operation alternative document data to transmit data by modes such as USB, bluetooth, Wi-Fi to outside, first check that whether screen is locked, if screen locking prompting locking, the operation of execution unlocking screen, after unlocking screen, judge that whether IMSI is consistent with initial value, whether the authentication responses of network-feedback is successful, if condition meets, the data that satisfy condition are deciphered automatically, respective segments reduction by extracting in ciphering process, can normally read file; If condition does not meet, prompting input user cipher, after password is correct, file data is deciphered reduction automatically, password mistake, the operation of program refusal.
The present invention carries out real-time guard by IMSI and network verification feedback log certificate to data, after once mobile intelligent terminal is lost, first can prevent leaking of data by the own screen locking function of terminal, can the SIM card in mobile terminal, UIM card be lost efficacy by the mode of reporting the loss in addition, to reach network verification feedback neutralization, thereby data cannot be extracted; In addition when the intelligent mobile terminal of user's use cannot obtain the data of storing in network area extraction terminal, can manually decipher by user cipher, to realize user, in all case can use, eliminate blind spot when this program is used.
In addition to the implementation, the present invention can also have other embodiments.All employings are equal to the technical scheme of replacement or equivalent transformation formation, all drop on the protection domain of requirement of the present invention.