CN103685239A - Real-time encryption and decryption system and real-time encryption and decryption method for mobile products - Google Patents

Real-time encryption and decryption system and real-time encryption and decryption method for mobile products Download PDF

Info

Publication number
CN103685239A
CN103685239A CN201310599842.9A CN201310599842A CN103685239A CN 103685239 A CN103685239 A CN 103685239A CN 201310599842 A CN201310599842 A CN 201310599842A CN 103685239 A CN103685239 A CN 103685239A
Authority
CN
China
Prior art keywords
server end
mobile terminal
data
module
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310599842.9A
Other languages
Chinese (zh)
Inventor
成崇鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201310599842.9A priority Critical patent/CN103685239A/en
Publication of CN103685239A publication Critical patent/CN103685239A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a real-time encryption and decryption system and a real-time encryption and decryption method for mobile products. When a mobile terminal is in an encryption mode, any file data operation refers to downloading encrypted data from a server side and authorizing the mobile terminal to decrypt the encrypted data to display to a user in a clear text mode, and any user operation result is stored in the server side after being encrypted; after the user quits the encryption mode, the mobile terminal cannot contact with the encrypted data, the user enters a common mode, and operation data are stored in the mobile terminal at the moment. According to the real-time encryption and decryption system and the real-time encryption and decryption method, existing operation modes and use habits of the user are not changed, input and output data quantity is not increased, and high safety is achieved.

Description

A kind of real-time encryption and decryption system and method for mobile product
Technical field
The present invention relates to data security field, particularly a kind of real-time encryption and decryption system and method for mobile product.
Background technology
The mobile products such as mobile phone have become us and have lived an indispensable part, and along with hardware is soft, the high speed development of network, mobile product function will be more powerful, will be faced with the threat of information security unavoidably.
Main several cipher modes that at present mobile product such as mobile phone is used have: change the encryption of suffix name, displacement mode, hiding attribute is set, cell-phone lock is encrypted, encryption software (phone smart encrypt etc.) encrypt file.
Can find out, several cipher modes that mobile phone uses at present, basic ideas or traditional " anti-, stifled " pattern, its major defect has two aspects:
1) fail safe is not high.Several cipher modes that the mobile products such as current mobile phone are used, we can crack by other instruments substantially.In fact, these modes are relatively simple at present, for current general user, can also accept, but for the higher client of security requirement, or after popularizing along with cell-phone function is further, these modes cannot meet our security requirement.
2) trivial operations, produces extra inputoutput data amount, efficiency is low.File could be used after must first deciphering, and when checking an encrypt file, must check that plaintext-> deletes process expressly through being decrypted into plaintext->.If need to revise an encrypt file, need the process of encrypting through deciphering-> modification-> preservation->.In these operations, having step over half is the extra work causing because of file encryption.
Real-time encryption and decryption technology (Real Time Encryption/Decryption) be start last century end to occur a kind of encryption technology.This technology encryption and decryption demand to data in user's normal workpiece is processed in real time, there is no explicit encryption and decryption process, does not also produce temporary file.
Summary of the invention
The object of the invention is to the information security hidden danger for mobile products such as mobile phones, a set of brand-new real-time encryption and decryption method is provided, the starting point of its security strategy is not by how preventing that file from being revealed, but all confidential datas are all to encrypt form deposit and use, thereby allowing user enjoying mobile product simultaneously easily, can provide safety guarantee.
In order to achieve the above object, first technical scheme of the present invention is to provide a kind of real-time encryption and decryption system of mobile product, and it comprises:
Server end, and at this server end by the mobile terminal of identity and certification authentication;
Described mobile terminal, is responsible under encryption mode the real-time encrypted one-tenth ciphertext of operating data and is sent to server end, and obtains enciphered data and be decrypted into expressly to carry out data manipulation from described server end;
Described server end, receives the also enciphered data of memory mobile terminal, and returns to its required enciphered data to the mobile terminal by identity and certification authentication.
Preferably, in described mobile terminal, comprise:
User logins module, is responsible for processing the account password information of user interface input, and makes corresponding processing according to returning results in user interface of server end;
Certification authentication module, is responsible for the processing of mobile terminal certificate, and in user interface, server end the result is made to corresponding response, is verified and makes described mobile terminal enter encryption mode;
Data encryption module, is responsible for the real-time encrypted one-tenth ciphertext of any operating result of user under encryption mode preserving to can pass to server end;
Data deciphering module, the encrypt data of being responsible for that server end is transmitted is decrypted into and is expressly shown to user and operates;
Mixed-media network modules mixed-media, the network data sending and receiving of responsible mobile terminal and server end.
Preferably, in described server end, comprise:
Mixed-media network modules mixed-media, the network data of charge server end and mobile terminal sends and data receiver;
Memory module, is responsible for preserving validated user information, safety certificate management information, user encryption data message;
Whether legal subscriber authentication module, be responsible for authentication of users log-on message;
Certification authentication module, is responsible for authentication of users terminal and whether has safety operation authority.
Second technical scheme of the present invention is to provide a kind of mobile product that uses real-time encryption and decryption system;
Described mobile product enters encryption mode after by the server end good authentication identity being connected and certificate, make described mobile product download enciphered data and to be decrypted into expressly to carry out data manipulation from server end, the result of operation is sent to server end preservation after real-time encrypted;
The operating data of described mobile product after exiting encryption mode is kept in this mobile product.
Preferably, described mobile product is mobile phone.
The 3rd technical scheme of the present invention is to provide a kind of real-time encryption and decryption method of mobile product, and it comprises following steps:
1) user of user by mobile terminal logins module and accounts information is sent to enciphered data by the network sending module of mobile terminal preserves server;
2) the network receiver module of server end successfully receives after user account information, in the memory module of the subscriber authentication module contrast server end by server end, whether validated user information database comes interpretation login user legal, and the result is returned to mobile terminal by the network sending module of server end;
3) subscriber authentication legal after, need to be by the mobile terminal certificate of authority certification authentication module by mobile terminal by the network sending module of mobile terminal, send to server end;
The network receiver module of server end successfully receives after certificate of authority information, certificate management database in the memory module of the certification authentication module contrast server end of server end, and the result returns to mobile terminal by the network sending module of server end;
4) after being verified, enter mobile terminal encryption mode, user is the data to server end request current operation interface by the network sending module of mobile terminal;
Enciphered data database in server end solution rope memory module, the data that afterwards solution rope gone out return to mobile terminal;
The network receiver module of mobile terminal successfully receives after return data, and the deciphering module that calls mobile terminal is parsed and is expressly shown to user;
5) user is encrypted to encrypt data by the encrypting module that starts mobile terminal at mobile terminal to any operating result expressly, and the network sending module by mobile terminal sends to server end;
The network receiver module of server end is saved in the enciphered data database in memory module by the encrypt data receiving;
6) operate mobile terminal and exited encryption mode.
Preferably, mobile terminal carries out all real-time encrypted one-tenth ciphertexts be sent to server end and preserve of operating result newly-built, that browse, edit or preserve to data under encryption mode.
A set of real-time encryption and decryption technical solution that the present invention designs for mobile products such as mobile phones.This scheme main advantage is:
1) completely transparent user experiences.User when the encrypt file using based on real-time encryption and decryption technology with general clear text file sensuously without any difference, after this file encryption, be called " transparent " with the identical user's experience of non-encrypted file in the use.Transparent user experiences and means that user does not need to change their existing mode of operation and use habit because of using secrecy system.
2) fail safe is higher.When using encrypt file, there is no the decrypting process on memory, therefore the encrypt file on memory is can be not decrypted because of use, even if the current file just in use of operator does not have clear data yet and exists on memory, the relative conventional encryption technique of this feature has higher fail safe.Conventional encryption technique is because encrypt file is deciphered in use and become clear text file, and therefore in use without any protection, the most under attack causing divulged a secret.
3) do not increase inputoutput data amount.Real-time encryption and decryption technology is when application requests encrypted file data and non-decrypting whole encrypt file, but deciphering as required only provides instant operation required clear data to application program.
Accompanying drawing explanation
Fig. 1 is mobile terminal structure schematic diagram in real-time encryption and decryption system of the present invention;
Fig. 2 is server end structural representation in real-time encryption and decryption system of the present invention;
Fig. 3 is the flow chart of real-time encryption and decryption method of the present invention;
Fig. 4 is the design sketch of real-time encryption and decryption method of the present invention.
Embodiment
For portable mobile product, for example mobile phone, is divided into general data and enciphered data by its data in the present invention.General data is kept on user mobile phone, and enciphered data is kept at server end.
When user is connected to enciphered data server end, and by after authentication and mobile phone certification authentication, mobile phone will enter encryption mode, under this pattern, the operation of any document data (comprise newly-built, browse, edit, change etc.) be all to download enciphered data from server end, after authorizing mobile phone terminal deciphering, be expressly shown to user, and any operating result of user will be kept at server end after encryption.
When user exits after encryption mode, mobile phone terminal cannot touch enciphered data, and user enters general mode, and at this time operating data is kept at user mobile phone.
Real-time encryption and decryption equipment of the present invention, comprises: two parts of mobile terminal and server end:
As shown in Figure 1, in mobile terminal, comprise following module:
1) user logins module, is responsible for processing the account password information of user interface input, and makes corresponding processing according to returning results in user interface of server end.
2) certification authentication module, is responsible for the processing of mobile terminal certificate, can make corresponding response to server end the result in user interface simultaneously, is verified and enters under encryption mode.
3) data encryption module, user enters any operating result under encryption mode and real-time this module encrypt of passing through is become ciphertext to pass to server end to preserve.
4) data deciphering module, the encrypt data of being responsible for server end to transmit is decrypted, and the plaintext after deciphering is the most at last shown to user and operates.
5) mixed-media network modules mixed-media, the network data transmission of responsible mobile terminal and server end, carries out data transmission and data receiver by network sending module and network receiver module correspondence.
As shown in Figure 2, the following module of Server Side Include:
1) mixed-media network modules mixed-media, the network data transmission of charge server end and mobile terminal, carries out data transmission and data receiver by network sending module and network receiver module correspondence.
2) memory module, is responsible for preserving validated user information, safety certificate management information, user encryption data message.
3) whether legal subscriber authentication module, be responsible for authentication of users log-on message.
4) certification authentication module, is responsible for authentication of users terminal and whether has safety operation authority.
The flow chart of the present invention under encryption mode be as shown in Figure 3:
1) user of user by mobile terminal logins module and accounts information is sent to enciphered data by the network sending module of mobile terminal preserves server,
2) the network receiver module of server end successfully receives after user account information, in subscriber authentication module contrast memory module by server end, whether validated user information database comes interpretation login user legal, and the result is returned to mobile terminal by the network sending module of server end.
3) subscriber authentication legal after, the mobile terminal certificate of authority need to be sent to server end by certification authentication module by the network sending module of mobile terminal, the network receiver module of server end successfully receives after certificate of authority information, certificate management database in certification authentication module contrast memory module, the result returns to mobile terminal by the network sending module of server end.
4) after being verified, enter mobile terminal encryption mode, user is the data to server request current operation interface by the network sending module of mobile terminal, and server end will be separated enciphered data database in rope memory module, return to mobile terminal afterwards by separating the data that rope goes out.The network receiver module of mobile terminal successfully receives after return data, and the deciphering module that calls mobile terminal is parsed and is expressly shown to user.
5) user is encrypted to encrypt data by the encrypting module that starts mobile terminal to any operation expressly (newly-built, browse, edit, preservation etc.) result, network sending module by mobile terminal sends to server end, and the network receiver module of server end is saved in the encrypt data receiving enciphered data database in the memory module of server end.In the present invention, the design sketch of file real-time encryption and decryption as shown in Figure 4.
6) operated and exited encryption mode.
Although content of the present invention has been done detailed introduction by above preferred embodiment, will be appreciated that above-mentioned description should not be considered to limitation of the present invention.Those skilled in the art, read after foregoing, for multiple modification of the present invention with to substitute will be all apparent.Therefore, protection scope of the present invention should be limited to the appended claims.

Claims (7)

1. a real-time encryption and decryption system for mobile product, is characterized in that, comprises:
Server end, and at this server end by the mobile terminal of identity and certification authentication;
Described mobile terminal, is responsible under encryption mode the real-time encrypted one-tenth ciphertext of operating data and is sent to server end, and obtains enciphered data and be decrypted into expressly to carry out data manipulation from described server end;
Described server end, receives the also enciphered data of memory mobile terminal, and returns to its required enciphered data to the mobile terminal by identity and certification authentication.
2. real-time encryption and decryption system as claimed in claim 1, is characterized in that,
In described mobile terminal, comprise:
User logins module, is responsible for processing the account password information of user interface input, and makes corresponding processing according to returning results in user interface of server end;
Certification authentication module, is responsible for the processing of mobile terminal certificate, and in user interface, server end the result is made to corresponding response, is verified and makes described mobile terminal enter encryption mode;
Data encryption module, is responsible for the real-time encrypted one-tenth ciphertext of any operating result of user under encryption mode preserving to can pass to server end;
Data deciphering module, the encrypt data of being responsible for that server end is transmitted is decrypted into and is expressly shown to user and operates;
Mixed-media network modules mixed-media, the network data sending and receiving of responsible mobile terminal and server end.
3. real-time encryption and decryption system as claimed in claim 1 or 2, is characterized in that,
In described server end, comprise:
Mixed-media network modules mixed-media, the network data of charge server end and mobile terminal sends and data receiver;
Memory module, is responsible for preserving validated user information, safety certificate management information, user encryption data message;
Whether legal subscriber authentication module, be responsible for authentication of users log-on message;
Certification authentication module, is responsible for authentication of users terminal and whether has safety operation authority.
4. a mobile product that uses real-time encryption and decryption system, is characterized in that,
Described mobile product enters encryption mode after by the server end good authentication identity being connected and certificate, make described mobile product download enciphered data and to be decrypted into expressly to carry out data manipulation from server end, the result of operation is sent to server end preservation after real-time encrypted;
The operating data of described mobile product after exiting encryption mode is kept in this mobile product.
5. mobile product as claimed in claim 4, is characterized in that,
Described mobile product is mobile phone.
6. a real-time encryption and decryption method for mobile product, is characterized in that, comprises following steps:
1) user of user by mobile terminal logins module and accounts information is sent to enciphered data by the network sending module of mobile terminal preserves server;
2) the network receiver module of server end successfully receives after user account information, in the memory module of the subscriber authentication module contrast server end by server end, whether validated user information database comes interpretation login user legal, and the result is returned to mobile terminal by the network sending module of server end;
3) subscriber authentication legal after, need to be by the mobile terminal certificate of authority certification authentication module by mobile terminal by the network sending module of mobile terminal, send to server end;
The network receiver module of server end successfully receives after certificate of authority information, certificate management database in the memory module of the certification authentication module contrast server end of server end, and the result returns to mobile terminal by the network sending module of server end;
4) after being verified, enter mobile terminal encryption mode, user is the data to server end request current operation interface by the network sending module of mobile terminal;
Enciphered data database in server end solution rope memory module, the data that afterwards solution rope gone out return to mobile terminal;
The network receiver module of mobile terminal successfully receives after return data, and the deciphering module that calls mobile terminal is parsed and is expressly shown to user;
5) user is encrypted to encrypt data by the encrypting module that starts mobile terminal at mobile terminal to any operating result expressly, and the network sending module by mobile terminal sends to server end;
The network receiver module of server end is saved in the enciphered data database in memory module by the encrypt data receiving;
6) operate mobile terminal and exited encryption mode.
7. real-time encryption and decryption method as claimed in claim 6, is characterized in that,
Mobile terminal carries out all real-time encrypted one-tenth ciphertexts be sent to server end and preserve of operating result newly-built, that browse, edit or preserve to data under encryption mode.
CN201310599842.9A 2013-11-25 2013-11-25 Real-time encryption and decryption system and real-time encryption and decryption method for mobile products Pending CN103685239A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310599842.9A CN103685239A (en) 2013-11-25 2013-11-25 Real-time encryption and decryption system and real-time encryption and decryption method for mobile products

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310599842.9A CN103685239A (en) 2013-11-25 2013-11-25 Real-time encryption and decryption system and real-time encryption and decryption method for mobile products

Publications (1)

Publication Number Publication Date
CN103685239A true CN103685239A (en) 2014-03-26

Family

ID=50321554

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310599842.9A Pending CN103685239A (en) 2013-11-25 2013-11-25 Real-time encryption and decryption system and real-time encryption and decryption method for mobile products

Country Status (1)

Country Link
CN (1) CN103685239A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105337964A (en) * 2015-09-30 2016-02-17 宇龙计算机通信科技(深圳)有限公司 Data security protection method and device
CN106022806A (en) * 2016-05-27 2016-10-12 乐视控股(北京)有限公司 Mobile terminal examination method and device, and electronic terminal
CN106357678A (en) * 2016-10-24 2017-01-25 宇龙计算机通信科技(深圳)有限公司 Cloud encryption storage method for intelligent terminal and intelligent terminal
CN107666389A (en) * 2017-09-16 2018-02-06 杭州弼木建筑科技有限公司 A kind of structural strengthening model lightweight secrecy system based on BIM

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098295A (en) * 2010-12-28 2011-06-15 上海华御信息技术有限公司 Method for improving data security under SaaS application

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098295A (en) * 2010-12-28 2011-06-15 上海华御信息技术有限公司 Method for improving data security under SaaS application

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105337964A (en) * 2015-09-30 2016-02-17 宇龙计算机通信科技(深圳)有限公司 Data security protection method and device
CN105337964B (en) * 2015-09-30 2019-06-11 宇龙计算机通信科技(深圳)有限公司 The guard method of data safety and device
CN106022806A (en) * 2016-05-27 2016-10-12 乐视控股(北京)有限公司 Mobile terminal examination method and device, and electronic terminal
CN106357678A (en) * 2016-10-24 2017-01-25 宇龙计算机通信科技(深圳)有限公司 Cloud encryption storage method for intelligent terminal and intelligent terminal
CN107666389A (en) * 2017-09-16 2018-02-06 杭州弼木建筑科技有限公司 A kind of structural strengthening model lightweight secrecy system based on BIM

Similar Documents

Publication Publication Date Title
US10142107B2 (en) Token binding using trust module protected keys
CN101051904B (en) Method for landing by account number cipher for protecting network application sequence
CN109347835A (en) Information transferring method, client, server and computer readable storage medium
CN103259651B (en) A kind of method and system to terminal data encryption and decryption
CN104917741B (en) A kind of plain text document public network secure transmission system based on USBKEY
CN109547198B (en) System for network transmission video file
CN111770088A (en) Data authentication method, device, electronic equipment and computer readable storage medium
CN103237305B (en) Password protection method for smart card on facing moving terminal
CN108111497A (en) Video camera and server inter-authentication method and device
CN108809633B (en) Identity authentication method, device and system
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN110868291B (en) Data encryption transmission method, device, system and storage medium
CN109684129B (en) Data backup recovery method, storage medium, encryption machine, client and server
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN107579903B (en) Picture message secure transmission method and system based on mobile device
CN106506479B (en) Method, system and the client of cipher authentication, server and smart machine
CN103701596A (en) Document access method, system and equipment and document access request response method, system and equipment
CN112597523B (en) File processing method, file conversion encryption machine, terminal, server and medium
CN103327034A (en) Safe login method, system and device
CN102404337A (en) Data encryption method and device
CN112564887A (en) Key protection processing method, device, equipment and storage medium
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
US20020021804A1 (en) System and method for data encryption
Fauziah et al. Design and implementation of AES and SHA-256 cryptography for securing multimedia file over android chat application
CN113726725A (en) Data encryption and decryption method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140326