CN105069365A - Data processing method and mobile terminal - Google Patents

Data processing method and mobile terminal Download PDF

Info

Publication number
CN105069365A
CN105069365A CN201510386842.XA CN201510386842A CN105069365A CN 105069365 A CN105069365 A CN 105069365A CN 201510386842 A CN201510386842 A CN 201510386842A CN 105069365 A CN105069365 A CN 105069365A
Authority
CN
China
Prior art keywords
data
priority
mobile terminal
importance
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510386842.XA
Other languages
Chinese (zh)
Inventor
张海平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510386842.XA priority Critical patent/CN105069365A/en
Publication of CN105069365A publication Critical patent/CN105069365A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a data encryption method. The data encryption method comprises steps of reading data stored in the mobile terminal; determining the significance priority of the data; and carrying out encryption processing to the data according to the significance priority of the data. The invention also discloses a mobile terminal. In this way, the data can be encrypted according to the determined significance priority of the data, and therefore when a lot of data is encrypted, the lot of data is encrypted by means of the significance priority of the data, the encryption process is simplified, the data having the same significance priority can use the same password, and therefore the number of passwords is reduced, and the passwords used in the encryption process can be remembered easily.

Description

A kind of method of data processing and mobile terminal
Technical field
The embodiment of the present invention relates to technical field of electronic equipment, refers more particularly to a kind of method and mobile terminal of data processing.
Background technology
Along with the development of science and technology, mobile terminal (as mobile phone, panel computer, Intelligent worn device etc.) is more and more universal, meanwhile, function also from strength to strength, develops the electronic portable device becoming a kind of integrated multifunction from a kind of simple means of communication.
In life, different pieces of information in mobile terminal is being carried out in the process of different encryptions, different data may adopt different cipher modes, thus, there will be following situation, some data may adopt digital encryption, some data may adopt encrypting fingerprint, and some data may adopt voice encryption, thus, data acquisition multitude of different ways is encrypted comparatively loaded down with trivial details, and easily forgets Password.
Summary of the invention
Embodiments provide a kind of method and mobile terminal of data processing, in the process be all encrypted a fairly large number of data, simplify ciphering process, meanwhile, make the password used in encrypting be easier to remember.
Embodiment of the present invention first aspect discloses a kind of method of data processing, comprising:
Read the data stored in mobile terminal;
Determine the importance priority of described data;
Importance priority according to described data is encrypted described data.
Correspondingly, embodiment of the present invention second aspect discloses a kind of mobile terminal, comprising:
Reading unit, for reading the data stored in mobile terminal;
Determining unit, for determining the importance priority of the data that described reading unit reads;
Ciphering unit, for being encrypted described data according to the importance priority of described determining unit established data.
The embodiment of the present invention reads the data stored in mobile terminal; Determine the importance priority of described data; Importance priority according to described data is encrypted described data.So, can be encrypted data according to the importance priority of established data, thus, in the process be encrypted a fairly large number of data, the importance priority of usage data is encrypted, and simplifies ciphering process, and the data of same importance priority can adopt same password, thus, decrease password quantity, make the password used in encrypting be easier to remember.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment, description below, apparently, accompanying drawing in the following describes is only some embodiments of the embodiment of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
The schematic flow sheet of the first embodiment of the method for a kind of data processing that Fig. 1 provides for the embodiment of the present invention;
The schematic flow sheet of the second embodiment of the method for a kind of data processing that Fig. 2 provides for the embodiment of the present invention;
The schematic flow sheet of the 3rd embodiment of the method for a kind of data processing that Fig. 3 provides for the embodiment of the present invention;
The structural representation of the first embodiment of a kind of mobile terminal that Fig. 4 a provides for the embodiment of the present invention;
The another structural representation of the first embodiment of a kind of mobile terminal that Fig. 4 b provides for the embodiment of the present invention;
The structural representation of the second embodiment of a kind of mobile terminal that Fig. 5 provides for the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only embodiment of the present invention part embodiment, instead of whole embodiments.Based on the embodiment in the embodiment of the present invention, those of ordinary skill in the art are not making the every other embodiment obtained under creative work prerequisite, all belong to the scope of embodiment of the present invention protection.
In realization, in the embodiment of the present invention, mobile terminal can include but not limited to: notebook computer, mobile phone, panel computer, intelligent wearable device etc.The system of mobile terminal refers to the operating system of equipment, can include but not limited to: android system, Saipan system, Windows system, IOS (Mobile operating system of Apple's exploitation), XP system, windows8 system etc.It should be noted that, Android mobile terminal refers to the mobile terminal of android system, and Saipan mobile terminal refers to the mobile terminal of Saipan system, etc.Above-mentioned mobile terminal is only citing, and non exhaustive, including but not limited to above-mentioned mobile terminal.
Embodiment of the present invention composition graphs 1 to Fig. 5 is described the method for a kind of data processing that the embodiment of the present invention provides and mobile terminal.
Refer to Fig. 1, Fig. 1 is the first embodiment schematic flow sheet of the method for a kind of data processing that the embodiment of the present invention provides.The method of the data processing described in the present embodiment, comprises the following steps:
The data stored in S101, reading mobile terminal.
In specific implementation, mobile terminal can read the data stored in this mobile terminal.In practical application, not all data all need encryption, and generally, the data that need encrypt are all significant datas or are not easy to for privacy object the data that stranger consults.Alternatively, the type of data can include but are not limited to: word data, excel data, image data, video data, voice data, file, application program, desktop shortcuts etc.
S102, determine the importance priority of described data.
In specific implementation, mobile terminal can determine the importance priority of data, and further, importance priority can be divided into the first priority, the second priority, the 3rd priority.Wherein, the first priority is higher than the second priority, and the second priority is higher than the 3rd priority.Under normal circumstances, can think that the first priority data is equivalent to the data that in mobile terminal, importance is the highest, this data deciphering difficulty is maximum, can think that this partial data does not wish that others sees easily; Second priority data is equivalent to significant data general in mobile terminal, but this partial data can allow good friend see, this partial data deciphering difficulty is less relative to the first priority; And the 3rd priority can be regarded as general data, this partial data can disclose.
Alternatively, mobile terminal carries out the importance priority of these data of determination of mark mode to data by user, and such as, the data markers that mobile terminal reads by user is the first priority.Further alternatively, if unessential data, user can not mark these data.
Alternatively, image data, by the importance priority of the type determination data according to data, such as, can be the first priority by mobile terminal, or, video data can be defined as the second priority.Further alternatively, if unessential data, then can unlike the priority determining these data.
S103, according to the importance priority of described data, described data to be encrypted.
In specific implementation, mobile terminal can be encrypted these data according to the importance priority of established data, if these data are the first priority, the cipher mode of the first priority can be adopted to carry out the first encryption to these data.
Such as, time mobile terminal is encrypted data, mobile terminal can first read the data stored in mobile terminal, then determines the importance priority of these data; Importance priority according to these data is encrypted these data.Namely, suppose that mobile terminal have read M data, wherein, N number of data are the data of the first priority, M is greater than N, and N is greater than 1, M and N is integer, then mobile terminal first cryptographic algorithm that the first priority can be adopted corresponding and these N number of data of the first double secret key are encrypted, wherein, N number of key can be pre-set by system, thus, all need not must obtain key in the importance priority determining data at every turn, thus, N number of data can adopt same key to be encrypted, and this is in decrypting process, and user does not need to remember too many password.As long as namely mobile terminal determines the importance priority of the data that it reads, just can be encrypted these data according to the importance priority of these data.
The embodiment of the present invention reads the data stored in mobile terminal; Determine the importance priority of described data; Importance priority according to described data is encrypted described data.So, can be encrypted data according to the importance priority of established data, thus, in the process be encrypted a fairly large number of data, the importance priority of usage data is encrypted, and simplifies ciphering process, and the data of same importance priority can adopt same password, thus, decrease password quantity, make the password used in encrypting be easier to remember.
Refer to Fig. 2, Fig. 2 is the second embodiment schematic flow sheet of the method for a kind of data processing that the embodiment of the present invention provides.The method of the data processing described in the present embodiment, comprises the following steps:
The data stored in S201, reading mobile terminal.
In specific implementation, mobile terminal can read the data stored in this mobile terminal.In practical application, not all data all need encryption, and generally, the data that need encrypt are all significant datas or are not easy to for privacy object the data that stranger consults.Alternatively, the type of data can include but are not limited to: word data, excel data, image data, video data, voice data, file, application program, desktop shortcuts etc.
S202, obtain the label information of described data correlation.
In specific implementation, mobile terminal can obtain the label information of data correlation, and the label information of data correlation can be: data type (i.e. picture, video, webpage etc.), Data Date, size of data, Data Source, versions of data etc.
S203, described label information and preset importance priority list are compared the importance priority obtaining described data.
In specific implementation, label information and preset importance priority list can be compared the importance priority obtaining described data by mobile terminal.Such as, preset importance priority list can shape as picture first priority, video second priority.And then, suppose, the label information of the data correlation that mobile terminal reads is picture, and this identification information and preset importance priority list can be compared by mobile terminal, thus, can determine that the importance priority of these data is the first priority.
S204, according to the importance priority of described data, described data to be encrypted.
In specific implementation, mobile terminal can be encrypted these data according to the importance priority of established data, if these data are the first priority, the cipher mode of the first priority can be adopted to carry out the first encryption to these data.
The embodiment of the present invention reads the data stored in mobile terminal; Obtain the label information of described data correlation; Described label information and preset importance priority list are compared the importance priority obtaining described data; Importance priority according to described data is encrypted described data.So, can be encrypted data according to the importance priority of established data, thus, in the process be encrypted a fairly large number of data, the importance priority of usage data is encrypted, and simplifies ciphering process, and the data of same importance priority can adopt same password, thus, decrease password quantity, make the password used in encrypting be easier to remember.
Refer to Fig. 3, Fig. 3 is the 3rd embodiment schematic flow sheet of the method for a kind of data processing that the embodiment of the present invention provides.The method of the data processing described in the present embodiment, comprises the following steps:
The data stored in S301, reading mobile terminal.
In specific implementation, mobile terminal can read the data stored in this mobile terminal.In practical application, not all data all need encryption, and generally, the data that need encrypt are all significant datas or are not easy to for privacy object the data that stranger consults.Alternatively, the type of data can include but are not limited to: word data, excel data, image data, video data, voice data, file, application program, desktop shortcuts etc.
S302, determine the importance priority of described data.
In specific implementation, mobile terminal can determine the importance priority of data, and further, importance priority can be divided into the first priority, the second priority, the 3rd priority.Wherein, the first priority is higher than the second priority, and the second priority is higher than the 3rd priority.Under normal circumstances, can think that the first priority data is equivalent to the data that in mobile terminal, importance is the highest, this data deciphering difficulty is maximum, can think that this partial data does not wish that others sees easily; Second priority data is equivalent to significant data general in mobile terminal, but this partial data can allow good friend see, this partial data deciphering difficulty is less relative to the first priority; And the 3rd priority can be regarded as general data, this partial data can disclose.
Alternatively, mobile terminal carries out the importance priority of these data of determination of mark mode to data by user, and such as, the data markers that mobile terminal reads by user is the first priority.Further alternatively, if unessential data, user can not mark these data.
Alternatively, mobile terminal, by the importance priority of the type determination data according to data, such as, can will be the first priority from image data, or, video data can be defined as the second priority.Further alternatively, if unessential data, then can unlike the priority determining these data.
S303, when the importance priority of described data is described first priority, according to the first cryptographic algorithm with preset data described in the first double secret key and carry out the first encryption to obtain the first enciphered data.
In specific implementation, mobile terminal data can carry out the first encryption to obtain the first enciphered data according to the first cryptographic algorithm and default first double secret key.Alternatively, first cryptographic algorithm can include but are not limited to: data encryption algorithm is (English: DataEncryptionStandard, abbreviation: DES), IDEA is (English: InternationalDataEncryptionAlgorithm, abbreviation: IDEA), RSA, one-way hash algorithm is (English: Message-DigestAlgorithm5, abbreviation: MD5), Digital Signature Algorithm is (English: DigitalSignatureAlgorithm, abbreviation: DSA) or Advanced Encryption Standard (English: AdvancedEncryptionStandard, abbreviation: AES) etc.
Further, when the importance priority of data is the second priority, mobile terminal can carry out the second encryption to obtain the second enciphered data according to the second cryptographic algorithm and default second double secret key data.Alternatively, the second cryptographic algorithm can include but are not limited to: data encryption algorithm DES, IDEA IDEA, RSA, one-way hash algorithm MD5, Digital Signature Algorithm DSA or Advanced Encryption Standard AES.Alternatively, the character password that to preset the second key be user is arranged for data or the identification information of mobile terminal.Wherein, the identification information of mobile terminal can include but are not limited to: International Mobile Equipment Identity code (InternationalMobileEquipmentIdentity, IMEI), the telephone number of mobile terminal identification, integrated circuit card identification code (IntegrateCircuitCardIdentity, ICCID) and mobile terminal networking license number.Alternatively, the telephone number of mobile terminal identification can be multiple, and such as, the mobile phone of double-card dual-standby can insert two cards.Alternatively, the identification information of mobile terminal can be combination of two in International Mobile Equipment Identity code IMEI, the telephone number of mobile terminal identification, integrated circuit card identification code ICCID and mobile terminal networking license number or other combination in any.Alternatively, the character password that user is arranged for data can include but are not limited to: numeral, letter or symbol.Alternatively, user can include but are not limited to the character password length that file is arranged: 1,2,3-8,6-8, is not less than 3 etc.
Such as, the importance priority that mobile terminal determines the data of reading is the first priority, and the first key is the finger print information that user inputs.As mobile terminal is encrypted a pictures, first key selects the finger print information of the left hand middle finger of user's input, first cryptographic algorithm selects RSA, then mobile terminal can be encrypted picture according to the finger print information of left hand middle finger of the first cryptographic algorithm RSA and user's input.
The embodiment of the present invention reads the data stored in mobile terminal; Determine the importance priority of described data; When the importance priority of described data is described first priority, according to the first cryptographic algorithm and default first double secret key, data carry out the first encryption to obtain the first enciphered data.So, can be encrypted data according to the importance priority of established data, thus, in the process be encrypted a fairly large number of data, the importance priority of usage data is encrypted, and simplifies ciphering process, and the data of same importance priority can adopt same password, thus, decrease password quantity, make the password used in encrypting be easier to remember.
Refer to Fig. 4 a, the structural representation of the first embodiment of a kind of mobile terminal that Fig. 4 a provides for the embodiment of the present invention, the mobile terminal described by Fig. 4 a can comprise: reading unit 401, determining unit 402 and ciphering unit 403, specific as follows:
Reading unit 401, for reading the data stored in mobile terminal.
In specific implementation, reading unit 401 can read the data stored in this mobile terminal.In practical application, not all data all need encryption, and generally, the data that need encrypt are all significant datas or are not easy to for privacy object the data that stranger consults.Alternatively, the type of data can include but are not limited to: word data, excel data, image data, video data, voice data, file, application program, desktop shortcuts etc.
Determining unit 402, for determining the importance priority of the data that described reading unit 401 reads.
In specific implementation, determining unit 402 can determine the importance priority of data, and further, importance priority can be divided into the first priority, the second priority, the 3rd priority.Wherein, the first priority is higher than the second priority, and the second priority is higher than the 3rd priority.Under normal circumstances, can think that the first priority data is equivalent to the data that in mobile terminal, importance is the highest, this data deciphering difficulty is maximum, can think that this partial data does not wish that others sees easily; Second priority data is equivalent to significant data general in mobile terminal, but this partial data can allow good friend see, this partial data deciphering difficulty is less relative to the first priority; And the 3rd priority can be regarded as general data, this partial data can disclose.
Alternatively, determining unit 402 carries out the importance priority of these data of determination of mark mode to data by user, and such as, the data markers that mobile terminal reads by user is the first priority.Further alternatively, if unessential data, user can not mark these data.
Alternatively, determining unit 402, by the importance priority of the type determination data according to data, such as, can will be the first priority from image data, or, video data can be defined as the second priority.Further alternatively, if unessential data, then can unlike the priority determining these data.
Ciphering unit 403, for being encrypted described data according to the importance priority of described determining unit 402 established data.
In specific implementation, ciphering unit 403 can be encrypted these data according to the importance priority of established data, if these data are the first priority, the cipher mode of the first priority can be adopted to carry out the first encryption to these data.
Such as, in the process that ciphering unit 403 pairs of data are encrypted, reading unit 401 can first read the data stored in mobile terminal, and determining unit 402 determines the importance priority of these data again; Ciphering unit 403 is encrypted these data according to the importance priority of these data.Namely, suppose that reading unit 401 have read M data, wherein, N number of data are the data of the first priority, M is greater than N, and N is greater than 1, M and N is integer, then mobile terminal first cryptographic algorithm that the first priority can be adopted corresponding and these N number of data of the first double secret key are encrypted, wherein, N number of cipher key system can pre-set, and thus, all need not must obtain key in the importance priority determining data at every turn, thus, N number of data can adopt same key to be encrypted, and this is in decrypting process, and user does not need to remember too many password.As long as namely determining unit 402 determines the importance priority of the data that it reads, just can be encrypted these data according to the importance priority of these data.
As a kind of possible embodiment, as shown in Figure 4 b, the determining unit 402 of the mobile terminal described in Fig. 4 a can comprise: acquiring unit 4021 and contrast unit 4022, specific as follows:
Acquiring unit 4021, for obtaining the label information of the data correlation that described reading unit 401 reads.
In specific implementation, acquiring unit 4021 can obtain the label information of data correlation, and the label information of data correlation can be: data type (i.e. picture, video, webpage etc.), Data Date, size of data, Data Source, versions of data etc.
Contrast unit 4022, compares to obtain the importance priority of described data for the label information that got by described acquiring unit 4021 and preset importance priority list.
In specific implementation, label information and preset importance priority list can be compared the importance priority obtaining described data by contrast unit 4022.Such as: preset importance priority list can shape as picture first priority, video second priority.And then, suppose, it is picture that acquiring unit 4021 has got the label information of data correlation that reading unit 401 reads, then contrast unit 4022 and this label information and preset importance priority list can be compared and can determine that the importance priority of these data is the first priority.
As a kind of possible embodiment, when the importance priority of data is the first priority, ciphering unit 403 can carry out the first encryption to obtain the first enciphered data according to the first cryptographic algorithm and default first double secret key data.
In specific implementation, mobile terminal data can carry out the first encryption to obtain the first enciphered data according to the first cryptographic algorithm and default first double secret key.Alternatively, the first cryptographic algorithm can include but are not limited to: data encryption algorithm DES, IDEA IDEA, RSA, one-way hash algorithm MD5, Digital Signature Algorithm DSA or Advanced Encryption Standard AES.
Such as, the importance priority that determining unit 402 determines the data of reading is the first priority, and the first key is the finger print information that user inputs.As mobile terminal is encrypted a pictures, first key selects the finger print information of the left hand middle finger of user's input, first cryptographic algorithm selects RSA, then ciphering unit 403 can be encrypted picture according to the finger print information of left hand middle finger of the first cryptographic algorithm RSA and user's input.
As a kind of possible embodiment, when the importance priority of data is the second priority, ciphering unit 403 can carry out the second encryption to obtain the second enciphered data according to the second cryptographic algorithm and default second double secret key data.
In specific implementation, when the importance priority of data is the second priority, mobile terminal can carry out the second encryption to obtain the second enciphered data according to the second cryptographic algorithm and default second double secret key data.Alternatively, the second cryptographic algorithm can include but are not limited to: data encryption algorithm DES, IDEA IDEA, RSA, one-way hash algorithm MD5, Digital Signature Algorithm DSA or Advanced Encryption Standard AES.Alternatively, the character password that to preset the second key be user is arranged for data or the identification information of mobile terminal.Wherein, the identification information of mobile terminal can include but are not limited to: the telephone number of International Mobile Equipment Identity code IMEI, mobile terminal identification, integrated circuit card identification code ICCID and mobile terminal networking license number.Alternatively, the telephone number of mobile terminal identification can be multiple, and such as, the mobile phone of double-card dual-standby can insert two cards.Alternatively, the identification information of mobile terminal can be combination of two in International Mobile Equipment Identity code IMEI, the telephone number of mobile terminal identification, integrated circuit card identification code ICCID and mobile terminal networking license number or other combination in any.Alternatively, the password that user is arranged for data can include but are not limited to: numeral, letter or symbol.Alternatively, user can include but are not limited to the Password Length that file is arranged: 1,2,3-8,6-8, is not less than 3 etc.
Terminal described by the embodiment of the present invention is by reading the data stored in mobile terminal; Determine the importance priority of described data; Importance priority according to described data is encrypted described data.So, can be encrypted data according to the importance priority of established data, thus, in the process be encrypted a fairly large number of data, the importance priority of usage data is encrypted, and simplifies ciphering process, and the data of same importance priority can adopt same password, thus, decrease password quantity, make the password used in encrypting be easier to remember.
Refer to Fig. 5, the structural representation of the second embodiment of a kind of mobile terminal that Fig. 5 provides for the embodiment of the present invention.Mobile terminal described in the present embodiment comprises: at least one input equipment 1000; At least one output device 2000; At least one processor 3000, such as CPU; With storer 4000, above-mentioned input equipment 1000, output device 2000, processor 3000 are connected by bus 5000 with storer 4000.
Wherein, above-mentioned input equipment 1000 can be contact panel, common PC, liquid crystal display, touch screen, push button etc.
Above-mentioned storer 4000 can be high-speed RAM storer, also can be non-labile storer (non-volatilememory), such as magnetic disk memory.Above-mentioned storer 4000 is for storing batch processing code, and above-mentioned input equipment 1000, output device 2000 and processor 3000, for calling the program code stored in storer 4000, perform and operate as follows:
Above-mentioned processor 3000, for:
Read the data stored in mobile terminal;
Determine the importance priority of described data;
Importance priority according to described data is encrypted described data.
In the embodiment that some are feasible, the importance priority of described data determined by above-mentioned processor 3000, is specially:
Obtain the label information of described data correlation;
Described label information and preset importance priority list are compared the importance priority obtaining described data.
In the embodiment that some are feasible, if importance priority at least comprises the first priority and the second priority, and the first priority is higher than described second priority, above-mentioned processor 3000 is encrypted described data according to the importance priority of described data, is specially:
When the importance priority of described data is described first priority, according to the first cryptographic algorithm and default first double secret key, data carry out the first encryption to obtain the first enciphered data;
Or,
When the importance priority of described data is described second priority, according to the second cryptographic algorithm and default second double secret key, data carry out the second encryption to obtain the second enciphered data.
As a kind of possible embodiment, presetting the first key is following at least one: at least both combinations in finger print information, iris information, face information and finger print information, iris information, face information and character password are as key;
As a kind of possible embodiment, the character password that to preset the second key be user is arranged for data or the identification information of mobile terminal.
As a kind of possible embodiment, the first cryptographic algorithm can include but are not limited to: data encryption algorithm DES, IDEA IDEA, RSA, one-way hash algorithm MD5, Digital Signature Algorithm DSA and Advanced Encryption Standard AES;
As a kind of possible embodiment, the second cryptographic algorithm can include but are not limited to: data encryption algorithm DES, IDEA IDEA, RSA, one-way hash algorithm MD5, Digital Signature Algorithm DSA and Advanced Encryption Standard AES.
Mobile terminal described by the embodiment of the present invention is by reading the data stored in mobile terminal; Determine the importance priority of described data; Importance priority according to described data is encrypted described data.So, can be encrypted data according to the importance priority of established data, thus, in the process be encrypted a fairly large number of data, the importance priority of usage data is encrypted, and simplifies ciphering process, and the data of same importance priority can adopt same password, thus, decrease password quantity, make the password used in encrypting be easier to remember.
The embodiment of the present invention also provides a kind of computer-readable storage medium, and wherein, this computer-readable storage medium can have program stored therein, and comprises the part or all of step of any one signal processing method recorded in said method embodiment when this program performs.
In the above-described embodiments, the description of each embodiment is all emphasized particularly on different fields, in certain embodiment, there is no the part described in detail, can see the associated description of other embodiments.
It should be noted that, for aforesaid each embodiment of the method, in order to simple description, therefore it is all expressed as a series of combination of actions, but those skilled in the art should know, the present invention is not by the restriction of described sequence of movement, because according to the present invention, some step may can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in instructions all belongs to preferred embodiment, and involved action and module might not be that the present invention is necessary.
In several embodiments that the application provides, should be understood that, disclosed device, the mode by other realizes.Such as, device embodiment described above is only schematic, the division of such as said units, be only a kind of logic function to divide, actual can have other dividing mode when realizing, such as multiple unit or assembly can in conjunction with or another system can be integrated into, or some features can be ignored, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of device or unit or communication connection can be electrical or other form.
The above-mentioned unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in various embodiments of the present invention can be integrated in a processing unit, also can be that the independent physics of unit exists, also can two or more unit in a unit integrated.Above-mentioned integrated unit both can adopt the form of hardware to realize, and the form of SFU software functional unit also can be adopted to realize.
If above-mentioned integrated unit using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computer read/write memory medium.Based on such understanding, the part that technical scheme of the present invention contributes to prior art in essence in other words or all or part of of this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprise all or part of step of some instructions in order to make a computer equipment (can be personal computer, server or the network equipment etc., can be specifically the processor in computer equipment) perform each embodiment said method of the present invention.Wherein, and aforesaid storage medium can comprise: USB flash disk, portable hard drive, magnetic disc, CD, ROM (read-only memory) are (English: Read-OnlyMemory, abbreviation: ROM) or random access memory (English: RandomAccessMemory, abbreviation: RAM) etc. various can be program code stored medium.
The above, above embodiment only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to previous embodiment to invention has been detailed description, those of ordinary skill in the art is to be understood that: it still can be modified to the technical scheme described in foregoing embodiments, or carries out equivalent replacement to wherein portion of techniques feature; And these amendments or replacement, do not make the essence of appropriate technical solution depart from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (10)

1. a method for data processing, is characterized in that, comprising:
Read the data stored in mobile terminal;
Determine the importance priority of described data;
Importance priority according to described data is encrypted described data.
2. the method for claim 1, the described importance priority determining described data, comprising:
Obtain the label information of described data correlation;
Described label information and preset importance priority list are compared the importance priority obtaining described data.
3. the method for claim 1, is characterized in that, described importance priority at least comprises the first priority and the second priority, wherein, described first priority is higher than described second priority, and the described importance priority according to described data is encrypted described data, comprising:
When the importance priority of described data is described first priority, according to the first cryptographic algorithm and default first double secret key, data carry out the first encryption to obtain the first enciphered data;
Or,
When the importance priority of described data is described second priority, according to the second cryptographic algorithm and default second double secret key, data carry out the second encryption to obtain the second enciphered data.
4. method as claimed in claim 3, it is characterized in that, described default first key is following at least one: at least both combinations in finger print information, iris information, face information and finger print information, iris information, face information and character password are as key;
The identification information of the described character password that to preset the second key be user is arranged for described data or mobile terminal.
5. method as claimed in claim 3, it is characterized in that, described first cryptographic algorithm comprises at least one in following cryptographic algorithm: data encryption algorithm DES, IDEA IDEA, RSA, one-way hash algorithm MD5, Digital Signature Algorithm DSA and Advanced Encryption Standard AES;
Described second cryptographic algorithm comprises at least one in following cryptographic algorithm: data encryption algorithm DES, IDEA IDEA, RSA, one-way hash algorithm MD5, Digital Signature Algorithm DSA and Advanced Encryption Standard AES.
6. a mobile terminal, is characterized in that, comprising:
Reading unit, for reading the data stored in mobile terminal;
Determining unit, for determining the importance priority of the data that described reading unit reads;
Ciphering unit, for being encrypted described data according to the importance priority of described determining unit established data.
7. method as claimed in claim 6, described determining unit comprises:
Acquiring unit, for obtaining the label information of the data correlation that described reading unit reads;
Contrast unit, compares to obtain the importance priority of described data for the label information that got by described acquiring unit and preset importance priority list.
8. method as claimed in claim 6, it is characterized in that, described importance priority at least comprises the first priority and the second priority, wherein, described first priority higher than described second priority, described ciphering unit specifically for:
When the importance priority of described data is described first priority, according to the first cryptographic algorithm and default first double secret key, data carry out the first encryption to obtain the first enciphered data;
Or,
When the importance priority of described data is described second priority, according to the second cryptographic algorithm and default second double secret key, data carry out the second encryption to obtain the second enciphered data.
9. mobile terminal as claimed in claim 8, it is characterized in that, described default first key is following at least one: at least both combinations in finger print information, iris information, face information and finger print information, iris information, face information and character password are as key;
The identification information of the described character password that to preset the second key be user is arranged for described data or mobile terminal.
10. mobile terminal as claimed in claim 8, it is characterized in that, described first cryptographic algorithm comprises at least one in following cryptographic algorithm: data encryption algorithm DES, IDEA IDEA, RSA, one-way hash algorithm MD5, Digital Signature Algorithm DSA and Advanced Encryption Standard AES;
Described second cryptographic algorithm comprises at least one in following cryptographic algorithm: data encryption algorithm DES, IDEA IDEA, RSA, one-way hash algorithm MD5, Digital Signature Algorithm DSA and Advanced Encryption Standard AES.
CN201510386842.XA 2015-06-30 2015-06-30 Data processing method and mobile terminal Pending CN105069365A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510386842.XA CN105069365A (en) 2015-06-30 2015-06-30 Data processing method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510386842.XA CN105069365A (en) 2015-06-30 2015-06-30 Data processing method and mobile terminal

Publications (1)

Publication Number Publication Date
CN105069365A true CN105069365A (en) 2015-11-18

Family

ID=54498728

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510386842.XA Pending CN105069365A (en) 2015-06-30 2015-06-30 Data processing method and mobile terminal

Country Status (1)

Country Link
CN (1) CN105069365A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453663A (en) * 2016-12-13 2017-02-22 宁夏凯速德科技有限公司 Improved cloud service-based storage capacity expansion method and device
CN106656972A (en) * 2016-10-14 2017-05-10 郑州云海信息技术有限公司 Data encryption method and device
CN107171800A (en) * 2017-03-30 2017-09-15 山东超越数控电子有限公司 A kind of scheduling system of multichannel cryptographic algorithm
CN109063458A (en) * 2018-06-30 2018-12-21 北京东方英卡数字信息技术有限公司 A kind of terminal safety method and device of hierarchical information management
CN109120589A (en) * 2018-06-30 2019-01-01 北京东方英卡数字信息技术有限公司 A kind of end message guard method and device based on Crypted password
CN112149095A (en) * 2020-10-26 2020-12-29 上海松鼠课堂人工智能科技有限公司 Student data safety management method and system
CN114430351A (en) * 2022-04-06 2022-05-03 北京快立方科技有限公司 Distributed database node secure communication method and system
WO2022126980A1 (en) * 2020-12-15 2022-06-23 平安科技(深圳)有限公司 Data transmission method and apparatus, terminal, and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1983292A (en) * 2006-04-21 2007-06-20 华为技术有限公司 Method for protecting data while copying mobile-terminal data
US20090262926A1 (en) * 2008-04-16 2009-10-22 Infineon Technologies Ag Method and apparatus for generating a cryptographic key
CN102118503A (en) * 2011-01-25 2011-07-06 宇龙计算机通信科技(深圳)有限公司 Data protection method, device and terminal
CN103886263A (en) * 2014-03-19 2014-06-25 宇龙计算机通信科技(深圳)有限公司 Method and system for protecting data in mobile terminal
CN104134046A (en) * 2014-07-29 2014-11-05 深圳市中兴移动通信有限公司 Encryption method and device
CN104205117A (en) * 2014-04-10 2014-12-10 华为技术有限公司 Device file encryption and decryption method and device
CN104573551A (en) * 2014-12-25 2015-04-29 广东欧珀移动通信有限公司 File processing method and mobile terminal
CN104573535A (en) * 2015-01-04 2015-04-29 深圳市中兴移动通信有限公司 Mobile terminal, and method and device for improving encryption efficiency

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1983292A (en) * 2006-04-21 2007-06-20 华为技术有限公司 Method for protecting data while copying mobile-terminal data
US20090262926A1 (en) * 2008-04-16 2009-10-22 Infineon Technologies Ag Method and apparatus for generating a cryptographic key
CN102118503A (en) * 2011-01-25 2011-07-06 宇龙计算机通信科技(深圳)有限公司 Data protection method, device and terminal
CN103886263A (en) * 2014-03-19 2014-06-25 宇龙计算机通信科技(深圳)有限公司 Method and system for protecting data in mobile terminal
CN104205117A (en) * 2014-04-10 2014-12-10 华为技术有限公司 Device file encryption and decryption method and device
CN104134046A (en) * 2014-07-29 2014-11-05 深圳市中兴移动通信有限公司 Encryption method and device
CN104573551A (en) * 2014-12-25 2015-04-29 广东欧珀移动通信有限公司 File processing method and mobile terminal
CN104573535A (en) * 2015-01-04 2015-04-29 深圳市中兴移动通信有限公司 Mobile terminal, and method and device for improving encryption efficiency

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
罗文兴: "《移动通信技术》", 31 July 2009, 西南交通大学出版社 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656972A (en) * 2016-10-14 2017-05-10 郑州云海信息技术有限公司 Data encryption method and device
CN106453663A (en) * 2016-12-13 2017-02-22 宁夏凯速德科技有限公司 Improved cloud service-based storage capacity expansion method and device
CN106453663B (en) * 2016-12-13 2019-10-22 河北思达歌数据科技投资有限公司 Improved storage expansion method and device based on cloud service
CN107171800A (en) * 2017-03-30 2017-09-15 山东超越数控电子有限公司 A kind of scheduling system of multichannel cryptographic algorithm
CN107171800B (en) * 2017-03-30 2020-07-17 山东超越数控电子股份有限公司 Scheduling system of multi-channel cryptographic algorithm
CN109063458A (en) * 2018-06-30 2018-12-21 北京东方英卡数字信息技术有限公司 A kind of terminal safety method and device of hierarchical information management
CN109120589A (en) * 2018-06-30 2019-01-01 北京东方英卡数字信息技术有限公司 A kind of end message guard method and device based on Crypted password
CN109120589B (en) * 2018-06-30 2021-03-23 北京东方英卡数字信息技术有限公司 Terminal information protection method and device based on encryption password
CN109063458B (en) * 2018-06-30 2021-11-02 恒宝股份有限公司 Terminal security method and device for hierarchical information management
CN112149095A (en) * 2020-10-26 2020-12-29 上海松鼠课堂人工智能科技有限公司 Student data safety management method and system
WO2022126980A1 (en) * 2020-12-15 2022-06-23 平安科技(深圳)有限公司 Data transmission method and apparatus, terminal, and storage medium
CN114430351A (en) * 2022-04-06 2022-05-03 北京快立方科技有限公司 Distributed database node secure communication method and system

Similar Documents

Publication Publication Date Title
CN105069365A (en) Data processing method and mobile terminal
CN105005731A (en) Data encryption and decryption methods and mobile terminal
CN104573551A (en) File processing method and mobile terminal
CN104992120A (en) Picture encryption method and mobile terminal
CN108898005B (en) Hard disk identification method, system, equipment and computer readable storage medium
CN105574418A (en) Data encryption method and apparatus
US20200201975A1 (en) Wireless injection of passwords
CN107315966B (en) Solid state disk data encryption method and system
CN104951684A (en) Fingerprint encryption and decryption method and terminal
CN102867157A (en) Mobile terminal and data protecting method
CN107248972B (en) Data encryption and decryption method and device and electronic equipment
US11405782B2 (en) Methods and systems for securing and utilizing a personal data store on a mobile device
US8462948B2 (en) System and method for protecting data of mobile phone
CN104915583A (en) Interface decryption processing method and mobile terminal
CN105069360A (en) File encryption and decryption methods and terminal
CN109299944B (en) Data encryption method, system and terminal in transaction process
CN105933503B (en) Information processing method and electronic equipment
CN110874476A (en) Data processing system, method, storage medium and processor
CN105574429A (en) File data encryption and decryption method and device and terminal
CN105022965A (en) Data encryption method and apparatus
CN112636914B (en) Identity verification method, identity verification device and smart card
CN111368322A (en) File decryption method and device, electronic equipment and storage medium
US9203607B2 (en) Keyless challenge and response system
CN113709188B (en) Session control information processing method, device, system and storage medium
CN102769699A (en) Method and system for encrypting cell phone information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20151118