CN105915336A - Object cooperative decryption method and device thereof - Google Patents

Object cooperative decryption method and device thereof Download PDF

Info

Publication number
CN105915336A
CN105915336A CN201610353690.8A CN201610353690A CN105915336A CN 105915336 A CN105915336 A CN 105915336A CN 201610353690 A CN201610353690 A CN 201610353690A CN 105915336 A CN105915336 A CN 105915336A
Authority
CN
China
Prior art keywords
key
terminal
encrypted
information
decrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610353690.8A
Other languages
Chinese (zh)
Other versions
CN105915336B (en
Inventor
高欢欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201610353690.8A priority Critical patent/CN105915336B/en
Publication of CN105915336A publication Critical patent/CN105915336A/en
Application granted granted Critical
Publication of CN105915336B publication Critical patent/CN105915336B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the field of data processing, and particularly relates to an object cooperative decryption method and a device thereof. The method is applied to a first terminal, and comprises the following steps: an object access request is received, and whether the object is an encrypted object is judged; when the object is judged to be the encrypted object, a key request is generated and sent to a second terminal, wherein the key request carries identification information of the object; a second key sent by the second terminal and corresponding to the object identification information is received, wherein the second key is a key for decrypting the object by the second terminal; a first key for decrypting the object is acquired according to the second key, wherein the first key and the second key are the same or have a preset association relation; and according to the first key, the encrypted object is decrypted. Compared with the prior art, the technical scheme of the invention provides a convenient and safe decryption mode, and the use experience of the user is improved.

Description

A kind of object works in coordination with decryption method and device thereof
Technical field
The invention belongs to data processing field, particularly relate to a kind of object and work in coordination with decryption method and device thereof.
Background technology
Along with the development of network technology, similar computer, smart mobile phone, the such hardware of Intelligent worn device set Communication and the situation of collaborative work between Bei can become more and more, but collaborative work process it In, be no lack of among equipment can there are us and be not intended to allow people arbitrarily obtain similar business secret, national security, Or the data that individual privacy is relevant, if to outward leakage, it is possible to can cause serious consequence.Especially It is that nowadays we would generally use multiple devices simultaneously, or has and equipment is borrowed and situation that other people use, Data can be easier to leak.In existing equipment, we are general, and every equipment can be logged in and adds by we Close, or the data needing encryption in every station terminal are individually encrypted, if needing to operate on it, The most in person equipment or encryption data to this encryption must be decrypted operation.It can be seen that when same Time use multiple devices time, though Information Security is protected, but decryption oprerations is cumbersome, service efficiency Relatively low, serious reduction user's experience.
Summary of the invention
The embodiment of the present invention provides a kind of object to work in coordination with decryption method, it is intended to solve to use at the same time multiple terminals mistake Decryption oprerations in journey is cumbersome, and service efficiency is relatively low, the serious problem reducing user's experience.
The embodiment of the present invention is achieved in that present embodiments providing a kind of object works in coordination with decryption method, should For first terminal, comprise the following steps,
Receive object access request, it is judged that whether described object is encrypted object;
When judging that described object is encrypted object, generate key request, and be sent to the second terminal, Described key request carries the object id information of described object;
Receive second key corresponding with described object id information that described second terminal sends, wherein, institute Stating the second key is the key that described object is decrypted by the second terminal;
The first key that described object is decrypted, wherein, described first is obtained according to described second key Key and the second key are identical or have default incidence relation;
It is decrypted according to encrypted object described in described first double secret key.
Present invention also offers a kind of object and work in coordination with decryption method, be applied to the second terminal, comprise the following steps:
Receiving the key request that first terminal sends, described key request carries the object identity of described object Information;
According to described key request, obtain the second key that described object is decrypted;
Described second key is sent to described first terminal so that described first terminal is according to described second close The first key that described object is decrypted by key acquisition, so that encrypted object is decrypted, wherein, Described first key and the second key are identical or have default incidence relation.
Present invention also offers a kind of object collaborative deciphering device, be applied to first terminal, described device includes:
Encrypted object judging unit, is used for receiving object access request, it is judged that whether described object is encrypted Object;
Key request transmitting element, for when judging that described object is encrypted object, generating key please Asking, and be sent to the second terminal, described key request carries the object id information of described object;
Second key reception unit, for receive described second terminal send with described object id information pair The second key answered, wherein, described second key is the key that described object is decrypted by the second terminal;
First key acquiring unit, for obtaining, according to described second key, be decrypted described object the One key, wherein, described first key and the second key are identical or have default incidence relation;And
Decryption unit, for being decrypted according to encrypted object described in described first double secret key.
Present invention also offers a kind of object collaborative deciphering device, be applied to the second terminal, including:
Key requesting unit, for receiving the key request that first terminal sends, described key request carries The object id information of described object;
Second key acquiring unit, for according to described key request, described object is decrypted by acquisition Second key;And
Second key transmitting element, for being sent to described first terminal by described second key so that described First terminal obtains the first key being decrypted described object, with to encrypted according to described second key Object be decrypted, wherein, described first key and the second key are identical or have default association and close System.
In the inventive solutions, first terminal is by sending key request, request the to the second terminal Two authorization terminal first terminals access encrypted objects, and the second terminal sends the second key to first terminal, and first Terminal receives the second key that the second terminal sends, and obtains the first key pair encryption object and is decrypted, example As unlocked touch screen, logging in encrypted operating system, interface or read file, can be convenient, fast Ground obtains other authorization terminal and accesses, and the present solution provides a kind of convenient, safe manner of decryption, Eliminate first terminal user and in person this equipment or encryption data are decrypted the trouble of operation, improve The experience of user.
Accompanying drawing explanation
Fig. 1 is the stream that a kind of object being applied to first terminal that the embodiment of the present invention provides works in coordination with decryption method Journey schematic diagram;
Fig. 2 is the stream that a kind of object being applied to the second terminal that the embodiment of the present invention provides works in coordination with decryption method Journey schematic diagram;
Fig. 3 is the overall time diagram that a kind of object that the embodiment of the present invention provides works in coordination with decryption method;
Fig. 4 is the knot that a kind of object being applied to first terminal that the embodiment of the present invention provides works in coordination with deciphering device Structure schematic diagram;
Fig. 5 is the knot that a kind of object being applied to the second terminal that the embodiment of the present invention provides works in coordination with deciphering device Structure schematic diagram.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearer, below in conjunction with accompanying drawing and reality Execute example, the present invention is further elaborated.Only should be appreciated that specific embodiment described herein Only in order to explain the present invention, it is not intended to limit the present invention.
In the embodiment of the present invention, when first terminal judges that the described object that need to access is encrypted object, Access to the second terminal request and authorize, after the second terminal obtains the second key of user's input, authorize first eventually Encrypted object is decrypted by end subscriber so that at first terminal when needing to access encrypted object, Mandate can be obtained quickly and easily and access, eliminating first terminal user in person to this equipment or add Ciphertext data is decrypted the trouble of operation, improves the use body of user on the premise of assuring data security Test.
Fig. 1 shows that a kind of object being applied to first terminal that the embodiment of the present invention provides works in coordination with decryption method Flow process, details are as follows.
First terminal can be personal computer, mobile phone or other there is the equipment of communication function, By server or directly establish a connection with the second terminal.
In step s 110, object access request is received, it is judged that whether described object is encrypted object.
This object access request is user to accessing the access request of object, and above-mentioned object is in operation desktop Appearance, document, image, audio frequency and video or other file data that need to access, above-mentioned access for read, amendment, Move or other operational motion to this object.
The above-mentioned encrypted object being previously mentioned, for the encrypted object of user preset, cipher mode is permissible Include but not limited to encrypting fingerprint that user passes through to preset, password encryption, acoustic information encryption, pattern encryption, The encryption acts that object is carried out by word encryption etc..
As one embodiment of the invention, that object access request can be inputted by monitoring user, for right The reading instruction of elephant obtains, or other are made the operation relevant to this object by monitoring user and refer to Order obtains.
In the step s 120, it is judged that whether described object is encrypted object, when judged result is yes, then enters Enter step S130;When judged result is no, then authorize to user, so that user directly accesses object.
As one embodiment of the invention, it need to be encrypted by encrypted object through predetermined encryption action, And encryption identification can be made on the attribute information of this encrypted object, after obtaining this reading instruction, obtain Take the attribute information of the object corresponding with this reading instruction.If carrying above-mentioned adding on the attribute information of this object Secret mark is known, then this object carrying encryption identification is judged as encrypted object.
As another embodiment of the present invention, what system database can store encrypted object adds confidential information List.User to needing encrypted object after it is encrypted by predetermined encryption action, add secret letter above-mentioned Cease the list above-mentioned encrypted object of interpolation adds confidential information.That inputted by monitoring user, for object After reading instruction obtains object access request, the encryption information list of storage in system database is looked into Table handling, if that shows the object corresponding with this object access request on this encryption information list adds confidential information, Then this object is judged as encrypted object.
In step s 130, generating key request, and be sent to the second terminal, key request carries object Object id information.
First terminal can be by wireless or wired form, the key request sent to the second terminal.This nothing Line connection includes but not limited to be used in the wireless communication protocol such as bluetooth, wifi, nfc.
As one embodiment of the invention, when judging that object is encrypted object, obtain this encrypted The attribute information of object, what this attribute information preserved during carrying object encryption adds confidential information, according to upper State and add confidential information, it is judged that the cipher mode of this object, generate object id information further according to cipher mode, And generate the key request of object id information carrying object, with indicate the second terminal to obtain deciphering should The second key used in object, such as with add confidential information and finger print information corresponding to cipher mode, password Information, acoustic information, pattern-information, Word message or other for deciphering decryption information.
As another embodiment of the present invention, when judging that object is encrypted object, obtain system data The encryption information list of storage in storehouse, and obtain in this encryption information list and show and this object access request pair The object answered add confidential information, it is judged that the cipher mode of this object, further according to cipher mode generate to as mark Knowledge information, and generate the key request of the object id information carrying object, to indicate the second terminal to obtain Take the deciphering the second key used in this object, such as one or more with add confidential information and cipher mode pair Finger print information, encrypted message, acoustic information, pattern-information, the Word message answered or other are for deciphering Decryption information.
In step 140, second key corresponding with object id information that the second terminal sends is received.
First terminal can receive, by wireless or wired form, the second key that the second terminal sends. These wireless connections include but not limited to be used in the wireless communication protocol such as bluetooth, wifi, nfc.
In step 150, obtain, according to described second key, the first key that object is decrypted.
This first key and the second key are identical or have default incidence relation.
As one embodiment of the invention, the first key is adds corresponding with the cipher mode of first terminal object Finger print information produced by confidential information, such as encrypting fingerprint, the second terminal is by obtaining the fingerprint of user's input Information, using finger print information as the second key, is sent to first terminal, to come first according to the second key The encrypted information of terminal is unlocked, and the first key and the second key are identical herein.
As another embodiment of the present invention, the first key is corresponding with the cipher mode of first terminal object Add confidential information, such as finger print information produced by encrypting fingerprint, the second terminal is by obtaining the of user's input Two keys, at this, the second key is the command information corresponding with adding confidential information, such as, confirm authorization message, logical Cross transmission and confirm that authorization message to first terminal, is transferred corresponding with encrypted object triggering first terminal Add confidential information encrypted object is decrypted.
In embodiments of the present invention, this first key and the second key can be finger print information, encrypted message, Acoustic information, pattern-information, Word message or other for deciphering decryption information.
In a step 160, it is decrypted according to the first encrypted object of double secret key.
As one embodiment of the invention, if this first key packet finger print information containing one or more of, When encrypted message, acoustic information, pattern-information, Word message or other user-defined decryption informations, Object the self-defining of user's input in predetermined encryption course of action is added confidential information, the i.e. first key, with Second key is compared, if comparison result is coupling, is i.e. decrypted the encrypted object that need to access.
As another embodiment of the present invention, if the mandate for directly mandate that this key packet determines containing user Information, when first terminal obtains and determines that the second key is authorization message, directly invoking the first double secret key needs The encrypted object accessed is decrypted, or encrypted content is directly authorized access.
In the present invention, the object as the present invention works in coordination with a kind of embodiment that decryption method is corresponding, specifically Including:
If object mentioned above is touch screen, when detecting that user wishes to enter interface by touch screen, Trigger and solve latching operation;First terminal monitors object access request now, generates key request.
First terminal transmission key request, to the second terminal, receives the second terminal of the second terminal transmission to touch The second key that screen unlocks;
According to the second key, obtain the first key that touch screen is unlocked;
First key and the second key are compared, if unanimously, then touch screen is unlocked.
In the present embodiment, the first key and the second key are identical key.
It can be seen that first terminal is when determining this object and being encrypted object, sending object mandate please Seek the second terminal, ask the second terminal to obtain the second key, if receive that the second terminal sends is second close After key, can be decrypted according to the second encrypted content of double secret key, so can need not on first terminal Input decryption information, but can be decrypted for first terminal by the second terminal, encrypted object institute Terminal can obtain other authorization terminal quickly and easily and access, eliminate user and in person this set Standby or encryption data is decrypted the trouble of operation, improves user on the premise of assuring data security Experience.
Fig. 3 shows that a kind of object being applied to the second terminal that the embodiment of the present invention provides works in coordination with decryption method Flow process, details are as follows:
Second terminal can be personal computer, mobile phone or other there is the equipment of communication function, logical Cross server or directly establish a connection with first terminal.
In step 210, receiving the key request that first terminal sends, key request carries the right of object As identification information.
Second terminal can by wireless or wired type of attachment obtain first terminal send key please Ask.These wireless connections include but not limited to be used in the wireless communication protocol such as bluetooth, wifi, nfc.
In a step 220, according to key request, obtain the second key that object is decrypted, herein Second key is the decryption information corresponding with object id information that user inputs.Specific as follows:
From key request obtain object id information, according in object id information with encrypted object Corresponding cipher mode, obtains the second key of user's input, and at this, the second key can be user's input Finger print information, encrypted message, acoustic information, pattern-information, Word message or other for deciphering solution Confidential information.Second key can be the information that user inputs on the spot, it is also possible to be the information of terminal preset.
As one embodiment of the invention, if object encryption mode suggested in this object id information is for referring to Stricture of vagina is encrypted, then user now can obtain, by the fingerprint acquiring unit of terminal, the finger print information that deciphering needs, Using this finger print information as the second key;Or, operation interface display for send finger print information icon or Button, the finger print information being preset in terminal is sent to first terminal, will be used for awarding after triggering by prompting user The preset authorization message of power, as the second key, is sent to first terminal, and the second key can make the herein One terminal obtains preset the first key answered with the second double secret key and is decrypted encrypted object.
In step 230, the second key is sent to first terminal.
Second terminal can send the second key to first terminal by wireless or wired type of attachment, should Wireless connections include but not limited to be used in the wireless communication protocol such as bluetooth, wifi, nfc.
In the present invention, the object as the present invention works in coordination with a kind of embodiment that decryption method is corresponding, specifically For:
Such as, object mentioned above is touch screen, after receiving the key request that first terminal sends, and root According to key request, obtain the second key that touch screen is unlocked, this second key can be finger print information, Encrypted message, acoustic information, pattern-information, Word message or other for deciphering decryption information.
The second key being used for unlocking touch screen is sent to first terminal.
After the second terminal receives the key request that first terminal sends, can be obtained by the second terminal and use Second key corresponding with object id information of family input, is sent to first terminal, makes the first terminal can It is decrypted according to the object that the second double secret key is encrypted, eliminates user in person to this equipment or encryption number According to being decrypted the trouble of operation, on the premise of assuring data security, improve the experience of user.
Fig. 3 shows that the object that the embodiment of the present invention provides works in coordination with the overall procedure sequential signal of decryption method Figure.
In the present embodiment, in the starting stage, setting up and connect between first terminal and the second terminal, first eventually End with the second terminal upon establishment of a connection, preserves terminal iidentification each other, completes to initialize.
First terminal monitors the object access request of user during user accesses content object, and judges Whether the object of need access that should be corresponding with object access request is encrypted object.When judging that this object is During encrypted object, generating key request, and be sent to the second terminal, key request carries object Object id information;When judging that this object is unencrypted object, first terminal directly obtains mandate with right Object conducts interviews.
After second terminal receives the key request that first terminal sends, receive the right with described of user's input As the second key that identification information is corresponding, and described second key is sent to first terminal.
After first terminal receives second key corresponding with described object id information that the second terminal sends, from Described second key obtains first key corresponding with described object id information, and according to the first double secret key Object is decrypted.
It can be seen that when first terminal judges that the described object that need to access is encrypted object, to second Terminal request accesses and authorizes, and after the second terminal obtains the access authorized order of user's input, authorizes first terminal Encrypted object is decrypted by user so that at first terminal when needing to access encrypted object, Such as unlock touch screen, when logging in encrypted operating system, interface or read file, can facilitate, Obtain other authorization terminal quickly and access, eliminating user and in person this equipment or encryption data are carried out The trouble of decryption oprerations, improves the experience of user on the premise of assuring data security.
It will appreciated by the skilled person that all or part of step realizing in above-described embodiment method Suddenly the program that can be by is to instruct what relevant hardware completed, and described program can be stored in a calculating In machine read/write memory medium, described storage medium, such as ROM/RAM, disk, CD, flash memory disk etc..
Fig. 4 shows that the object of the first terminal that the embodiment of the present invention provides works in coordination with the structure of deciphering device, for It is easy to explanation, part related to the present invention is only shown.
First terminal can be personal computer, mobile phone or other there is the equipment of communication function, By server or directly establish a connection with the second terminal.
In embodiments of the present invention, described object collaborative deciphering device includes:
Encrypted object judging unit 310, is used for receiving object access request, it is judged that described object be whether by The object of encryption.
This object access request is user to accessing the access request of object, and above-mentioned object is in operation desktop Appearance, document, image, audio frequency and video or other file data that need to access, above-mentioned access for read, amendment, Move or other operational motion to this object.
The above-mentioned encrypted object being previously mentioned, for the encrypted object of user preset, cipher mode includes But it is not limited to user by the encrypting fingerprint preset, password encryption, acoustic information encryption, pattern encryption, literary composition The encryption acts that object is carried out by word encryption etc..
As one embodiment of the invention, that object access request can be inputted by monitoring user, for right The reading instruction of elephant obtains, or other are made the operation relevant to this object by monitoring user and refer to Order obtains.
As one embodiment of the invention, object access request can be supervised by encrypted object judging unit 310 Survey reading instruction that user inputs, for object to obtain.Encrypted object need to add through presetting It is encrypted by close action, and can make encryption identification on the attribute information of this encrypted object, when After obtaining this reading instruction, obtain the attribute information of the object corresponding with this reading instruction.If the genus of this object Carry above-mentioned encryption identification in property information, then this object carrying encryption identification is judged as encrypted Object.
As another embodiment of the present invention, what system database can store encrypted object adds confidential information List.User to needing encrypted object after it is encrypted by predetermined encryption action, add secret letter above-mentioned Cease the list above-mentioned encrypted object of interpolation adds confidential information.That inputted by monitoring user, for object After reading instruction obtains object access request, the encryption information list of storage in system database is looked into Table handling, if this encryption information list above-listed there are the object corresponding with this object access request add secret letter Breath, then be judged as encrypted object by this object.
Key request transmitting element 320, for when judging that described object is encrypted object, generates close Key is asked, and is sent to the second terminal, and key request carries the object id information of object;When judging knot Fruit is no, then to user grants access object.
First terminal can be by wireless or wired form, the key request sent to the second terminal.This nothing Line connection includes but does not limit and be used in the wireless communication protocol such as bluetooth, wifi, nfc.
As one embodiment of the invention, when judging that object is encrypted object, obtain this encrypted The attribute information of object, what this attribute information preserved during carrying object encryption adds confidential information, according to upper State and add confidential information, it is judged that the cipher mode of this object, generate object id information further according to cipher mode, And generate the key request of object id information carrying object, with indicate the second terminal to obtain deciphering should Key used in object, such as with add confidential information and finger print information corresponding to cipher mode, encrypted message, Acoustic information, pattern-information, Word message or other for deciphering decryption information.
As another embodiment of the present invention, when judging that object is encrypted object, obtain system data The encryption information list of storage in storehouse, and obtain in this encryption information list and show and this object access request pair The object answered add confidential information, it is judged that the cipher mode of this object, further according to cipher mode generate to as mark Knowledge information, and generate the key request of the object id information carrying object, to indicate the second terminal to obtain Take deciphering key used in this object, such as with add confidential information and finger print information corresponding to cipher mode, Encrypted message, acoustic information, pattern-information, Word message or other for deciphering decryption information.
Second key reception unit 330, for receiving believing with described object identity of described second terminal transmission The second key that breath is corresponding.
First terminal can receive, by wireless or wired form, the second key that the second terminal sends. These wireless connections include but not limited to be used in the wireless communication protocol such as bluetooth, wifi, nfc.
First key acquiring unit 340, for obtaining, according to described second key, be decrypted object the One key.
This first key and the second key are identical or have default incidence relation.
As one embodiment of the invention, the first key is adds corresponding with the cipher mode of first terminal object Finger print information produced by confidential information, such as encrypting fingerprint, the second terminal is by obtaining the fingerprint of user's input Information, using finger print information as the second key, is sent to first terminal, to come first according to the second key The encrypted information of terminal is unlocked, and the first key and the second key are identical herein.
As another embodiment of the present invention, the first key is corresponding with the cipher mode of first terminal object Add confidential information, such as finger print information produced by encrypting fingerprint, the second terminal is by obtaining the of user's input Two keys, at this, the second key is the command information corresponding with adding confidential information, such as, confirm authorization message, logical Cross transmission and confirm that authorization message to first terminal, is transferred corresponding with encrypted object triggering first terminal Add confidential information encrypted object is decrypted.
In embodiments of the present invention, this first key and the second key can be finger print information, encrypted message, Acoustic information, pattern-information, Word message or other for deciphering decryption information.
Decryption unit 350, for being decrypted according to the first encrypted object of double secret key.
As one embodiment of the invention, if this first key packet finger print information containing one or more of, When encrypted message, acoustic information, pattern-information, Word message or other user-defined decryption informations, Object the self-defining of user's input in predetermined encryption course of action is added confidential information, the i.e. first key, with Second key is compared, if comparison result is coupling, is i.e. decrypted the encrypted object that need to access.
As another embodiment of the present invention, if the mandate for directly mandate that this key packet determines containing user Information, when first terminal obtains and determines that the second key is authorization message, directly invoking the first double secret key needs The encrypted object accessed is decrypted, or encrypted content is directly authorized access.
In the present invention, the object as the present invention works in coordination with a kind of embodiment that decryption method is corresponding, specifically Including:
If object mentioned above is touch screen, when wishing to enter interface by touch screen to user, trigger Solve latching operation;Encrypted object judging unit 310 monitors object access request now, generates key request,
First terminal sends key request to the second terminal, the second key in the second key reception unit 330 Receiver module receives the second key that touch screen is unlocked by the second terminal of the second terminal transmission;
The first Key Acquisition Module in first key acquiring unit 340, according to the second key, obtains touch The first key that screen is unlocked;
First key and the second key are compared by decryption unit 350, if unanimously, then carry out touch screen Unlock.
In the present embodiment, the first key and the second key are identical key.
It can be seen that first terminal is when determining this object and being encrypted object, sending object mandate please Seek the second terminal, ask the second terminal to obtain the second key, if receive that the second terminal sends is second close After key, can be decrypted according to the second encrypted content of double secret key, so can need not on first terminal Input decryption information, but can be decrypted for first terminal by the second terminal, encrypted object institute Terminal can obtain other authorization terminal quickly and easily and access, eliminate user and in person this set Standby or encryption data is decrypted the trouble of operation, improves user on the premise of assuring data security Experience.
Fig. 5 shows that the object that the embodiment of the present invention provides works in coordination with the second terminal structure signal in decryption method Figure, details are as follows:
Second terminal can be personal computer, mobile phone or other there is the equipment of communication function, logical Cross server or directly establish a connection with first terminal.
In the present embodiment, the object collaborative deciphering device of described second terminal includes:
Key request receives unit 410, and for receiving the key request that first terminal sends, key request is taken Object id information with object.
Second terminal can by wireless or wired type of attachment obtain first terminal send key please Ask.These wireless connections include but do not limit and be used in the wireless communication protocol such as bluetooth, wifi, nfc.
Second key acquiring unit 420, for according to key request, obtaining be decrypted object second Key, the second key herein is the decryption information corresponding with object id information that user inputs.
From key request obtain object id information, according in object id information with encrypted object Corresponding cipher mode, obtains the second key of user's input, and at this, the second key can be user's input Finger print information, encrypted message, acoustic information, pattern-information, Word message or other for deciphering solution Confidential information.Second key can be the information that user inputs on the spot, it is also possible to be the information of terminal preset.
As one embodiment of the invention, if object encryption mode suggested in this object id information is for referring to Stricture of vagina is encrypted, then user now can obtain, by the fingerprint acquiring unit of terminal, the finger print information that deciphering needs, Using this finger print information as the second key;Or, operation interface display for send finger print information icon or Button, the finger print information being preset in terminal is sent to first terminal, will be used for awarding after triggering by prompting user The preset authorization message of power, as the second key, is sent to first terminal, and the second key can make the herein One terminal obtains preset the first key answered with the second double secret key and is decrypted encrypted object.
Second key transmitting element 430, for being sent to first terminal by the second key.
Second key transmitting element 430 can send the second key extremely by wireless or wired type of attachment First terminal, these wireless connections include but do not limit and be used in the wireless communication protocol such as bluetooth, wifi, nfc.
In the present invention, the object as the present invention works in coordination with a kind of embodiment that decryption method is corresponding, specifically For:
Such as, object mentioned above is touch screen, after receiving the key request that first terminal sends, and root According to key request, obtain the second key that touch screen is unlocked, this second key can be finger print information, Encrypted message, acoustic information, pattern-information, Word message or other for deciphering decryption information.
The second key being used for unlocking touch screen is sent to first terminal.
After the second terminal receives the key request that first terminal sends, can be obtained by the second terminal and use Second key corresponding with object id information of family input, is sent to first terminal, makes the first terminal can It is decrypted according to the object that the second double secret key is encrypted, eliminates user in person to this equipment or encryption number According to being decrypted the trouble of operation, on the premise of assuring data security, improve the experience of user.
It should be noted that the first key and the second key are identical or have incidence relation, such as, first is close Key is the finger print information of first, then this second terminal is for deciphering this second key used by encrypted object then For the finger print information of first, or the second key is preset authorization message, makes first terminal by incidence relation Obtain the first key so that encrypted object to be decrypted.
It can be seen that in above-mentioned object collaborative deciphering device, the second terminal is relevant to deciphering by obtaining The second key, and send the second key to first terminal, make first terminal obtain the first key with to adding Close object is decrypted, such as, unlock touch screen, log in encrypted operating system, interface or read literary composition Part, can obtain other authorization terminal quickly and easily and access, eliminate user in person to this equipment or Person's encryption data is decrypted the trouble of operation, improves the experience of user.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all at this Any amendment, equivalent and the improvement etc. made within bright spirit and principle, should be included in the present invention Protection domain within.

Claims (10)

1. object works in coordination with a decryption method, is applied to first terminal, it is characterised in that comprise the following steps,
Receive object access request, it is judged that whether described object is encrypted object;
When judging that described object is encrypted object, generate key request, and be sent to the second terminal, Described key request carries the object id information of described object;
Receive second key corresponding with described object id information that described second terminal sends, wherein, institute Stating the second key is the key that described object is decrypted by the second terminal;
The first key that described object is decrypted, wherein, described first is obtained according to described second key Key and the second key are identical or have default incidence relation;
It is decrypted according to encrypted object described in described first double secret key.
2. object as claimed in claim 1 works in coordination with decryption method, it is characterised in that
Described object includes touch screen;
Second key corresponding with described object id information that described second terminal of described reception sends, including:
Receive the second key that touch screen is unlocked by the second terminal of the second terminal transmission.
3. object as claimed in claim 1 or 2 works in coordination with decryption method, it is characterised in that described according to institute The object stating the first double secret key encrypted is decrypted, including:
Being unlocked according to described first double secret key touch screen, wherein, described first key and the second key are Identical key.
4. object works in coordination with a decryption method, is applied to the second terminal, it is characterised in that comprise the following steps:
Receiving the key request that first terminal sends, described key request carries the object identity of described object Information;
According to described key request, obtain the second key that described object is decrypted;
Described second key is sent to described first terminal so that described first terminal is according to described second close The first key that described object is decrypted by key acquisition, so that encrypted object is decrypted, wherein, Described first key and the second key are identical or have default incidence relation.
5. object as claimed in claim 4 works in coordination with decryption method, it is characterised in that
Described object includes touch screen;
Described according to described key request, obtain the second key that described object is decrypted, including:
According to described key request, obtain the second key that touch screen is unlocked, wherein, described second Key and the first key are identical key.
6. an object collaborative deciphering device, is applied to first terminal, it is characterised in that described device includes:
Encrypted object judging unit, is used for receiving object access request, it is judged that whether described object is encrypted Object;
Key request transmitting element, for when judging that described object is encrypted object, generating key please Asking, and be sent to the second terminal, described key request carries the object id information of described object;
Second key reception unit, for receive described second terminal send with described object id information pair The second key answered, wherein, described second key is the key that described object is decrypted by the second terminal;
First key acquiring unit, for obtaining, according to described second key, be decrypted described object the One key, wherein, described first key and the second key are identical or have default incidence relation;And
Decryption unit, for being decrypted according to encrypted object described in described first double secret key.
7. object as claimed in claim 6 collaborative deciphering device, it is characterised in that
Described object includes touch screen;
Described second key reception unit includes:
Second key reception module, the second terminal sent for receiving the second terminal touch screen is unlocked the Two keys.
The collaborative deciphering device of object the most as claimed in claims 6 or 7, it is characterised in that described deciphering list Unit includes:
Deciphering module, for being unlocked according to described first double secret key touch screen, wherein said second key It is identical key with the first key.
9. an object collaborative deciphering device, is applied to the second terminal, it is characterised in that including:
Key requesting unit, for receiving the key request that first terminal sends, described key request carries The object id information of described object;
Second key acquiring unit, for according to described key request, described object is decrypted by acquisition Second key;And
Second key transmitting element, for being sent to described first terminal by described second key so that described First terminal obtains the first key being decrypted described object, with to encrypted according to described second key Object be decrypted, wherein, described first key and the second key are identical or have default association and close System.
10. object as claimed in claim 9 collaborative deciphering device, it is characterised in that
Described object includes touch screen;
Described second key acquiring unit includes:
Second Key Acquisition Module, for according to described key request, obtains be unlocked touch screen the Two keys, wherein, described second key and the first key are identical key.
CN201610353690.8A 2016-05-24 2016-05-24 Object collaborative decryption method and device Active CN105915336B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610353690.8A CN105915336B (en) 2016-05-24 2016-05-24 Object collaborative decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610353690.8A CN105915336B (en) 2016-05-24 2016-05-24 Object collaborative decryption method and device

Publications (2)

Publication Number Publication Date
CN105915336A true CN105915336A (en) 2016-08-31
CN105915336B CN105915336B (en) 2020-06-09

Family

ID=56742306

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610353690.8A Active CN105915336B (en) 2016-05-24 2016-05-24 Object collaborative decryption method and device

Country Status (1)

Country Link
CN (1) CN105915336B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108121904A (en) * 2017-12-04 2018-06-05 北京三快在线科技有限公司 Unlocking method, device, electronic equipment and server
CN108880817A (en) * 2017-11-24 2018-11-23 北京视联动力国际信息技术有限公司 A kind of decryption method and device
CN108959863A (en) * 2017-11-21 2018-12-07 北京视联动力国际信息技术有限公司 A kind of terminal unlock method and device based on view networking
CN108985047A (en) * 2018-06-28 2018-12-11 努比亚技术有限公司 A kind of unlocking method, terminal, wearable device and computer readable storage medium
CN111814125A (en) * 2019-04-12 2020-10-23 奇酷互联网络科技(深圳)有限公司 Terminal unlocking method, processing terminal and storage device
CN114158051A (en) * 2021-11-30 2022-03-08 元心信息科技集团有限公司 Unlocking method and device, electronic equipment and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997678A (en) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 Password acquisition method and terminal
CN103067158A (en) * 2012-12-27 2013-04-24 华为技术有限公司 Encryption and decryption method, terminal device, gateway device and key management system
CN103856321A (en) * 2012-12-07 2014-06-11 观致汽车有限公司 Data encryption and decryption method and system
US20150269374A1 (en) * 2012-10-12 2015-09-24 Zte Corporation Screen unlocking method, device and terminal
US20160065374A1 (en) * 2014-09-02 2016-03-03 Apple Inc. Method of using one device to unlock another device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997678A (en) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 Password acquisition method and terminal
US20150269374A1 (en) * 2012-10-12 2015-09-24 Zte Corporation Screen unlocking method, device and terminal
CN103856321A (en) * 2012-12-07 2014-06-11 观致汽车有限公司 Data encryption and decryption method and system
CN103067158A (en) * 2012-12-27 2013-04-24 华为技术有限公司 Encryption and decryption method, terminal device, gateway device and key management system
US20160065374A1 (en) * 2014-09-02 2016-03-03 Apple Inc. Method of using one device to unlock another device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108959863A (en) * 2017-11-21 2018-12-07 北京视联动力国际信息技术有限公司 A kind of terminal unlock method and device based on view networking
CN108880817A (en) * 2017-11-24 2018-11-23 北京视联动力国际信息技术有限公司 A kind of decryption method and device
CN108121904A (en) * 2017-12-04 2018-06-05 北京三快在线科技有限公司 Unlocking method, device, electronic equipment and server
CN108121904B (en) * 2017-12-04 2019-09-17 北京三快在线科技有限公司 Unlocking method, device, electronic equipment and server
CN108985047A (en) * 2018-06-28 2018-12-11 努比亚技术有限公司 A kind of unlocking method, terminal, wearable device and computer readable storage medium
CN111814125A (en) * 2019-04-12 2020-10-23 奇酷互联网络科技(深圳)有限公司 Terminal unlocking method, processing terminal and storage device
CN114158051A (en) * 2021-11-30 2022-03-08 元心信息科技集团有限公司 Unlocking method and device, electronic equipment and computer readable storage medium
CN114158051B (en) * 2021-11-30 2024-01-09 元心信息科技集团有限公司 Unlocking method, unlocking device, electronic equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN105915336B (en) 2020-06-09

Similar Documents

Publication Publication Date Title
CN105915336A (en) Object cooperative decryption method and device thereof
US11706033B2 (en) Secure distributed information system
US11741461B2 (en) Method for performing non-repudiation, and payment managing server and user device therefor
EP4024809A1 (en) Application access method and apparatus, and electronic device and storage medium
CN103458382B (en) Hardware encryption transmission and storage method and system for mobile phone private short message
CN102761870B (en) Terminal authentication and service authentication method, system and terminal
CN103095457A (en) Login and verification method for application program
CN104660589A (en) Method and system for controlling encryption of information and analyzing information as well as terminal
CN110612698B (en) Security authentication system and security authentication method for generating security key by combining authentication factors of multiple users
CN107026824A (en) A kind of message encryption, decryption method and device
CN103812651B (en) Method of password authentication, apparatus and system
CN101621794A (en) Method for realizing safe authentication of wireless application service system
CN106231115A (en) A kind of information protecting method and terminal
WO2012131659A1 (en) A system and a method enabling secure transmission of sms
CN104202736A (en) Mobile terminal short message end-to-end encryption method oriented to Android system
CN104270516A (en) Decryption method and mobile terminal
CN109743696A (en) Identifying code encryption method, system and readable storage medium storing program for executing
CN104243452B (en) A kind of cloud computing access control method and system
CN105325021B (en) Method and apparatus for remote portable wireless device authentication
EP4030802A1 (en) Method and apparatus for managing subscription data
CN106650372A (en) open method and device of administrator authority
CN103916834A (en) Short message encryption method and system allowing user to have exclusive secret key
CN102833243B (en) A kind of communication means utilizing finger print information
CN107508814A (en) Data ciphering method, decryption method, apparatus and system
CN110582986B (en) Security authentication method for generating security key by combining authentication factors of multiple users

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant