CN106162625A - Encryption method, decryption method and device thereof - Google Patents
Encryption method, decryption method and device thereof Download PDFInfo
- Publication number
- CN106162625A CN106162625A CN201510180531.8A CN201510180531A CN106162625A CN 106162625 A CN106162625 A CN 106162625A CN 201510180531 A CN201510180531 A CN 201510180531A CN 106162625 A CN106162625 A CN 106162625A
- Authority
- CN
- China
- Prior art keywords
- automatically
- text message
- parameter
- judged
- cipher
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a kind of encryption method, decryption method and device thereof, wherein, this encryption method includes: obtain encryption policy parameter, and wherein, encryption policy parameter includes at least one of: when segment limit, position range, access network;Obtaining current ambient parameter, wherein, ambient parameter includes at least one of: current time, current location, the network being currently accessed;According to encryption policy parameter and ambient parameter, it may be judged whether clear-text message is encrypted automatically;Judged result for being in the case of, automatic encrypting plaintext messages.By the present invention, solve the encryption in correlation technique or the not strong problem of manner of decryption ease for use, improve encryption or the ease for use of deciphering.
Description
Technical field
The present invention relates to the communications field, in particular to a kind of encryption method, decryption method and device thereof.
Background technology
Current mobile Internet develops rapidly, and smart mobile phone has been popularized, based on smart mobile phone social software (for example,
Instant communication software) greatly change communication and the communication way of people.In communication process, generally require transmission one
A little sensitive personal informations, for example: bank's card number, password etc., or are only capable of the important trade secret etc. allowing both sides know
Information.If transmission can be encrypted to these information during sending, the safety felt more relieved will be provided the user
Ensure.
In the related, important information data is encrypted (for example: be compressed into the compressed package files of encryption, or,
The text document etc. of encryption) manual encryption can be used after, retransmit;The other side receives after the information data of encryption hand again
The mode of work deciphering.But use the mode that the common message that instant messaging class software is received and dispatched is encrypted by which, by face
The problem carrying out encryption and decryption operation frequently when facing messaging.Therefore, how to improve while ensureing security as far as possible
The ease for use that message sends, or it while there is good ease for use, is provided that certain security, in correlation technique
Do not provide any guidance.
For the not strong problem of the encryption in correlation technique or manner of decryption ease for use, effective solution party is not yet proposed at present
Case.
Content of the invention
In order to solve above-mentioned technical problem, the invention provides a kind of encryption method, decryption method and device thereof.
According to an aspect of the invention, it is provided a kind of encryption method, comprising: acquisition encryption policy parameter, wherein,
Described encryption policy parameter includes at least one of: when segment limit, position range, access network;Obtain current ring
Border parameter, wherein, described ambient parameter includes at least one of: current time, current location, the net being currently accessed
Network;According to described encryption policy parameter and described ambient parameter, it may be judged whether clear-text message is encrypted automatically;Sentencing
In the case that disconnected result is for being, the described clear-text message of encryption automatically.
Preferably, according to described encryption policy parameter and described ambient parameter, it may be judged whether clear-text message is added automatically
Close include: judge described current time whether within the scope of the described period, and/or, it is judged that whether described current location
Within described position range, and/or, it is judged that described access network whether include described in the network that is currently accessed;Sentencing
Disconnected result is in the case of being, determines and automatically encrypts described clear-text message.
Preferably, according to described encryption policy parameter and described ambient parameter, it may be judged whether clear-text message is added automatically
Close include: according to described encryption policy parameter and described ambient parameter, it is judged that the environment being presently in is the need of improving peace
Quan Xing;In the case that judged result improves security for needs, determine and described clear-text message is encrypted automatically.
Preferably, before judging whether automatically to encrypt clear-text message, described method also includes: judge currently to disappear
Whether breath is clear-text message described in unencrypted;Judged result for being in the case of, continue according to described encryption policy join
Number and described ambient parameter judge whether automatically to encrypt described clear-text message;In the case that judged result is no,
Directly determine and described current message is not encrypted automatically.
Preferably, before judging whether current message is clear-text message described in unencrypted, described method also includes: connect
Receive the instruction manually encrypted described current message;Described current message is encrypted.
According to another aspect of the present invention, a kind of decryption method is additionally provided, comprising: obtain decryption policy parameter, its
In, described decryption policy parameter includes at least one of: when segment limit, position range, access network;Obtain current
Ambient parameter, wherein, described ambient parameter includes at least one of: current time, current location, be currently accessed
Network;According to described decryption policy parameter and described ambient parameter, it may be judged whether cipher-text message is deciphered automatically;
Judged result for being in the case of, the automatically described cipher-text message of deciphering.
Preferably, according to described decryption policy parameter and described ambient parameter, it may be judged whether cipher-text message is solved automatically
Close include: judge described current time whether within the scope of the described period, and/or, it is judged that whether current location in institute
Within the scope of rheme is put, and/or, it is judged that described access network whether include described in the network that is currently accessed;Judging knot
Fruit is in the case of being, determines and automatically deciphers described cipher-text message.
Preferably, according to described decryption policy parameter and described ambient parameter, it may be judged whether cipher-text message is solved automatically
Close include: according to described decryption policy parameter and described ambient parameter, it is judged that the environment being presently in whether safety;Sentencing
In the case that disconnected result is safe, determines and described cipher-text message is deciphered automatically.
Preferably, before judging whether automatically to decipher cipher-text message, described method also includes: judge currently to disappear
Whether breath is the described cipher-text message do not deciphered;Judged result for being in the case of, continue according to described decryption policy join
Number and described ambient parameter, it may be judged whether described cipher-text message is deciphered automatically;In the case that judged result is no,
Directly determine and described current message is not deciphered automatically.
Preferably, in judged result for described cipher-text message not being deciphered automatically, or, determine to described to ciphertext
Message is automatically deciphered but is automatically deciphered unsuccessfully, or, the feelings that function is not opened are deciphered to the automatic of described cipher-text message
Under condition, described method also includes: receive the instruction manually deciphered described cipher-text message;Described cipher-text message is entered
Row deciphering.
According to another aspect of the present invention, additionally provide a kind of encryption device, comprising: the first acquisition module, be used for obtaining
Taking encryption policy parameter, wherein, described encryption policy parameter includes at least one of: when segment limit, position range,
Access network;Second acquisition module, for obtaining current ambient parameter, wherein, described ambient parameter include with down to
One of few: current time, current location, the network being currently accessed;First judge module, for according to described encryption plan
Slightly parameter and described ambient parameter, it may be judged whether clear-text message is encrypted automatically;First encrypting module, in institute
In the case of stating the judged result of the first judge module for being, the described clear-text message of encryption automatically.
Preferably, whether described first judge module includes: the first judging unit, be used for judging described current time in institute
Within the scope of stating the period, and/or, it is judged that described current location whether within described position range, and/or, it is judged that institute
State access network whether include described in the network that is currently accessed;First determining unit, at described first judging unit
Judged result is in the case of being, determines and automatically encrypts described clear-text message.
Preferably, described first judge module includes: the second judging unit, for according to described encryption policy parameter and institute
State ambient parameter, it is judged that the environment being presently in is the need of raising security;Second determining unit, for described the
In the case that the judged result of two judging units improves security for needs, determine and described clear-text message is encrypted automatically.
Preferably, described device also includes: the second judge module, is used for judging whether current message is described in unencrypted
Clear-text message;First determining module, is used in the case that the judged result of described second judge module is no, directly really
Determine automatically not encrypt described current message;Wherein, described first judge module, is additionally operable to judge described second
In the case that the judged result of module is for being, it is right that continuation judges whether according to described encryption policy parameter and described ambient parameter
Described clear-text message is encrypted automatically.
Preferably, described device also includes: the first receiver module, manually encrypts described current message for receiving
Instruction;Second encrypting module, for being encrypted to described current message.
According to another aspect of the present invention, additionally provide a kind of deciphering device, comprising: the 3rd acquisition module, be used for obtaining
Taking decryption policy parameter, wherein, described decryption policy parameter includes at least one of: when segment limit, position range,
Access network;4th acquisition module, for obtaining current ambient parameter, wherein, described ambient parameter include with down to
One of few: current time, current location, the network being currently accessed;3rd judge module, for according to described deciphering plan
Slightly parameter and described ambient parameter, it may be judged whether cipher-text message is deciphered automatically;First deciphering module, in institute
In the case of stating the judged result of the 3rd judge module for being, the described cipher-text message of deciphering automatically.
Preferably, whether described 3rd judge module includes: the 3rd judging unit, be used for judging described current time in institute
Within the scope of stating the period, and/or, it is judged that current location whether within described position range, and/or, it is judged that described connect
Enter network whether include described in the network that is currently accessed;3rd determining unit, for the judgement at described 3rd judging unit
Result is in the case of being, determines and automatically deciphers described cipher-text message.
Preferably, described 3rd judge module includes: the 4th judging unit, for according to described decryption policy parameter and institute
State ambient parameter, it is judged that the environment being presently in whether safety;4th determining unit, at described 4th judging unit
Judged result in the case of be safe, determine and described cipher-text message deciphered automatically.
Preferably, described device also includes: the 4th judge module, for judging that whether current message is do not decipher described
Cipher-text message;Second determining module, is used in the case that the judged result of described 4th judge module is no, directly really
Determine automatically not decipher described current message;Wherein, described 3rd judge module, is additionally operable in described 4th judgement
In the case that the judged result of module is for being, continue according to described decryption policy parameter and described ambient parameter, it may be judged whether
Described cipher-text message is deciphered automatically.
Preferably, described device also includes: the second receiver module, for the judged result at described 3rd judge module is
Described cipher-text message is not deciphered automatically, or, determine and cipher-text message deciphered automatically to described but automatically solve
Close failure, or, in the case that the automatically deciphering function of described cipher-text message is not opened, receive to described cipher-text message
The instruction manually deciphered;Second deciphering module, for being decrypted to described cipher-text message.
By the present invention, using and obtaining encryption policy parameter, wherein, encryption policy parameter includes at least one of: when
Segment limit, position range, access network;Obtain current ambient parameter, wherein, ambient parameter include following at least it
One: current time, current location, the network being currently accessed;According to encryption policy parameter and ambient parameter, it may be judged whether
Clear-text message is encrypted automatically;Judged result for being in the case of, the mode of automatic encrypting plaintext messages, solve
Encryption in correlation technique or the strong problem of manner of decryption ease for use, improve encryption or the ease for use of deciphering.
Brief description
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, the present invention
Schematic description and description be used for explaining the present invention, be not intended that inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of encryption method according to embodiments of the present invention;
Fig. 2 is the flow chart of decryption method according to embodiments of the present invention;
Fig. 3 is the structural representation of encryption device according to embodiments of the present invention;
Fig. 4 is the preferred structure schematic diagram one of encryption device according to embodiments of the present invention;
Fig. 5 is the preferred structure schematic diagram two of encryption device according to embodiments of the present invention;
Fig. 6 is the structural representation of deciphering device according to embodiments of the present invention;
Fig. 7 is the preferred structure schematic diagram one of deciphering device according to embodiments of the present invention;
Fig. 8 is the preferred structure schematic diagram two of deciphering device according to embodiments of the present invention;
Fig. 9 is the flow chart of encryption method according to the preferred embodiment of the invention;
Figure 10 is the flow chart of decryption method according to the preferred embodiment of the invention.
Detailed description of the invention
Below with reference to accompanying drawing and describe the present invention in detail in conjunction with the embodiments.It should be noted that in the feelings do not conflicted
Under condition, the embodiment in the application and the feature in embodiment can be mutually combined.
Other features and advantages of the present invention will illustrate in the following description, and, partly become from specification
It is clear that or understood by implementing the present invention.The purpose of the present invention and other advantages can be by the explanations write
Structure specifically noted in book, claims and accompanying drawing realizes and obtains.
In order to make those skilled in the art be more fully understood that the present invention program, attached below in conjunction with in the embodiment of the present invention
Figure, is clearly and completely described to the technical scheme in the embodiment of the present invention, it is clear that described embodiment is only
It is a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, this area is common
The every other embodiment that technical staff is obtained under the premise of not making creative work, all should belong to the present invention and protect
The scope protected.
It should be noted that the order of the process step in the embodiment of the present invention, preferred embodiment is in situation about not conflicting
Under, it is not strict restriction.For example, in the following steps, the order of step S102 and S104 can be exchanged.
There is also analogue in other embodiments of the present invention.
Embodiments provide a kind of encryption method.Fig. 1 is the flow chart of encryption method according to embodiments of the present invention,
As it is shown in figure 1, this flow process comprises the steps:
Step S102, obtains encryption policy parameter, and wherein, encryption policy parameter includes but is not limited at least one of:
When segment limit, position range, access network;
Step S104, obtains current ambient parameter, and wherein, ambient parameter includes but is not limited at least one of:
Current time, current location, the network being currently accessed;
Step S106, according to encryption policy parameter and ambient parameter, it may be judged whether automatically encrypt clear-text message;
Step S108, judged result for being in the case of, automatic encrypting plaintext messages.
By above-mentioned steps, by the information to including but not limited to current time or current location or the network being currently accessed
The mode comparing with encryption policy parameter, automatically determines whether to be encrypted clear-text message;Relative to correlation technique
The middle mode needing manually to encrypt by way of artificial judgement, solves adding in correlation technique by the present embodiment
Close or that manner of decryption ease for use is not strong problem, improves encryption or the ease for use of deciphering.
It should be noted that the such scheme that the embodiment of the present invention provides can apply to a terminal, or this terminal
In MSN;Above-mentioned clear-text message can be stored in this terminal having special characteristic and (for example be positioned at specific
Storage catalogue) file, it is also possible to be the instant message that will send in MSN.Correspondingly, follow-up
Embodiment in, cipher-text message also can make to be stored in terminal the file with special characteristic, it is also possible to is at IMU
The instant message receiving in news software.
In the case of being applied to above-mentioned steps in the encryption process of MSN, above-mentioned steps can also include:
Step S109, sends the clear-text message through encryption.
Preferably, in step s 106, for current time, current location, the network being currently accessed judge whether into
During row encryption, following decision logic can be used: judge current time whether within the scope of the period, and/or, it is judged that
Current location whether within the scope of position, and/or, it is judged that whether access network includes the network being currently accessed;And
The result of above-mentioned judgement is in the case of being, determines and automatically encrypts clear-text message.In actual applications, permissible
Choose current time, current location, one or more modes combining in the network that is currently accessed judge,
Additionally, be also not necessarily limited to other the feature for judging whether to encryption and decryption in embodiments of the present invention, such as: for
The terminal of multi-user login, can also be by judging whether to need to bright to the current user's (such as user right) logging in
Literary composition message is encrypted.
Above-mentioned for current time, current location, present access network judgement in, give the example of a kind of judgement.
But in actual applications, owing to some parameter in encryption policy parameter can have different implication, such as: encryption policy
" when segment limit " in parameter, can be used to the period that instruction needs encryption, but " periods in other example at some
Scope " may also be used for indicating the period not needing encryption.Preferably, in order to the scheme making the embodiment of the present invention is more complete
Kind, step S106 in certain embodiments can use following decision logic: according to encryption policy parameter and ring
Border parameter, it is judged that the environment being presently in is the need of raising security;It is the feelings needing to improve security in judged result
Under condition, determine and clear-text message is encrypted automatically.That is, no matter how the meaning of parameters in encryption policy parameter changes,
As long as the environment residing for encryption policy parameter and current environment parameter determination present terminal can be passed through pacifies the need of improving
Quan Xing, then can carry out automatic decision to the need of encryption further.
In some cases, clear-text message can manually be encrypted, then in this case, continues to disappear ciphertext
Encryption for information is probably unnecessary;Meanwhile, multi-enciphering also will make to decipher increasingly complex.To this end, implement in the present invention
In example, before clear-text message is encrypted, all right: to judge whether current message is unencrypted clear-text message;
Judged result for being in the case of, continue judge whether to carry out clear-text message according to encryption policy parameter and ambient parameter
Automatically encryption;In the case that judged result is no, directly determines and current message is not encrypted automatically.Further,
In the case that instant message is encrypted, however, it is determined that current message is not encrypted automatically, then directly transmit current
Message.
Preferably, the mode of manually encryption is additionally provided in embodiments of the present invention.For example, whether current message is being judged
Before unencrypted clear-text message, can also be by receiving the instruction manually encrypted current message;And according to this
The instruction of instruction, is encrypted to current message.In implementation process, if scheme is applied in MSN,
One control so can be provided in the chat box of MSN, be used for receiving the manually encryption instruction of user.?
After user sends manually encryption instruction, no matter whether current automatic encryption function enables, or sentencing in step S106
Whether disconnected result determines that encryption, directly can be encrypted current message.
In addition it is also necessary to explanation, in embodiments of the present invention, for the algorithm of encrypting and decrypting, (such as symmetry adds solution
Close algorithm, asymmetric enciphering and deciphering algorithm), the transmission content of the configuration parameter such as encryption and decryption key is not related to, therefore also not
Again these parts are described.The technology contents relevant with AES, is referred to currently existing scheme in correlation technique.
The enciphering and deciphering algorithm using i.e., in embodiments of the present invention includes but is not limited to existing enciphering and deciphering algorithm in prior art.
Corresponding to above-mentioned encryption method, the embodiment of the present invention additionally provides a kind of decryption method.Fig. 2 is according to the present invention
The flow chart of the decryption method of embodiment, as in figure 2 it is shown, this flow process comprises the steps:
Step S202, obtains decryption policy parameter, and wherein, decryption policy parameter includes but is not limited at least one of:
When segment limit, position range, access network;
Step S204, obtains current ambient parameter, and wherein, ambient parameter includes but is not limited at least one of:
Current time, current location, the network being currently accessed;
Step S206, according to decryption policy parameter and ambient parameter, it may be judged whether automatically decipher cipher-text message;
Step S208, judged result for being in the case of, automatic decrypting ciphertext message.
By above-mentioned steps, solve the encryption in correlation technique or the not strong problem of manner of decryption ease for use, improve and add
Ease for use that is close or that decipher.
It should be noted that decryption policy parameter and encryption policy parameter can be identical parameters, it is also possible to be different
Parameter;Preferably, above-mentioned decryption policy parameter and encryption policy parameter can be configured respectively according to actual conditions.
Preferably, before step S202, the method can also include:
Step S201, receives cipher-text message.
Preferably, similar with encryption method, in step S206 can: judge current time whether when segment limit
Within, and/or, it is judged that current location whether within the scope of position, and/or, it is judged that whether access network includes currently
The network accessing;Judged result be in the case of, determine cipher-text message is deciphered automatically.
Preferably, in step S206, all right: according to decryption policy parameter and ambient parameter, it is judged that be presently in
Environment whether safety;In the case that judged result is safe, determines and cipher-text message is deciphered automatically.That is,
No matter how the meaning of parameters in decryption policy parameter changes, as long as decryption policy parameter and current environment parameter can be passed through
Determine that the environment residing for present terminal is safe, then can carry out automatic decision to the need of deciphering further.
In actual applications, typically only cipher-text message is decrypted, it is preferable that judging whether to enter cipher-text message
Before row is deciphered automatically, method can also include: judges whether current message is the cipher-text message do not deciphered;Judging knot
In the case that fruit is for being, continue according to decryption policy parameter and ambient parameter, it may be judged whether cipher-text message is solved automatically
Close;In the case that judged result is no, directly determines and current message is not deciphered automatically.
Preferably, in judged result for cipher-text message not being deciphered automatically, or, determine cipher-text message is carried out from
Dynamic deciphering but automatically decipher unsuccessfully, or, decipher function to cipher-text message automatic in the case of do not open, method also may be used
To include: receive the instruction manually deciphered cipher-text message;Cipher-text message is decrypted.By which, can
With realization manually deciphering, thus further increase the flexibility of decrypting ciphertext message.Similarly, manually deciphering
In the case of, it is also possible to trigger by way of the decryption instructions that control receives user.
Additionally provide a kind of encryption device in the present embodiment, for realizing the embodiment of above-mentioned encryption method and being preferable to carry out
Mode, had carried out repeating no more of explanation, had illustrated the module relating in this device below.Such as following institute
Using, term " module " can realize the software of predetermined function and/or the combination of hardware.Although described by following example
Device preferably realize with software, but hardware, or the realization of the combination of software and hardware be also may and by structure
Think.
Fig. 3 is the structural representation of encryption device according to embodiments of the present invention, as it is shown on figure 3, this device includes: the
One acquisition module the 32nd, the second acquisition module the 34th, the first judge module 36 and the first encrypting module 38, wherein, first obtains
Delivery block 32, is used for obtaining encryption policy parameter, and wherein, encryption policy parameter includes at least one of: when segment limit,
Position range, access network;Second acquisition module 34, for obtaining current ambient parameter, wherein, ambient parameter bag
Include at least one of: current time, current location, the network being currently accessed;First judge module 36, couples respectively
To the first acquisition module 32 and the second acquisition module 34, for according to encryption policy parameter and ambient parameter, it may be judged whether
Clear-text message is encrypted automatically;First encrypting module 38, is coupled to the first judge module 36, for sentencing first
In the case that the judged result of disconnected module is for being, automatic encrypting plaintext messages.
Preferably, whether the first judge module 36 includes: the first judging unit 362, be used for judging current time in the period
Within the scope of, and/or, it is judged that current location whether within the scope of position, and/or, it is judged that whether access network includes
The network being currently accessed;First determining unit 364, is coupled to the first judging unit 362, at the first judging unit
The judged result of 362 is in the case of being, determines and automatically encrypts clear-text message.
Preferably, the first judge module 36 includes: the second judging unit 366, for according to encryption policy parameter and environment
Parameter, it is judged that the environment being presently in is the need of raising security;Second determining unit 368, coupled to the second judgement
Unit 366, in the case that the judged result of the second judging unit 366 improves security for needs, determination is to bright
Literary composition message is encrypted automatically.
Fig. 4 is the preferred structure schematic diagram one of encryption device according to embodiments of the present invention, as shown in Figure 4, it is preferable that
Device also includes: the second judge module 42, is used for judging whether current message is unencrypted clear-text message;First determines
Module 44, is coupled to the second judge module 42, is used in the case that the judged result of the second judge module 42 is no,
Directly determine and current message is not encrypted automatically;Wherein, the first judge module 36, is also coupled to the second judge module
42, be additionally operable to the judged result of the second judge module 42 for being in the case of, continue according to encryption policy parameter and ring
Border parameter judges whether automatically to encrypt clear-text message.
Fig. 5 is the preferred structure schematic diagram two of encryption device according to embodiments of the present invention, as shown in Figure 5, it is preferable that
Device also includes: the first receiver module 52, for receiving the instruction manually encrypted current message;Second encryption mould
Block 54, is coupled to the first receiver module 52 and the second judge module 42, for being encrypted current message.
It should be understood that the first above-mentioned judge module 36 and the second judge module 42 can close and set;Above-mentioned first
Encrypting module 38 and the second encrypting module 54 can close and set.
Additionally provide a kind of deciphering device in the present embodiment, for realizing the embodiment of above-mentioned decryption method and being preferable to carry out
Mode, had carried out repeating no more of explanation, had illustrated the module relating in this device below.
Fig. 6 is the structural representation of deciphering device according to embodiments of the present invention, and as shown in Figure 6, this device includes: the
Three acquisition modules the 62nd, the 4th acquisition module the 64th, the 3rd judge module 66 and the first deciphering module 68, wherein, the 3rd obtains
Delivery block 62, is used for obtaining decryption policy parameter, and wherein, decryption policy parameter includes at least one of: when segment limit,
Position range, access network;4th acquisition module 64, for obtaining current ambient parameter, wherein, ambient parameter bag
Include at least one of: current time, current location, the network being currently accessed;3rd judge module 66, couples respectively
To the 3rd acquisition module 62 and the 4th acquisition module 64, for according to decryption policy parameter and ambient parameter, it may be judged whether
Cipher-text message is deciphered automatically;First deciphering module 68, is coupled to the 3rd judge module 66, for sentencing the 3rd
In the case that the judged result of disconnected module 66 is for being, automatic decrypting ciphertext message.
Preferably, whether the 3rd judge module 66 includes: the 3rd judging unit 662, be used for judging current time in the period
Within the scope of, and/or, it is judged that current location whether within the scope of position, and/or, it is judged that whether access network includes
The network being currently accessed;3rd determining unit 664, is coupled to the 3rd judging unit 662, at the 3rd judging unit
The judged result of 662 is in the case of being, determines and automatically deciphers cipher-text message.
Preferably, the 3rd judge module 66 includes: the 4th judging unit 666, for according to decryption policy parameter and environment
Parameter, it is judged that the environment being presently in whether safety;4th determining unit 668, is coupled to the 4th judging unit 666,
In the case of being safe for the judged result at the 4th judging unit 666, determine and cipher-text message is deciphered automatically.
Fig. 7 is the preferred structure schematic diagram one of deciphering device according to embodiments of the present invention, as shown in Figure 7, it is preferable that
Device also includes: the 4th judge module 72, for judging whether current message is the cipher-text message do not deciphered;Second determines
Module 74, is coupled to the 4th judge module 72, is used in the case that the judged result of the 4th judge module 72 is no,
Directly determine and current message is not deciphered automatically;Wherein, the 3rd judge module 66, is also coupled to the 4th judge module
72, be additionally operable to the judged result of the 4th judge module 72 for being in the case of, continue according to decryption policy parameter and ring
Border parameter, it may be judged whether cipher-text message is deciphered automatically;
Fig. 8 is the preferred structure schematic diagram two of deciphering device according to embodiments of the present invention, as shown in Figure 8, it is preferable that
Device also includes: the second receiver module 82, for being not carry out cipher-text message certainly in the judged result of the 3rd judge module
Dynamic deciphering, or, determine and cipher-text message is deciphered automatically but automatically decipher unsuccessfully, or, to oneself of cipher-text message
In the case that dynamic deciphering function is not opened, receive the instruction manually deciphered cipher-text message;Second deciphering module 84,
Coupled to the second receiver module 82 and the 4th judge module 72, for cipher-text message is decrypted.
It should be noted that the 3rd above-mentioned judge module 66 and the 4th judge module 72 can close and set;Above-mentioned first
Deciphering module 68 and the second deciphering module 84 can close and set.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to be
Unit is individually physically present, it is also possible to two or more unit are integrated in a unit.Above-mentioned integrated list
Unit both can use the form of hardware to realize, it would however also be possible to employ the form of SFU software functional unit realizes.
It in order to the description making the embodiment of the present invention is clearer, is described below in conjunction with preferred embodiment and illustrates.
The preferred embodiment of the present invention illustrates as a example by the encryption and decryption to instant messages, provides a kind of instant messages
Automatic encipher-decipher method.
The purpose of the preferred embodiment of the present invention is to carry out encryption and decryption control to instant message during instant information transmit-receive, bag
Include but be not limited to based on one of parameters such as position, network hotspot, time or multiple carry out automatic encryption and decryption strategy
Calculating, the message for transmitting-receiving in ad-hoc location and specific time period carries out automatic encryption and decryption process.
Owing to itself having higher confidence in security otherness in ad-hoc location and specific time period, itself i.e. means one
Fixed security feature information, and automatic encryption and decryption processes and means that encryption and decryption link is transparent for a user, so exists
In ad-hoc location and specific time period, user receives and dispatches encryption and decryption message and will have on the premise of having certain safety assurance preferably
Consumer's Experience.
Fig. 9 is the flow chart of encryption method according to the preferred embodiment of the invention, as it is shown in figure 9, comprise the steps:
Step S902, initiation parameter configures.
Main configuration encryption key, automatic encryption function switch, the relevant parameter of automatic encryption policy in this step;Its
In, the parameter (being equivalent to above-mentioned encryption policy parameter) of automatic encryption policy includes position range, the net automatically encrypted
Network focus, when the parameter such as segment limit, these parameters are for determining whether automatically encrypt when sending message.Wherein,
The determination of position range uses the basic function combining the mobile terminal such as map, position positioning to demarcate the position of encryption automatically
Reference point, determines position range by effective radius on the basis of reference point, and position range can be effective radius
Interior region, it is also possible to be the region outside radius, it is also possible to be union or the common factor in multiple region.Network hotspot is main
It is the confidence level that conventional WIFI network is set.Position range and network hotspot can together be used for indicating positions security
Judge, it is also possible to being used for independently determines home.When segment limit for indicating the time period needing automatically encryption.
Step S904, monitors input state and manually encrypts, can monitor instant communication software interface input box in real time
Input state;
Step S906, it may be judged whether manually encrypt.Wherein, the mutual control of manually encryption is provided in input process
Part (for example, for triggering the suspension button of manually encryption).When manual encryption control is triggered, instruction manually adds
In the case of close, step S908, otherwise enter step S910;
Step S908, then be directly encrypted to ciphertext by input frame urtext according to the encryption key that step S902 configures,
And the ciphertext after the urtext in input frame is replaced with encryption;
Step S910, triggers message transmitting process;
Step S912, when message is triggered transmission, then first judges in text box, whether input content is hand in step S908
Dynamic encrypted ciphertext, in this way, then enters step S922 and directly transmits message in input frame;Otherwise, enter step S914;
Step S914, it may be judged whether open automatic encryption function;In the case of opening encryption automatically, enter step S916,
Otherwise step S922;
Step S916, automatic encryption policy calculates;
Step S918, the result calculating according to automatic encryption policy, in automatic decision input frame, message is the need of encryption;
Preferably, automatic encryption policy computing module obtains current position, the WIFI hot spot of connection and current in real time
Temporal information, and by its position range arranging with step S902, network hotspot, when the parameter such as segment limit compare
Relatively, when satisfied imposing a condition, then step S920, otherwise, step S922 are proceeded to;
Step S920, under the conditions of meeting encryption automatically, the encryption automatically content in input frame being arranged according to step S902
Key is encrypted to ciphertext;
Ciphertext is sent by step S922.
Figure 10 is the flow chart of decryption method according to the preferred embodiment of the invention, as shown in Figure 10, comprises the steps:
Step S1002, initiation parameter configures;
Configure decruption key, automatically deciphering functional switch, the relevant parameter of automatic decryption policy in this step.Wherein,
The parameter (being equivalent to above-mentioned decryption policy parameter) of automatic decryption policy includes position range, the network boom automatically deciphered
Point, when the parameter such as segment limit, these parameters are for determining whether automatically decipher when sending message.Wherein, position
The determination of scope uses the basic function combining the mobile terminal such as map, position positioning to demarcate the position reference of deciphering automatically
Reference point, determines position range by effective radius on the basis of reference point, in position range can be effective radius
Region, it is also possible to be the region outside radius, it is also possible to be union or the common factor in multiple region.Network hotspot mainly sets
Put the confidence level of conventional WIFI network.Position range and network hotspot can together be used for the judgement of indicating positions security,
Also can independently be used for determining home.When segment limit for indicating the time period needing automatically deciphering.
Step S1004, monitoring receives message;
Step S1006, it is judged that receive whether message is ciphertext, such as non-ciphertext, then step S1008;Otherwise, hold
Row step S1010;
Step S1008, directly displays the original plaintext message receiving;
Step S1010, in this way ciphertext, it is judged that whether deciphering function opens automatically, as do not opened, step S1022,
Directly display original cipher text message;Otherwise step S1012;
Step S1012, automatic decryption policy calculates;
Step S1014, according to decryption policy result of calculation, automatic decision receives message the need of automatic deciphering.Preferably
Ground, automatic decryption policy computing module obtains current position, the WIFI hot spot of connection and letter of current time in real time
Breath, and by its position range arranging with step S1002, network hotspot, when the parameter such as segment limit compare, when expiring
When foot imposes a condition, then proceed to step S1016;Otherwise, step S1022, directly displays original cipher text message;
Step S1016, under meeting automatic decryption condition, will receive the deciphering that message is arranged according to step S1002 automatically
Double secret key receives message and is decrypted;
Step S1018, it is judged that whether deciphering is successful, such as successful decryption, then step S1020;Otherwise, step is performed
Rapid S1022;
Step S1020, the plaintext after display deciphering;
Step S1022, directly displays original cipher text message;
Step S1024, it may be judged whether manually decipher;
Wherein, in the case of automatic deciphering is not opened, is unsatisfactory for automatic decryption condition or automatically deciphers unsuccessfully, receive
Message be original cipher text.The interactive controls that now interface display is manually deciphered is (for example for triggering the suspension of manually deciphering
Button);If manually deciphering, then step S1026, otherwise, return step S1020 and terminate flow process.
Step S1026, when manual deciphering control is triggered, then ejects manual decryption interface, can input decruption key;
Step S1028, when the key being manually entered mates with the decruption key that step S1002 is arranged, then to reception message
It is decrypted;
Step S1030, it is judged that whether deciphering is successful;Such as successful decryption, then step S1020, show after deciphering
In plain text;As deciphered failure, then step S1022, still show original cipher text message, and be given and decipher carrying unsuccessfully
Show information.
It should be noted that the encryption and decryption method described in the preferred embodiment of the present invention can be applied in combination, i.e. certainly
Dynamic encryption, also deciphers simultaneously automatically, it is also possible to independent realization, only uses encryption automatically or automatically deciphers.Additionally, at this
Merge the scheme of manual encryption and decryption while invention preferred embodiment provides automatic encryption and decryption;In actual applications, may be used
Only use manual encipher-decipher method to close automatic encryption and decryption according to actual needs, or only use automatic encryption and decryption not make
Use manual encipher-decipher method.
Additionally, for automatic encipher-decipher method, select in the parameter of automatic encryption and decryption policy calculation, position, WIFI
Focus, three parameters of time period can only take partial parameters, it is also possible to three parametric joints use, it might even be possible to choose all
Such as other type of parameters such as orientation.As do not differentiated between all parameters, then automatic encipher-decipher method then deteriorates at all situations
Under encryption or automatically decipher message all automatically, so in transmitting procedure, message itself still has security, but in terminal
There is certain ease for use or security loss in transmitting-receiving side.
In sum, according to the abovementioned embodiments of the present invention, preferred embodiment and embodiment understand, the embodiment of the present invention
The automatic encryption and decryption providing is transparent for a user, has preferable Consumer's Experience while having certain security;
In the scheme of above-described embodiment, being encrypted encrypted content itself, the ciphertext after encryption can be by existing transmission
Channel or existing communication customer end directly transmit or preserve, and have and adapt to advantage wide, with low cost;Above-mentioned
Content is encrypted by scheme, and user is directly it can be seen that ciphertext effect after Jia Mi, and secrecy effect is intuitively visible, has
Good secrecy is experienced;Additionally, the scheme that the embodiment of the present invention provides is succinctly easy-to-use alternately, user learning and use are all non-
Often convenient.
In another embodiment, additionally providing a kind of software, this software is used for performing above-described embodiment and is preferable to carry out
Technical scheme described in mode.
In another embodiment, additionally providing a kind of storage medium, be stored with in this storage medium above-mentioned software, should
Storage medium includes but is not limited to: CD, floppy disk, hard disk, scratch pad memory etc..
It should be noted that term " first " in description and claims of this specification and above-mentioned accompanying drawing, " second "
Etc. being for distinguishing similar object, without being used for describing specific order or precedence.Should be appreciated that so use
Object can exchange in the appropriate case, in order to embodiments of the invention described herein can be with except here illustrating
Or the order enforcement beyond those describing.Additionally, term " includes " and " having " and their any deformation, it is intended that
Be to cover non-exclusive comprising, for example, contain the process of series of steps or unit, method, system, product or
Equipment is not necessarily limited to those steps or the unit clearly listed, but can include clearly not listing or for these
Other intrinsic steps of process, method, product or equipment or unit.
Obviously, those skilled in the art should be understood that each module of the above-mentioned present invention or each step can be with general
Computing device realizes, they can concentrate in single computing device, or is distributed in multiple computing device and is formed
Network on, alternatively, they can be realized by the executable program code of computing device, it is thus possible to by them
Storage is performed by computing device in the storage device, and in some cases, can hold with the order being different from herein
The shown or described step of row, or they are fabricated to respectively each integrated circuit modules, or by many in them
Individual module or step are fabricated to single integrated circuit module and realize.So, the present invention is not restricted to any specific hardware
Combine with software.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the technology of this area
For personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, that is made is any
Modification, equivalent, improvement etc., should be included within the scope of the present invention.
Claims (20)
1. an encryption method, it is characterised in that include:
Obtaining encryption policy parameter, wherein, described encryption policy parameter includes at least one of: when segment limit,
Position range, access network;
Obtaining current ambient parameter, wherein, described ambient parameter includes at least one of: current time, when
Front position, the network being currently accessed;
According to described encryption policy parameter and described ambient parameter, it may be judged whether clear-text message is encrypted automatically;
Judged result for being in the case of, the automatically described clear-text message of encryption.
2. method according to claim 1, it is characterised in that according to described encryption policy parameter and described ambient parameter,
Judge whether automatically to encrypt clear-text message to include:
Judge described current time whether within the scope of the described period, and/or, it is judged that whether described current location
Within described position range, and/or, it is judged that described access network whether include described in the network that is currently accessed;
Judged result be in the case of, determine described clear-text message is encrypted automatically.
3. method according to claim 1, it is characterised in that according to described encryption policy parameter and described ambient parameter,
Judge whether automatically to encrypt clear-text message to include:
According to described encryption policy parameter and described ambient parameter, it is judged that the environment being presently in is pacified the need of improving
Quan Xing;
In the case that judged result improves security for needs, determine and described clear-text message is encrypted automatically.
4. according to the method in any one of claims 1 to 3, it is characterised in that judging whether to enter clear-text message
Before row is encrypted automatically, described method also includes:
Judge whether current message is clear-text message described in unencrypted;
Judged result for being in the case of, continue to judge according to described encryption policy parameter and described ambient parameter be
No described clear-text message is encrypted automatically;
In the case that judged result is no, directly determines and described current message is not encrypted automatically.
5. method according to claim 4, it is characterised in that judging whether current message is stated clearly by unencrypted
Before literary composition message, described method also includes:
Receive the instruction manually encrypted described current message;
Described current message is encrypted.
6. a decryption method, it is characterised in that include:
Obtaining decryption policy parameter, wherein, described decryption policy parameter includes at least one of: when segment limit,
Position range, access network;
Obtaining current ambient parameter, wherein, described ambient parameter includes at least one of: current time, when
Front position, the network being currently accessed;
According to described decryption policy parameter and described ambient parameter, it may be judged whether cipher-text message is deciphered automatically;
Judged result for being in the case of, the automatically described cipher-text message of deciphering.
7. method according to claim 6, it is characterised in that according to described decryption policy parameter and described ambient parameter,
Judge whether automatically to decipher cipher-text message to include:
Judge described current time whether within the scope of the described period, and/or, it is judged that whether current location in institute
Within the scope of rheme is put, and/or, it is judged that described access network whether include described in the network that is currently accessed;
Judged result be in the case of, determine described cipher-text message is deciphered automatically.
8. method according to claim 6, it is characterised in that according to described decryption policy parameter and described ambient parameter,
Judge whether automatically to decipher cipher-text message to include:
According to described decryption policy parameter and described ambient parameter, it is judged that the environment being presently in whether safety;
In the case that judged result is safe, determines and described cipher-text message is deciphered automatically.
9. method according to claim 6, it is characterised in that judging whether automatically to decipher it to cipher-text message
Before, described method also includes:
Judge whether current message is the described cipher-text message do not deciphered;
Judged result for being in the case of, continue according to described decryption policy parameter and described ambient parameter, it is judged that
Whether described cipher-text message is deciphered automatically;
In the case that judged result is no, directly determines and described current message is not deciphered automatically.
10. the method according to according to any one of claim 6 to 9, it is characterised in that in judged result for not to described close
Literary composition message is deciphered automatically, or, determine and cipher-text message deciphered automatically to described but automatically decipher unsuccessfully,
Or, in the case of not opening the automatically deciphering function of described cipher-text message, described method also includes:
Receive the instruction manually deciphered described cipher-text message;
Described cipher-text message is decrypted.
11. 1 kinds of encryption devices, it is characterised in that include:
First acquisition module, is used for obtaining encryption policy parameter, wherein, described encryption policy parameter include with down to
One of few: when segment limit, position range, access network;
Second acquisition module, for obtaining current ambient parameter, wherein, described ambient parameter include following at least
One of: current time, current location, the network being currently accessed;
First judge module, for according to described encryption policy parameter and described ambient parameter, it may be judged whether in plain text
Message is encrypted automatically;
First encrypting module, for the judged result of described first judge module for being in the case of, automatically encrypt
Described clear-text message.
12. devices according to claim 11, it is characterised in that described first judge module includes:
First judging unit, be used for judging described current time whether within the scope of the described period, and/or, sentence
Break described current location whether within described position range, and/or, it is judged that whether described access network includes institute
State the network being currently accessed;
First determining unit, for the judged result of described first judging unit be in the case of, it is right to determine
Described clear-text message is encrypted automatically.
13. devices according to claim 11, it is characterised in that described first judge module includes:
Second judging unit, for according to described encryption policy parameter and described ambient parameter, it is judged that be presently in
Environment is the need of raising security;
Second determining unit, for being the situation needing to improve security in the judged result of described second judging unit
Under, determine and described clear-text message is encrypted automatically.
14. devices according to according to any one of claim 11 to 13, it is characterised in that described device also includes:
Second judge module, is used for judging whether current message is clear-text message described in unencrypted;
First determining module, in the case that the judged result of described second judge module is no, directly determines
Described current message is not encrypted automatically;
Wherein, described first judge module, is additionally operable to the situation being yes in the judged result of described second judge module
Under, continue to judge whether to carry out described clear-text message automatically according to described encryption policy parameter and described ambient parameter
Encryption.
15. devices according to claim 14, it is characterised in that described device also includes:
First receiver module, for receiving the instruction manually encrypted described current message;
Second encrypting module, for being encrypted to described current message.
16. 1 kinds of deciphering devices, it is characterised in that include:
3rd acquisition module, is used for obtaining decryption policy parameter, wherein, described decryption policy parameter include with down to
One of few: when segment limit, position range, access network;
4th acquisition module, for obtaining current ambient parameter, wherein, described ambient parameter include following at least
One of: current time, current location, the network being currently accessed;
3rd judge module, for according to described decryption policy parameter and described ambient parameter, it may be judged whether to ciphertext
Message is deciphered automatically;
First deciphering module, for the judged result of described 3rd judge module for being in the case of, automatically decipher
Described cipher-text message.
17. devices according to claim 16, it is characterised in that described 3rd judge module includes:
3rd judging unit, be used for judging described current time whether within the scope of the described period, and/or, sentence
Disconnected current location whether within described position range, and/or, it is judged that whether described access network includes described working as
The network of front access;
3rd determining unit, for the judged result of described 3rd judging unit be in the case of, it is right to determine
Described cipher-text message is deciphered automatically.
18. devices according to claim 16, it is characterised in that described 3rd judge module includes:
4th judging unit, for according to described decryption policy parameter and described ambient parameter, it is judged that be presently in
Environment whether safety;
4th determining unit, in the case that the judged result of described 4th judging unit is safe, it is right to determine
Described cipher-text message is deciphered automatically.
19. devices according to claim 16, it is characterised in that described device also includes:
4th judge module, for judging whether current message is the described cipher-text message do not deciphered;
Second determining module, in the case that the judged result of described 4th judge module is no, directly determines
Described current message is not deciphered automatically;
Wherein, described 3rd judge module, is additionally operable to the situation being yes in the judged result of described 4th judge module
Under, continue according to described decryption policy parameter and described ambient parameter, it may be judged whether described cipher-text message is carried out certainly
Dynamic deciphering.
20. devices according to according to any one of claim 16 to 19, it is characterised in that described device also includes:
Second receiver module, for being not carry out described cipher-text message in the judged result of described 3rd judge module
Automatically deciphering, or, determine and cipher-text message deciphered automatically to described but automatically decipher unsuccessfully, or, right
Automatically, in the case that the deciphering function of described cipher-text message is not opened, receive and described cipher-text message is manually deciphered
Instruction;
Second deciphering module, for being decrypted to described cipher-text message.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510180531.8A CN106162625A (en) | 2015-04-16 | 2015-04-16 | Encryption method, decryption method and device thereof |
PCT/CN2015/093432 WO2016165312A1 (en) | 2015-04-16 | 2015-10-30 | Encryption method, decryption method and device therefor |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510180531.8A CN106162625A (en) | 2015-04-16 | 2015-04-16 | Encryption method, decryption method and device thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106162625A true CN106162625A (en) | 2016-11-23 |
Family
ID=57127104
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510180531.8A Pending CN106162625A (en) | 2015-04-16 | 2015-04-16 | Encryption method, decryption method and device thereof |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106162625A (en) |
WO (1) | WO2016165312A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789950A (en) * | 2016-11-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | Information protecting method, device and terminal |
US11356246B2 (en) | 2019-02-01 | 2022-06-07 | Pegatron Corporation | Data analysis system and data analysis method |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111552949B (en) * | 2020-04-26 | 2023-09-01 | 深圳市兴海物联科技有限公司 | Encryption method and device for Internet of things equipment and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070168294A1 (en) * | 2003-12-25 | 2007-07-19 | Mitsubishi Electric Corporation | Digital content use right management system |
CN101170409A (en) * | 2006-10-24 | 2008-04-30 | 华为技术有限公司 | Method, system, service device and certification server for realizing device access control |
CN102402664A (en) * | 2011-12-28 | 2012-04-04 | 用友软件股份有限公司 | Data access control device and data access control method |
CN103107887A (en) * | 2013-01-22 | 2013-05-15 | 东莞宇龙通信科技有限公司 | Method and device for controlling files based on position information |
CN104023137A (en) * | 2014-06-13 | 2014-09-03 | 深圳市中兴移动通信有限公司 | Mobile terminal, and intelligent encryption method and device of mobile terminal |
CN104113839A (en) * | 2014-07-14 | 2014-10-22 | 蓝盾信息安全技术有限公司 | Mobile data safety protection system and method based on SDN |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101488847B (en) * | 2008-01-18 | 2011-09-14 | 华为技术有限公司 | Method, apparatus and system for data ciphering |
US9479398B2 (en) * | 2013-07-03 | 2016-10-25 | International Business Machines Corporation | Enforcing runtime policies in a networked computing environment |
CN103561384A (en) * | 2013-11-07 | 2014-02-05 | 中国科学院软件研究所 | Data protection method based on geographical location information of mobile intelligent terminal |
-
2015
- 2015-04-16 CN CN201510180531.8A patent/CN106162625A/en active Pending
- 2015-10-30 WO PCT/CN2015/093432 patent/WO2016165312A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070168294A1 (en) * | 2003-12-25 | 2007-07-19 | Mitsubishi Electric Corporation | Digital content use right management system |
CN101170409A (en) * | 2006-10-24 | 2008-04-30 | 华为技术有限公司 | Method, system, service device and certification server for realizing device access control |
CN102402664A (en) * | 2011-12-28 | 2012-04-04 | 用友软件股份有限公司 | Data access control device and data access control method |
CN103107887A (en) * | 2013-01-22 | 2013-05-15 | 东莞宇龙通信科技有限公司 | Method and device for controlling files based on position information |
CN104023137A (en) * | 2014-06-13 | 2014-09-03 | 深圳市中兴移动通信有限公司 | Mobile terminal, and intelligent encryption method and device of mobile terminal |
CN104113839A (en) * | 2014-07-14 | 2014-10-22 | 蓝盾信息安全技术有限公司 | Mobile data safety protection system and method based on SDN |
Non-Patent Citations (1)
Title |
---|
JAMES HOLMES著;孙燕等译: "《Struts程序员查询辞典》", 30 June 2005, 中国铁道出版社 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789950A (en) * | 2016-11-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | Information protecting method, device and terminal |
CN106789950B (en) * | 2016-11-30 | 2020-04-10 | Oppo广东移动通信有限公司 | Information protection method, device and terminal |
US11356246B2 (en) | 2019-02-01 | 2022-06-07 | Pegatron Corporation | Data analysis system and data analysis method |
Also Published As
Publication number | Publication date |
---|---|
WO2016165312A1 (en) | 2016-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10237247B2 (en) | User interface systems and methods for secure message oriented communications | |
US8457308B2 (en) | Communication system and method for protecting messages between two mobile phones | |
CN107026824B (en) | A kind of message encryption, decryption method and device | |
CN104244237B (en) | Data sending, receiving method and reception send terminal and data transmitter-receiver set | |
CN104270516B (en) | Decryption method and mobile terminal | |
US8819433B2 (en) | Message storage and retrieval | |
US20060178170A1 (en) | Wireless communication device having battery authentication, and associated method | |
CN105450269A (en) | Method and device for realizing safe interaction and pairing authentication between Bluetooth devices | |
CN104270517A (en) | Information encryption method and mobile terminal | |
JPH07245605A (en) | Ciphering information repeater, subscriber terminal equipment connecting thereto and ciphering communication method | |
CN106162537B (en) | A kind of method, wireless telecom equipment and the terminal of safety certification connection | |
CN104917603B (en) | A kind of information security transfer method receives terminal and sends terminal | |
CN101626567A (en) | Short message sending and receiving method, short message sending and receiving device and mobile terminal | |
CN106878231A (en) | Method, user terminal and system for realizing secure user data transmission | |
US20140079219A1 (en) | System and a method enabling secure transmission of sms | |
CN106231115A (en) | A kind of information protecting method and terminal | |
CN106572427A (en) | Establishment method and device for establishing short-range communication | |
CN106100980A (en) | Instant messaging communication means end to end and device | |
CN107666395A (en) | One population file management method, user terminal, group chat system | |
CN104239808A (en) | Method and device for encryption transmission of data | |
CN105915336A (en) | Object cooperative decryption method and device thereof | |
CN107566413A (en) | A kind of intelligent card security authentication method and system based on data SMS technology | |
CN105592431B (en) | SMS encryption system based on iOS system mobile terminal | |
CN106162625A (en) | Encryption method, decryption method and device thereof | |
CN105281897A (en) | File encryption method and device and file decryption method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161123 |