CN106162625A - Encryption method, decryption method and device thereof - Google Patents

Encryption method, decryption method and device thereof Download PDF

Info

Publication number
CN106162625A
CN106162625A CN201510180531.8A CN201510180531A CN106162625A CN 106162625 A CN106162625 A CN 106162625A CN 201510180531 A CN201510180531 A CN 201510180531A CN 106162625 A CN106162625 A CN 106162625A
Authority
CN
China
Prior art keywords
automatically
text message
parameter
judged
cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510180531.8A
Other languages
Chinese (zh)
Inventor
张冬明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510180531.8A priority Critical patent/CN106162625A/en
Priority to PCT/CN2015/093432 priority patent/WO2016165312A1/en
Publication of CN106162625A publication Critical patent/CN106162625A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a kind of encryption method, decryption method and device thereof, wherein, this encryption method includes: obtain encryption policy parameter, and wherein, encryption policy parameter includes at least one of: when segment limit, position range, access network;Obtaining current ambient parameter, wherein, ambient parameter includes at least one of: current time, current location, the network being currently accessed;According to encryption policy parameter and ambient parameter, it may be judged whether clear-text message is encrypted automatically;Judged result for being in the case of, automatic encrypting plaintext messages.By the present invention, solve the encryption in correlation technique or the not strong problem of manner of decryption ease for use, improve encryption or the ease for use of deciphering.

Description

Encryption method, decryption method and device thereof
Technical field
The present invention relates to the communications field, in particular to a kind of encryption method, decryption method and device thereof.
Background technology
Current mobile Internet develops rapidly, and smart mobile phone has been popularized, based on smart mobile phone social software (for example, Instant communication software) greatly change communication and the communication way of people.In communication process, generally require transmission one A little sensitive personal informations, for example: bank's card number, password etc., or are only capable of the important trade secret etc. allowing both sides know Information.If transmission can be encrypted to these information during sending, the safety felt more relieved will be provided the user Ensure.
In the related, important information data is encrypted (for example: be compressed into the compressed package files of encryption, or, The text document etc. of encryption) manual encryption can be used after, retransmit;The other side receives after the information data of encryption hand again The mode of work deciphering.But use the mode that the common message that instant messaging class software is received and dispatched is encrypted by which, by face The problem carrying out encryption and decryption operation frequently when facing messaging.Therefore, how to improve while ensureing security as far as possible The ease for use that message sends, or it while there is good ease for use, is provided that certain security, in correlation technique Do not provide any guidance.
For the not strong problem of the encryption in correlation technique or manner of decryption ease for use, effective solution party is not yet proposed at present Case.
Content of the invention
In order to solve above-mentioned technical problem, the invention provides a kind of encryption method, decryption method and device thereof.
According to an aspect of the invention, it is provided a kind of encryption method, comprising: acquisition encryption policy parameter, wherein, Described encryption policy parameter includes at least one of: when segment limit, position range, access network;Obtain current ring Border parameter, wherein, described ambient parameter includes at least one of: current time, current location, the net being currently accessed Network;According to described encryption policy parameter and described ambient parameter, it may be judged whether clear-text message is encrypted automatically;Sentencing In the case that disconnected result is for being, the described clear-text message of encryption automatically.
Preferably, according to described encryption policy parameter and described ambient parameter, it may be judged whether clear-text message is added automatically Close include: judge described current time whether within the scope of the described period, and/or, it is judged that whether described current location Within described position range, and/or, it is judged that described access network whether include described in the network that is currently accessed;Sentencing Disconnected result is in the case of being, determines and automatically encrypts described clear-text message.
Preferably, according to described encryption policy parameter and described ambient parameter, it may be judged whether clear-text message is added automatically Close include: according to described encryption policy parameter and described ambient parameter, it is judged that the environment being presently in is the need of improving peace Quan Xing;In the case that judged result improves security for needs, determine and described clear-text message is encrypted automatically.
Preferably, before judging whether automatically to encrypt clear-text message, described method also includes: judge currently to disappear Whether breath is clear-text message described in unencrypted;Judged result for being in the case of, continue according to described encryption policy join Number and described ambient parameter judge whether automatically to encrypt described clear-text message;In the case that judged result is no, Directly determine and described current message is not encrypted automatically.
Preferably, before judging whether current message is clear-text message described in unencrypted, described method also includes: connect Receive the instruction manually encrypted described current message;Described current message is encrypted.
According to another aspect of the present invention, a kind of decryption method is additionally provided, comprising: obtain decryption policy parameter, its In, described decryption policy parameter includes at least one of: when segment limit, position range, access network;Obtain current Ambient parameter, wherein, described ambient parameter includes at least one of: current time, current location, be currently accessed Network;According to described decryption policy parameter and described ambient parameter, it may be judged whether cipher-text message is deciphered automatically; Judged result for being in the case of, the automatically described cipher-text message of deciphering.
Preferably, according to described decryption policy parameter and described ambient parameter, it may be judged whether cipher-text message is solved automatically Close include: judge described current time whether within the scope of the described period, and/or, it is judged that whether current location in institute Within the scope of rheme is put, and/or, it is judged that described access network whether include described in the network that is currently accessed;Judging knot Fruit is in the case of being, determines and automatically deciphers described cipher-text message.
Preferably, according to described decryption policy parameter and described ambient parameter, it may be judged whether cipher-text message is solved automatically Close include: according to described decryption policy parameter and described ambient parameter, it is judged that the environment being presently in whether safety;Sentencing In the case that disconnected result is safe, determines and described cipher-text message is deciphered automatically.
Preferably, before judging whether automatically to decipher cipher-text message, described method also includes: judge currently to disappear Whether breath is the described cipher-text message do not deciphered;Judged result for being in the case of, continue according to described decryption policy join Number and described ambient parameter, it may be judged whether described cipher-text message is deciphered automatically;In the case that judged result is no, Directly determine and described current message is not deciphered automatically.
Preferably, in judged result for described cipher-text message not being deciphered automatically, or, determine to described to ciphertext Message is automatically deciphered but is automatically deciphered unsuccessfully, or, the feelings that function is not opened are deciphered to the automatic of described cipher-text message Under condition, described method also includes: receive the instruction manually deciphered described cipher-text message;Described cipher-text message is entered Row deciphering.
According to another aspect of the present invention, additionally provide a kind of encryption device, comprising: the first acquisition module, be used for obtaining Taking encryption policy parameter, wherein, described encryption policy parameter includes at least one of: when segment limit, position range, Access network;Second acquisition module, for obtaining current ambient parameter, wherein, described ambient parameter include with down to One of few: current time, current location, the network being currently accessed;First judge module, for according to described encryption plan Slightly parameter and described ambient parameter, it may be judged whether clear-text message is encrypted automatically;First encrypting module, in institute In the case of stating the judged result of the first judge module for being, the described clear-text message of encryption automatically.
Preferably, whether described first judge module includes: the first judging unit, be used for judging described current time in institute Within the scope of stating the period, and/or, it is judged that described current location whether within described position range, and/or, it is judged that institute State access network whether include described in the network that is currently accessed;First determining unit, at described first judging unit Judged result is in the case of being, determines and automatically encrypts described clear-text message.
Preferably, described first judge module includes: the second judging unit, for according to described encryption policy parameter and institute State ambient parameter, it is judged that the environment being presently in is the need of raising security;Second determining unit, for described the In the case that the judged result of two judging units improves security for needs, determine and described clear-text message is encrypted automatically.
Preferably, described device also includes: the second judge module, is used for judging whether current message is described in unencrypted Clear-text message;First determining module, is used in the case that the judged result of described second judge module is no, directly really Determine automatically not encrypt described current message;Wherein, described first judge module, is additionally operable to judge described second In the case that the judged result of module is for being, it is right that continuation judges whether according to described encryption policy parameter and described ambient parameter Described clear-text message is encrypted automatically.
Preferably, described device also includes: the first receiver module, manually encrypts described current message for receiving Instruction;Second encrypting module, for being encrypted to described current message.
According to another aspect of the present invention, additionally provide a kind of deciphering device, comprising: the 3rd acquisition module, be used for obtaining Taking decryption policy parameter, wherein, described decryption policy parameter includes at least one of: when segment limit, position range, Access network;4th acquisition module, for obtaining current ambient parameter, wherein, described ambient parameter include with down to One of few: current time, current location, the network being currently accessed;3rd judge module, for according to described deciphering plan Slightly parameter and described ambient parameter, it may be judged whether cipher-text message is deciphered automatically;First deciphering module, in institute In the case of stating the judged result of the 3rd judge module for being, the described cipher-text message of deciphering automatically.
Preferably, whether described 3rd judge module includes: the 3rd judging unit, be used for judging described current time in institute Within the scope of stating the period, and/or, it is judged that current location whether within described position range, and/or, it is judged that described connect Enter network whether include described in the network that is currently accessed;3rd determining unit, for the judgement at described 3rd judging unit Result is in the case of being, determines and automatically deciphers described cipher-text message.
Preferably, described 3rd judge module includes: the 4th judging unit, for according to described decryption policy parameter and institute State ambient parameter, it is judged that the environment being presently in whether safety;4th determining unit, at described 4th judging unit Judged result in the case of be safe, determine and described cipher-text message deciphered automatically.
Preferably, described device also includes: the 4th judge module, for judging that whether current message is do not decipher described Cipher-text message;Second determining module, is used in the case that the judged result of described 4th judge module is no, directly really Determine automatically not decipher described current message;Wherein, described 3rd judge module, is additionally operable in described 4th judgement In the case that the judged result of module is for being, continue according to described decryption policy parameter and described ambient parameter, it may be judged whether Described cipher-text message is deciphered automatically.
Preferably, described device also includes: the second receiver module, for the judged result at described 3rd judge module is Described cipher-text message is not deciphered automatically, or, determine and cipher-text message deciphered automatically to described but automatically solve Close failure, or, in the case that the automatically deciphering function of described cipher-text message is not opened, receive to described cipher-text message The instruction manually deciphered;Second deciphering module, for being decrypted to described cipher-text message.
By the present invention, using and obtaining encryption policy parameter, wherein, encryption policy parameter includes at least one of: when Segment limit, position range, access network;Obtain current ambient parameter, wherein, ambient parameter include following at least it One: current time, current location, the network being currently accessed;According to encryption policy parameter and ambient parameter, it may be judged whether Clear-text message is encrypted automatically;Judged result for being in the case of, the mode of automatic encrypting plaintext messages, solve Encryption in correlation technique or the strong problem of manner of decryption ease for use, improve encryption or the ease for use of deciphering.
Brief description
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, the present invention Schematic description and description be used for explaining the present invention, be not intended that inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of encryption method according to embodiments of the present invention;
Fig. 2 is the flow chart of decryption method according to embodiments of the present invention;
Fig. 3 is the structural representation of encryption device according to embodiments of the present invention;
Fig. 4 is the preferred structure schematic diagram one of encryption device according to embodiments of the present invention;
Fig. 5 is the preferred structure schematic diagram two of encryption device according to embodiments of the present invention;
Fig. 6 is the structural representation of deciphering device according to embodiments of the present invention;
Fig. 7 is the preferred structure schematic diagram one of deciphering device according to embodiments of the present invention;
Fig. 8 is the preferred structure schematic diagram two of deciphering device according to embodiments of the present invention;
Fig. 9 is the flow chart of encryption method according to the preferred embodiment of the invention;
Figure 10 is the flow chart of decryption method according to the preferred embodiment of the invention.
Detailed description of the invention
Below with reference to accompanying drawing and describe the present invention in detail in conjunction with the embodiments.It should be noted that in the feelings do not conflicted Under condition, the embodiment in the application and the feature in embodiment can be mutually combined.
Other features and advantages of the present invention will illustrate in the following description, and, partly become from specification It is clear that or understood by implementing the present invention.The purpose of the present invention and other advantages can be by the explanations write Structure specifically noted in book, claims and accompanying drawing realizes and obtains.
In order to make those skilled in the art be more fully understood that the present invention program, attached below in conjunction with in the embodiment of the present invention Figure, is clearly and completely described to the technical scheme in the embodiment of the present invention, it is clear that described embodiment is only It is a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, this area is common The every other embodiment that technical staff is obtained under the premise of not making creative work, all should belong to the present invention and protect The scope protected.
It should be noted that the order of the process step in the embodiment of the present invention, preferred embodiment is in situation about not conflicting Under, it is not strict restriction.For example, in the following steps, the order of step S102 and S104 can be exchanged. There is also analogue in other embodiments of the present invention.
Embodiments provide a kind of encryption method.Fig. 1 is the flow chart of encryption method according to embodiments of the present invention, As it is shown in figure 1, this flow process comprises the steps:
Step S102, obtains encryption policy parameter, and wherein, encryption policy parameter includes but is not limited at least one of: When segment limit, position range, access network;
Step S104, obtains current ambient parameter, and wherein, ambient parameter includes but is not limited at least one of: Current time, current location, the network being currently accessed;
Step S106, according to encryption policy parameter and ambient parameter, it may be judged whether automatically encrypt clear-text message;
Step S108, judged result for being in the case of, automatic encrypting plaintext messages.
By above-mentioned steps, by the information to including but not limited to current time or current location or the network being currently accessed The mode comparing with encryption policy parameter, automatically determines whether to be encrypted clear-text message;Relative to correlation technique The middle mode needing manually to encrypt by way of artificial judgement, solves adding in correlation technique by the present embodiment Close or that manner of decryption ease for use is not strong problem, improves encryption or the ease for use of deciphering.
It should be noted that the such scheme that the embodiment of the present invention provides can apply to a terminal, or this terminal In MSN;Above-mentioned clear-text message can be stored in this terminal having special characteristic and (for example be positioned at specific Storage catalogue) file, it is also possible to be the instant message that will send in MSN.Correspondingly, follow-up Embodiment in, cipher-text message also can make to be stored in terminal the file with special characteristic, it is also possible to is at IMU The instant message receiving in news software.
In the case of being applied to above-mentioned steps in the encryption process of MSN, above-mentioned steps can also include:
Step S109, sends the clear-text message through encryption.
Preferably, in step s 106, for current time, current location, the network being currently accessed judge whether into During row encryption, following decision logic can be used: judge current time whether within the scope of the period, and/or, it is judged that Current location whether within the scope of position, and/or, it is judged that whether access network includes the network being currently accessed;And The result of above-mentioned judgement is in the case of being, determines and automatically encrypts clear-text message.In actual applications, permissible Choose current time, current location, one or more modes combining in the network that is currently accessed judge, Additionally, be also not necessarily limited to other the feature for judging whether to encryption and decryption in embodiments of the present invention, such as: for The terminal of multi-user login, can also be by judging whether to need to bright to the current user's (such as user right) logging in Literary composition message is encrypted.
Above-mentioned for current time, current location, present access network judgement in, give the example of a kind of judgement. But in actual applications, owing to some parameter in encryption policy parameter can have different implication, such as: encryption policy " when segment limit " in parameter, can be used to the period that instruction needs encryption, but " periods in other example at some Scope " may also be used for indicating the period not needing encryption.Preferably, in order to the scheme making the embodiment of the present invention is more complete Kind, step S106 in certain embodiments can use following decision logic: according to encryption policy parameter and ring Border parameter, it is judged that the environment being presently in is the need of raising security;It is the feelings needing to improve security in judged result Under condition, determine and clear-text message is encrypted automatically.That is, no matter how the meaning of parameters in encryption policy parameter changes, As long as the environment residing for encryption policy parameter and current environment parameter determination present terminal can be passed through pacifies the need of improving Quan Xing, then can carry out automatic decision to the need of encryption further.
In some cases, clear-text message can manually be encrypted, then in this case, continues to disappear ciphertext Encryption for information is probably unnecessary;Meanwhile, multi-enciphering also will make to decipher increasingly complex.To this end, implement in the present invention In example, before clear-text message is encrypted, all right: to judge whether current message is unencrypted clear-text message; Judged result for being in the case of, continue judge whether to carry out clear-text message according to encryption policy parameter and ambient parameter Automatically encryption;In the case that judged result is no, directly determines and current message is not encrypted automatically.Further, In the case that instant message is encrypted, however, it is determined that current message is not encrypted automatically, then directly transmit current Message.
Preferably, the mode of manually encryption is additionally provided in embodiments of the present invention.For example, whether current message is being judged Before unencrypted clear-text message, can also be by receiving the instruction manually encrypted current message;And according to this The instruction of instruction, is encrypted to current message.In implementation process, if scheme is applied in MSN, One control so can be provided in the chat box of MSN, be used for receiving the manually encryption instruction of user.? After user sends manually encryption instruction, no matter whether current automatic encryption function enables, or sentencing in step S106 Whether disconnected result determines that encryption, directly can be encrypted current message.
In addition it is also necessary to explanation, in embodiments of the present invention, for the algorithm of encrypting and decrypting, (such as symmetry adds solution Close algorithm, asymmetric enciphering and deciphering algorithm), the transmission content of the configuration parameter such as encryption and decryption key is not related to, therefore also not Again these parts are described.The technology contents relevant with AES, is referred to currently existing scheme in correlation technique. The enciphering and deciphering algorithm using i.e., in embodiments of the present invention includes but is not limited to existing enciphering and deciphering algorithm in prior art.
Corresponding to above-mentioned encryption method, the embodiment of the present invention additionally provides a kind of decryption method.Fig. 2 is according to the present invention The flow chart of the decryption method of embodiment, as in figure 2 it is shown, this flow process comprises the steps:
Step S202, obtains decryption policy parameter, and wherein, decryption policy parameter includes but is not limited at least one of: When segment limit, position range, access network;
Step S204, obtains current ambient parameter, and wherein, ambient parameter includes but is not limited at least one of: Current time, current location, the network being currently accessed;
Step S206, according to decryption policy parameter and ambient parameter, it may be judged whether automatically decipher cipher-text message;
Step S208, judged result for being in the case of, automatic decrypting ciphertext message.
By above-mentioned steps, solve the encryption in correlation technique or the not strong problem of manner of decryption ease for use, improve and add Ease for use that is close or that decipher.
It should be noted that decryption policy parameter and encryption policy parameter can be identical parameters, it is also possible to be different Parameter;Preferably, above-mentioned decryption policy parameter and encryption policy parameter can be configured respectively according to actual conditions.
Preferably, before step S202, the method can also include:
Step S201, receives cipher-text message.
Preferably, similar with encryption method, in step S206 can: judge current time whether when segment limit Within, and/or, it is judged that current location whether within the scope of position, and/or, it is judged that whether access network includes currently The network accessing;Judged result be in the case of, determine cipher-text message is deciphered automatically.
Preferably, in step S206, all right: according to decryption policy parameter and ambient parameter, it is judged that be presently in Environment whether safety;In the case that judged result is safe, determines and cipher-text message is deciphered automatically.That is, No matter how the meaning of parameters in decryption policy parameter changes, as long as decryption policy parameter and current environment parameter can be passed through Determine that the environment residing for present terminal is safe, then can carry out automatic decision to the need of deciphering further.
In actual applications, typically only cipher-text message is decrypted, it is preferable that judging whether to enter cipher-text message Before row is deciphered automatically, method can also include: judges whether current message is the cipher-text message do not deciphered;Judging knot In the case that fruit is for being, continue according to decryption policy parameter and ambient parameter, it may be judged whether cipher-text message is solved automatically Close;In the case that judged result is no, directly determines and current message is not deciphered automatically.
Preferably, in judged result for cipher-text message not being deciphered automatically, or, determine cipher-text message is carried out from Dynamic deciphering but automatically decipher unsuccessfully, or, decipher function to cipher-text message automatic in the case of do not open, method also may be used To include: receive the instruction manually deciphered cipher-text message;Cipher-text message is decrypted.By which, can With realization manually deciphering, thus further increase the flexibility of decrypting ciphertext message.Similarly, manually deciphering In the case of, it is also possible to trigger by way of the decryption instructions that control receives user.
Additionally provide a kind of encryption device in the present embodiment, for realizing the embodiment of above-mentioned encryption method and being preferable to carry out Mode, had carried out repeating no more of explanation, had illustrated the module relating in this device below.Such as following institute Using, term " module " can realize the software of predetermined function and/or the combination of hardware.Although described by following example Device preferably realize with software, but hardware, or the realization of the combination of software and hardware be also may and by structure Think.
Fig. 3 is the structural representation of encryption device according to embodiments of the present invention, as it is shown on figure 3, this device includes: the One acquisition module the 32nd, the second acquisition module the 34th, the first judge module 36 and the first encrypting module 38, wherein, first obtains Delivery block 32, is used for obtaining encryption policy parameter, and wherein, encryption policy parameter includes at least one of: when segment limit, Position range, access network;Second acquisition module 34, for obtaining current ambient parameter, wherein, ambient parameter bag Include at least one of: current time, current location, the network being currently accessed;First judge module 36, couples respectively To the first acquisition module 32 and the second acquisition module 34, for according to encryption policy parameter and ambient parameter, it may be judged whether Clear-text message is encrypted automatically;First encrypting module 38, is coupled to the first judge module 36, for sentencing first In the case that the judged result of disconnected module is for being, automatic encrypting plaintext messages.
Preferably, whether the first judge module 36 includes: the first judging unit 362, be used for judging current time in the period Within the scope of, and/or, it is judged that current location whether within the scope of position, and/or, it is judged that whether access network includes The network being currently accessed;First determining unit 364, is coupled to the first judging unit 362, at the first judging unit The judged result of 362 is in the case of being, determines and automatically encrypts clear-text message.
Preferably, the first judge module 36 includes: the second judging unit 366, for according to encryption policy parameter and environment Parameter, it is judged that the environment being presently in is the need of raising security;Second determining unit 368, coupled to the second judgement Unit 366, in the case that the judged result of the second judging unit 366 improves security for needs, determination is to bright Literary composition message is encrypted automatically.
Fig. 4 is the preferred structure schematic diagram one of encryption device according to embodiments of the present invention, as shown in Figure 4, it is preferable that Device also includes: the second judge module 42, is used for judging whether current message is unencrypted clear-text message;First determines Module 44, is coupled to the second judge module 42, is used in the case that the judged result of the second judge module 42 is no, Directly determine and current message is not encrypted automatically;Wherein, the first judge module 36, is also coupled to the second judge module 42, be additionally operable to the judged result of the second judge module 42 for being in the case of, continue according to encryption policy parameter and ring Border parameter judges whether automatically to encrypt clear-text message.
Fig. 5 is the preferred structure schematic diagram two of encryption device according to embodiments of the present invention, as shown in Figure 5, it is preferable that Device also includes: the first receiver module 52, for receiving the instruction manually encrypted current message;Second encryption mould Block 54, is coupled to the first receiver module 52 and the second judge module 42, for being encrypted current message.
It should be understood that the first above-mentioned judge module 36 and the second judge module 42 can close and set;Above-mentioned first Encrypting module 38 and the second encrypting module 54 can close and set.
Additionally provide a kind of deciphering device in the present embodiment, for realizing the embodiment of above-mentioned decryption method and being preferable to carry out Mode, had carried out repeating no more of explanation, had illustrated the module relating in this device below.
Fig. 6 is the structural representation of deciphering device according to embodiments of the present invention, and as shown in Figure 6, this device includes: the Three acquisition modules the 62nd, the 4th acquisition module the 64th, the 3rd judge module 66 and the first deciphering module 68, wherein, the 3rd obtains Delivery block 62, is used for obtaining decryption policy parameter, and wherein, decryption policy parameter includes at least one of: when segment limit, Position range, access network;4th acquisition module 64, for obtaining current ambient parameter, wherein, ambient parameter bag Include at least one of: current time, current location, the network being currently accessed;3rd judge module 66, couples respectively To the 3rd acquisition module 62 and the 4th acquisition module 64, for according to decryption policy parameter and ambient parameter, it may be judged whether Cipher-text message is deciphered automatically;First deciphering module 68, is coupled to the 3rd judge module 66, for sentencing the 3rd In the case that the judged result of disconnected module 66 is for being, automatic decrypting ciphertext message.
Preferably, whether the 3rd judge module 66 includes: the 3rd judging unit 662, be used for judging current time in the period Within the scope of, and/or, it is judged that current location whether within the scope of position, and/or, it is judged that whether access network includes The network being currently accessed;3rd determining unit 664, is coupled to the 3rd judging unit 662, at the 3rd judging unit The judged result of 662 is in the case of being, determines and automatically deciphers cipher-text message.
Preferably, the 3rd judge module 66 includes: the 4th judging unit 666, for according to decryption policy parameter and environment Parameter, it is judged that the environment being presently in whether safety;4th determining unit 668, is coupled to the 4th judging unit 666, In the case of being safe for the judged result at the 4th judging unit 666, determine and cipher-text message is deciphered automatically.
Fig. 7 is the preferred structure schematic diagram one of deciphering device according to embodiments of the present invention, as shown in Figure 7, it is preferable that Device also includes: the 4th judge module 72, for judging whether current message is the cipher-text message do not deciphered;Second determines Module 74, is coupled to the 4th judge module 72, is used in the case that the judged result of the 4th judge module 72 is no, Directly determine and current message is not deciphered automatically;Wherein, the 3rd judge module 66, is also coupled to the 4th judge module 72, be additionally operable to the judged result of the 4th judge module 72 for being in the case of, continue according to decryption policy parameter and ring Border parameter, it may be judged whether cipher-text message is deciphered automatically;
Fig. 8 is the preferred structure schematic diagram two of deciphering device according to embodiments of the present invention, as shown in Figure 8, it is preferable that Device also includes: the second receiver module 82, for being not carry out cipher-text message certainly in the judged result of the 3rd judge module Dynamic deciphering, or, determine and cipher-text message is deciphered automatically but automatically decipher unsuccessfully, or, to oneself of cipher-text message In the case that dynamic deciphering function is not opened, receive the instruction manually deciphered cipher-text message;Second deciphering module 84, Coupled to the second receiver module 82 and the 4th judge module 72, for cipher-text message is decrypted.
It should be noted that the 3rd above-mentioned judge module 66 and the 4th judge module 72 can close and set;Above-mentioned first Deciphering module 68 and the second deciphering module 84 can close and set.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to be Unit is individually physically present, it is also possible to two or more unit are integrated in a unit.Above-mentioned integrated list Unit both can use the form of hardware to realize, it would however also be possible to employ the form of SFU software functional unit realizes.
It in order to the description making the embodiment of the present invention is clearer, is described below in conjunction with preferred embodiment and illustrates.
The preferred embodiment of the present invention illustrates as a example by the encryption and decryption to instant messages, provides a kind of instant messages Automatic encipher-decipher method.
The purpose of the preferred embodiment of the present invention is to carry out encryption and decryption control to instant message during instant information transmit-receive, bag Include but be not limited to based on one of parameters such as position, network hotspot, time or multiple carry out automatic encryption and decryption strategy Calculating, the message for transmitting-receiving in ad-hoc location and specific time period carries out automatic encryption and decryption process.
Owing to itself having higher confidence in security otherness in ad-hoc location and specific time period, itself i.e. means one Fixed security feature information, and automatic encryption and decryption processes and means that encryption and decryption link is transparent for a user, so exists In ad-hoc location and specific time period, user receives and dispatches encryption and decryption message and will have on the premise of having certain safety assurance preferably Consumer's Experience.
Fig. 9 is the flow chart of encryption method according to the preferred embodiment of the invention, as it is shown in figure 9, comprise the steps:
Step S902, initiation parameter configures.
Main configuration encryption key, automatic encryption function switch, the relevant parameter of automatic encryption policy in this step;Its In, the parameter (being equivalent to above-mentioned encryption policy parameter) of automatic encryption policy includes position range, the net automatically encrypted Network focus, when the parameter such as segment limit, these parameters are for determining whether automatically encrypt when sending message.Wherein, The determination of position range uses the basic function combining the mobile terminal such as map, position positioning to demarcate the position of encryption automatically Reference point, determines position range by effective radius on the basis of reference point, and position range can be effective radius Interior region, it is also possible to be the region outside radius, it is also possible to be union or the common factor in multiple region.Network hotspot is main It is the confidence level that conventional WIFI network is set.Position range and network hotspot can together be used for indicating positions security Judge, it is also possible to being used for independently determines home.When segment limit for indicating the time period needing automatically encryption.
Step S904, monitors input state and manually encrypts, can monitor instant communication software interface input box in real time Input state;
Step S906, it may be judged whether manually encrypt.Wherein, the mutual control of manually encryption is provided in input process Part (for example, for triggering the suspension button of manually encryption).When manual encryption control is triggered, instruction manually adds In the case of close, step S908, otherwise enter step S910;
Step S908, then be directly encrypted to ciphertext by input frame urtext according to the encryption key that step S902 configures, And the ciphertext after the urtext in input frame is replaced with encryption;
Step S910, triggers message transmitting process;
Step S912, when message is triggered transmission, then first judges in text box, whether input content is hand in step S908 Dynamic encrypted ciphertext, in this way, then enters step S922 and directly transmits message in input frame;Otherwise, enter step S914;
Step S914, it may be judged whether open automatic encryption function;In the case of opening encryption automatically, enter step S916, Otherwise step S922;
Step S916, automatic encryption policy calculates;
Step S918, the result calculating according to automatic encryption policy, in automatic decision input frame, message is the need of encryption;
Preferably, automatic encryption policy computing module obtains current position, the WIFI hot spot of connection and current in real time Temporal information, and by its position range arranging with step S902, network hotspot, when the parameter such as segment limit compare Relatively, when satisfied imposing a condition, then step S920, otherwise, step S922 are proceeded to;
Step S920, under the conditions of meeting encryption automatically, the encryption automatically content in input frame being arranged according to step S902 Key is encrypted to ciphertext;
Ciphertext is sent by step S922.
Figure 10 is the flow chart of decryption method according to the preferred embodiment of the invention, as shown in Figure 10, comprises the steps:
Step S1002, initiation parameter configures;
Configure decruption key, automatically deciphering functional switch, the relevant parameter of automatic decryption policy in this step.Wherein, The parameter (being equivalent to above-mentioned decryption policy parameter) of automatic decryption policy includes position range, the network boom automatically deciphered Point, when the parameter such as segment limit, these parameters are for determining whether automatically decipher when sending message.Wherein, position The determination of scope uses the basic function combining the mobile terminal such as map, position positioning to demarcate the position reference of deciphering automatically Reference point, determines position range by effective radius on the basis of reference point, in position range can be effective radius Region, it is also possible to be the region outside radius, it is also possible to be union or the common factor in multiple region.Network hotspot mainly sets Put the confidence level of conventional WIFI network.Position range and network hotspot can together be used for the judgement of indicating positions security, Also can independently be used for determining home.When segment limit for indicating the time period needing automatically deciphering.
Step S1004, monitoring receives message;
Step S1006, it is judged that receive whether message is ciphertext, such as non-ciphertext, then step S1008;Otherwise, hold Row step S1010;
Step S1008, directly displays the original plaintext message receiving;
Step S1010, in this way ciphertext, it is judged that whether deciphering function opens automatically, as do not opened, step S1022, Directly display original cipher text message;Otherwise step S1012;
Step S1012, automatic decryption policy calculates;
Step S1014, according to decryption policy result of calculation, automatic decision receives message the need of automatic deciphering.Preferably Ground, automatic decryption policy computing module obtains current position, the WIFI hot spot of connection and letter of current time in real time Breath, and by its position range arranging with step S1002, network hotspot, when the parameter such as segment limit compare, when expiring When foot imposes a condition, then proceed to step S1016;Otherwise, step S1022, directly displays original cipher text message;
Step S1016, under meeting automatic decryption condition, will receive the deciphering that message is arranged according to step S1002 automatically Double secret key receives message and is decrypted;
Step S1018, it is judged that whether deciphering is successful, such as successful decryption, then step S1020;Otherwise, step is performed Rapid S1022;
Step S1020, the plaintext after display deciphering;
Step S1022, directly displays original cipher text message;
Step S1024, it may be judged whether manually decipher;
Wherein, in the case of automatic deciphering is not opened, is unsatisfactory for automatic decryption condition or automatically deciphers unsuccessfully, receive Message be original cipher text.The interactive controls that now interface display is manually deciphered is (for example for triggering the suspension of manually deciphering Button);If manually deciphering, then step S1026, otherwise, return step S1020 and terminate flow process.
Step S1026, when manual deciphering control is triggered, then ejects manual decryption interface, can input decruption key;
Step S1028, when the key being manually entered mates with the decruption key that step S1002 is arranged, then to reception message It is decrypted;
Step S1030, it is judged that whether deciphering is successful;Such as successful decryption, then step S1020, show after deciphering In plain text;As deciphered failure, then step S1022, still show original cipher text message, and be given and decipher carrying unsuccessfully Show information.
It should be noted that the encryption and decryption method described in the preferred embodiment of the present invention can be applied in combination, i.e. certainly Dynamic encryption, also deciphers simultaneously automatically, it is also possible to independent realization, only uses encryption automatically or automatically deciphers.Additionally, at this Merge the scheme of manual encryption and decryption while invention preferred embodiment provides automatic encryption and decryption;In actual applications, may be used Only use manual encipher-decipher method to close automatic encryption and decryption according to actual needs, or only use automatic encryption and decryption not make Use manual encipher-decipher method.
Additionally, for automatic encipher-decipher method, select in the parameter of automatic encryption and decryption policy calculation, position, WIFI Focus, three parameters of time period can only take partial parameters, it is also possible to three parametric joints use, it might even be possible to choose all Such as other type of parameters such as orientation.As do not differentiated between all parameters, then automatic encipher-decipher method then deteriorates at all situations Under encryption or automatically decipher message all automatically, so in transmitting procedure, message itself still has security, but in terminal There is certain ease for use or security loss in transmitting-receiving side.
In sum, according to the abovementioned embodiments of the present invention, preferred embodiment and embodiment understand, the embodiment of the present invention The automatic encryption and decryption providing is transparent for a user, has preferable Consumer's Experience while having certain security; In the scheme of above-described embodiment, being encrypted encrypted content itself, the ciphertext after encryption can be by existing transmission Channel or existing communication customer end directly transmit or preserve, and have and adapt to advantage wide, with low cost;Above-mentioned Content is encrypted by scheme, and user is directly it can be seen that ciphertext effect after Jia Mi, and secrecy effect is intuitively visible, has Good secrecy is experienced;Additionally, the scheme that the embodiment of the present invention provides is succinctly easy-to-use alternately, user learning and use are all non- Often convenient.
In another embodiment, additionally providing a kind of software, this software is used for performing above-described embodiment and is preferable to carry out Technical scheme described in mode.
In another embodiment, additionally providing a kind of storage medium, be stored with in this storage medium above-mentioned software, should Storage medium includes but is not limited to: CD, floppy disk, hard disk, scratch pad memory etc..
It should be noted that term " first " in description and claims of this specification and above-mentioned accompanying drawing, " second " Etc. being for distinguishing similar object, without being used for describing specific order or precedence.Should be appreciated that so use Object can exchange in the appropriate case, in order to embodiments of the invention described herein can be with except here illustrating Or the order enforcement beyond those describing.Additionally, term " includes " and " having " and their any deformation, it is intended that Be to cover non-exclusive comprising, for example, contain the process of series of steps or unit, method, system, product or Equipment is not necessarily limited to those steps or the unit clearly listed, but can include clearly not listing or for these Other intrinsic steps of process, method, product or equipment or unit.
Obviously, those skilled in the art should be understood that each module of the above-mentioned present invention or each step can be with general Computing device realizes, they can concentrate in single computing device, or is distributed in multiple computing device and is formed Network on, alternatively, they can be realized by the executable program code of computing device, it is thus possible to by them Storage is performed by computing device in the storage device, and in some cases, can hold with the order being different from herein The shown or described step of row, or they are fabricated to respectively each integrated circuit modules, or by many in them Individual module or step are fabricated to single integrated circuit module and realize.So, the present invention is not restricted to any specific hardware Combine with software.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the technology of this area For personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, that is made is any Modification, equivalent, improvement etc., should be included within the scope of the present invention.

Claims (20)

1. an encryption method, it is characterised in that include:
Obtaining encryption policy parameter, wherein, described encryption policy parameter includes at least one of: when segment limit, Position range, access network;
Obtaining current ambient parameter, wherein, described ambient parameter includes at least one of: current time, when Front position, the network being currently accessed;
According to described encryption policy parameter and described ambient parameter, it may be judged whether clear-text message is encrypted automatically;
Judged result for being in the case of, the automatically described clear-text message of encryption.
2. method according to claim 1, it is characterised in that according to described encryption policy parameter and described ambient parameter, Judge whether automatically to encrypt clear-text message to include:
Judge described current time whether within the scope of the described period, and/or, it is judged that whether described current location Within described position range, and/or, it is judged that described access network whether include described in the network that is currently accessed;
Judged result be in the case of, determine described clear-text message is encrypted automatically.
3. method according to claim 1, it is characterised in that according to described encryption policy parameter and described ambient parameter, Judge whether automatically to encrypt clear-text message to include:
According to described encryption policy parameter and described ambient parameter, it is judged that the environment being presently in is pacified the need of improving Quan Xing;
In the case that judged result improves security for needs, determine and described clear-text message is encrypted automatically.
4. according to the method in any one of claims 1 to 3, it is characterised in that judging whether to enter clear-text message Before row is encrypted automatically, described method also includes:
Judge whether current message is clear-text message described in unencrypted;
Judged result for being in the case of, continue to judge according to described encryption policy parameter and described ambient parameter be No described clear-text message is encrypted automatically;
In the case that judged result is no, directly determines and described current message is not encrypted automatically.
5. method according to claim 4, it is characterised in that judging whether current message is stated clearly by unencrypted Before literary composition message, described method also includes:
Receive the instruction manually encrypted described current message;
Described current message is encrypted.
6. a decryption method, it is characterised in that include:
Obtaining decryption policy parameter, wherein, described decryption policy parameter includes at least one of: when segment limit, Position range, access network;
Obtaining current ambient parameter, wherein, described ambient parameter includes at least one of: current time, when Front position, the network being currently accessed;
According to described decryption policy parameter and described ambient parameter, it may be judged whether cipher-text message is deciphered automatically;
Judged result for being in the case of, the automatically described cipher-text message of deciphering.
7. method according to claim 6, it is characterised in that according to described decryption policy parameter and described ambient parameter, Judge whether automatically to decipher cipher-text message to include:
Judge described current time whether within the scope of the described period, and/or, it is judged that whether current location in institute Within the scope of rheme is put, and/or, it is judged that described access network whether include described in the network that is currently accessed;
Judged result be in the case of, determine described cipher-text message is deciphered automatically.
8. method according to claim 6, it is characterised in that according to described decryption policy parameter and described ambient parameter, Judge whether automatically to decipher cipher-text message to include:
According to described decryption policy parameter and described ambient parameter, it is judged that the environment being presently in whether safety;
In the case that judged result is safe, determines and described cipher-text message is deciphered automatically.
9. method according to claim 6, it is characterised in that judging whether automatically to decipher it to cipher-text message Before, described method also includes:
Judge whether current message is the described cipher-text message do not deciphered;
Judged result for being in the case of, continue according to described decryption policy parameter and described ambient parameter, it is judged that Whether described cipher-text message is deciphered automatically;
In the case that judged result is no, directly determines and described current message is not deciphered automatically.
10. the method according to according to any one of claim 6 to 9, it is characterised in that in judged result for not to described close Literary composition message is deciphered automatically, or, determine and cipher-text message deciphered automatically to described but automatically decipher unsuccessfully, Or, in the case of not opening the automatically deciphering function of described cipher-text message, described method also includes:
Receive the instruction manually deciphered described cipher-text message;
Described cipher-text message is decrypted.
11. 1 kinds of encryption devices, it is characterised in that include:
First acquisition module, is used for obtaining encryption policy parameter, wherein, described encryption policy parameter include with down to One of few: when segment limit, position range, access network;
Second acquisition module, for obtaining current ambient parameter, wherein, described ambient parameter include following at least One of: current time, current location, the network being currently accessed;
First judge module, for according to described encryption policy parameter and described ambient parameter, it may be judged whether in plain text Message is encrypted automatically;
First encrypting module, for the judged result of described first judge module for being in the case of, automatically encrypt Described clear-text message.
12. devices according to claim 11, it is characterised in that described first judge module includes:
First judging unit, be used for judging described current time whether within the scope of the described period, and/or, sentence Break described current location whether within described position range, and/or, it is judged that whether described access network includes institute State the network being currently accessed;
First determining unit, for the judged result of described first judging unit be in the case of, it is right to determine Described clear-text message is encrypted automatically.
13. devices according to claim 11, it is characterised in that described first judge module includes:
Second judging unit, for according to described encryption policy parameter and described ambient parameter, it is judged that be presently in Environment is the need of raising security;
Second determining unit, for being the situation needing to improve security in the judged result of described second judging unit Under, determine and described clear-text message is encrypted automatically.
14. devices according to according to any one of claim 11 to 13, it is characterised in that described device also includes:
Second judge module, is used for judging whether current message is clear-text message described in unencrypted;
First determining module, in the case that the judged result of described second judge module is no, directly determines Described current message is not encrypted automatically;
Wherein, described first judge module, is additionally operable to the situation being yes in the judged result of described second judge module Under, continue to judge whether to carry out described clear-text message automatically according to described encryption policy parameter and described ambient parameter Encryption.
15. devices according to claim 14, it is characterised in that described device also includes:
First receiver module, for receiving the instruction manually encrypted described current message;
Second encrypting module, for being encrypted to described current message.
16. 1 kinds of deciphering devices, it is characterised in that include:
3rd acquisition module, is used for obtaining decryption policy parameter, wherein, described decryption policy parameter include with down to One of few: when segment limit, position range, access network;
4th acquisition module, for obtaining current ambient parameter, wherein, described ambient parameter include following at least One of: current time, current location, the network being currently accessed;
3rd judge module, for according to described decryption policy parameter and described ambient parameter, it may be judged whether to ciphertext Message is deciphered automatically;
First deciphering module, for the judged result of described 3rd judge module for being in the case of, automatically decipher Described cipher-text message.
17. devices according to claim 16, it is characterised in that described 3rd judge module includes:
3rd judging unit, be used for judging described current time whether within the scope of the described period, and/or, sentence Disconnected current location whether within described position range, and/or, it is judged that whether described access network includes described working as The network of front access;
3rd determining unit, for the judged result of described 3rd judging unit be in the case of, it is right to determine Described cipher-text message is deciphered automatically.
18. devices according to claim 16, it is characterised in that described 3rd judge module includes:
4th judging unit, for according to described decryption policy parameter and described ambient parameter, it is judged that be presently in Environment whether safety;
4th determining unit, in the case that the judged result of described 4th judging unit is safe, it is right to determine Described cipher-text message is deciphered automatically.
19. devices according to claim 16, it is characterised in that described device also includes:
4th judge module, for judging whether current message is the described cipher-text message do not deciphered;
Second determining module, in the case that the judged result of described 4th judge module is no, directly determines Described current message is not deciphered automatically;
Wherein, described 3rd judge module, is additionally operable to the situation being yes in the judged result of described 4th judge module Under, continue according to described decryption policy parameter and described ambient parameter, it may be judged whether described cipher-text message is carried out certainly Dynamic deciphering.
20. devices according to according to any one of claim 16 to 19, it is characterised in that described device also includes:
Second receiver module, for being not carry out described cipher-text message in the judged result of described 3rd judge module Automatically deciphering, or, determine and cipher-text message deciphered automatically to described but automatically decipher unsuccessfully, or, right Automatically, in the case that the deciphering function of described cipher-text message is not opened, receive and described cipher-text message is manually deciphered Instruction;
Second deciphering module, for being decrypted to described cipher-text message.
CN201510180531.8A 2015-04-16 2015-04-16 Encryption method, decryption method and device thereof Pending CN106162625A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510180531.8A CN106162625A (en) 2015-04-16 2015-04-16 Encryption method, decryption method and device thereof
PCT/CN2015/093432 WO2016165312A1 (en) 2015-04-16 2015-10-30 Encryption method, decryption method and device therefor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510180531.8A CN106162625A (en) 2015-04-16 2015-04-16 Encryption method, decryption method and device thereof

Publications (1)

Publication Number Publication Date
CN106162625A true CN106162625A (en) 2016-11-23

Family

ID=57127104

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510180531.8A Pending CN106162625A (en) 2015-04-16 2015-04-16 Encryption method, decryption method and device thereof

Country Status (2)

Country Link
CN (1) CN106162625A (en)
WO (1) WO2016165312A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789950A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 Information protecting method, device and terminal
US11356246B2 (en) 2019-02-01 2022-06-07 Pegatron Corporation Data analysis system and data analysis method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111552949B (en) * 2020-04-26 2023-09-01 深圳市兴海物联科技有限公司 Encryption method and device for Internet of things equipment and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070168294A1 (en) * 2003-12-25 2007-07-19 Mitsubishi Electric Corporation Digital content use right management system
CN101170409A (en) * 2006-10-24 2008-04-30 华为技术有限公司 Method, system, service device and certification server for realizing device access control
CN102402664A (en) * 2011-12-28 2012-04-04 用友软件股份有限公司 Data access control device and data access control method
CN103107887A (en) * 2013-01-22 2013-05-15 东莞宇龙通信科技有限公司 Method and device for controlling files based on position information
CN104023137A (en) * 2014-06-13 2014-09-03 深圳市中兴移动通信有限公司 Mobile terminal, and intelligent encryption method and device of mobile terminal
CN104113839A (en) * 2014-07-14 2014-10-22 蓝盾信息安全技术有限公司 Mobile data safety protection system and method based on SDN

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101488847B (en) * 2008-01-18 2011-09-14 华为技术有限公司 Method, apparatus and system for data ciphering
US9479398B2 (en) * 2013-07-03 2016-10-25 International Business Machines Corporation Enforcing runtime policies in a networked computing environment
CN103561384A (en) * 2013-11-07 2014-02-05 中国科学院软件研究所 Data protection method based on geographical location information of mobile intelligent terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070168294A1 (en) * 2003-12-25 2007-07-19 Mitsubishi Electric Corporation Digital content use right management system
CN101170409A (en) * 2006-10-24 2008-04-30 华为技术有限公司 Method, system, service device and certification server for realizing device access control
CN102402664A (en) * 2011-12-28 2012-04-04 用友软件股份有限公司 Data access control device and data access control method
CN103107887A (en) * 2013-01-22 2013-05-15 东莞宇龙通信科技有限公司 Method and device for controlling files based on position information
CN104023137A (en) * 2014-06-13 2014-09-03 深圳市中兴移动通信有限公司 Mobile terminal, and intelligent encryption method and device of mobile terminal
CN104113839A (en) * 2014-07-14 2014-10-22 蓝盾信息安全技术有限公司 Mobile data safety protection system and method based on SDN

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JAMES HOLMES著;孙燕等译: "《Struts程序员查询辞典》", 30 June 2005, 中国铁道出版社 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789950A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 Information protecting method, device and terminal
CN106789950B (en) * 2016-11-30 2020-04-10 Oppo广东移动通信有限公司 Information protection method, device and terminal
US11356246B2 (en) 2019-02-01 2022-06-07 Pegatron Corporation Data analysis system and data analysis method

Also Published As

Publication number Publication date
WO2016165312A1 (en) 2016-10-20

Similar Documents

Publication Publication Date Title
US10237247B2 (en) User interface systems and methods for secure message oriented communications
US8457308B2 (en) Communication system and method for protecting messages between two mobile phones
CN107026824B (en) A kind of message encryption, decryption method and device
CN104244237B (en) Data sending, receiving method and reception send terminal and data transmitter-receiver set
CN104270516B (en) Decryption method and mobile terminal
US8819433B2 (en) Message storage and retrieval
US20060178170A1 (en) Wireless communication device having battery authentication, and associated method
CN105450269A (en) Method and device for realizing safe interaction and pairing authentication between Bluetooth devices
CN104270517A (en) Information encryption method and mobile terminal
JPH07245605A (en) Ciphering information repeater, subscriber terminal equipment connecting thereto and ciphering communication method
CN106162537B (en) A kind of method, wireless telecom equipment and the terminal of safety certification connection
CN104917603B (en) A kind of information security transfer method receives terminal and sends terminal
CN101626567A (en) Short message sending and receiving method, short message sending and receiving device and mobile terminal
CN106878231A (en) Method, user terminal and system for realizing secure user data transmission
US20140079219A1 (en) System and a method enabling secure transmission of sms
CN106231115A (en) A kind of information protecting method and terminal
CN106572427A (en) Establishment method and device for establishing short-range communication
CN106100980A (en) Instant messaging communication means end to end and device
CN107666395A (en) One population file management method, user terminal, group chat system
CN104239808A (en) Method and device for encryption transmission of data
CN105915336A (en) Object cooperative decryption method and device thereof
CN107566413A (en) A kind of intelligent card security authentication method and system based on data SMS technology
CN105592431B (en) SMS encryption system based on iOS system mobile terminal
CN106162625A (en) Encryption method, decryption method and device thereof
CN105281897A (en) File encryption method and device and file decryption method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161123