CN101534311A - An information security method and procedure - Google Patents

An information security method and procedure Download PDF

Info

Publication number
CN101534311A
CN101534311A CN200910136867A CN200910136867A CN101534311A CN 101534311 A CN101534311 A CN 101534311A CN 200910136867 A CN200910136867 A CN 200910136867A CN 200910136867 A CN200910136867 A CN 200910136867A CN 101534311 A CN101534311 A CN 101534311A
Authority
CN
China
Prior art keywords
instant
text
ciphertext
encryption
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200910136867A
Other languages
Chinese (zh)
Inventor
赵芦生
杨霄
杨筑平
周跃平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN200910136867A priority Critical patent/CN101534311A/en
Publication of CN101534311A publication Critical patent/CN101534311A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

An information security method and procedure relates to the field of computer software, network communications and information security technology, especially used for information security of instant messaging, e-mail and other edited texts. By cipher algorithm procedure and/or by cipher device hardware, complete or selective instant encrypt or instant decipher is performed to text message in the current editing text, so as to instantly replace it from plaintext to ciphertext or from ciphertext to plaintext and present in the same window; when the cursor is stopped at the read-only ciphertext, it can be instant read and the corresponding plaintext can be presented; furthermore, it can be driven by a same shortcut operation, so that the encryption and decryption can be alternately performed, plaintext and ciphertext can be alternately replaced and displayed; a practical information security program is also designed, which is used in synergy with the object program and runs independently, to realize real-time encryption and decryption to information. The invention is general-purpose, convenient, flexible and efficient, and has universality because of its informality in the device hardware and no limitation to the application software.

Description

Information security method and program
Technical field
The present invention relates to computer software, network service and field of information security technology.
Background technology
Information usually relates to mechanism and individual secret, privacy and property; In network environment, especially under internet environment, these important informations are easy to stolen and reveal, and cause the loss that is difficult to remedy.Therefore, information privacy just becomes the problem that people generally are concerned about.The basic fundamental thinking of information privacy is to adopt certain cryptographic algorithm in conjunction with key, and the information of need to be keep secret is expressly encrypted, and generates the mess code ciphertext.The cryptographic algorithm of existing practicality has had many kinds, and some of them become technical standard already, as DES, AES, RSA, DSA etc.Information is the easiest divulges a secret at input, storage and transmission link, and cryptographic means also correspondingly is conceived to information source respectively and encrypts and single channel encryption.The more concern single channel encryptions of many practical communication softwares are realized finely by transmission control protocol, but information source encrypt are paid attention to not enough, and leave independently encryption software for or hardware goes to handle.In the reality, most of E-mail addresses and instant messaging service software are all like this, to such an extent as to even unwarranted people needs only one and enters mailbox or chat area, private information just covers all at one glance." E-mail encryption/decryption method and Storage Media thereof and module " (Chinese invention patent application number 200510079693.9), be to belong to the technical method that information source is encrypted, propose to select and identify some part in the text and determine corresponding cipher code set, and when transmitting, encrypt.The flexibility selected is emphasized in this invention, but 2 deficiencies are arranged: the one, and operating efficiency is low, also will identify, decide password after selecting; The 2nd, just encrypt when delaying to transmission, other people are near peeping in the time of can not tackling editor's input.As if being prolonged, the method is used for timely communication, the low-response that will occur chatting, the helpless embarrassment of covering input information.And, delay the cost of encryption, be only to be applicable in the target mailbox service routine, to embed to realize, both be the mailbox procedure service and be not easy to be embodied as one, independent again general encipheror.
Summary of the invention
Information security method and program that the present invention proposes, be to be instant messaging, Email and general editing input information, a kind of general effective secrecy technology method is provided, and designs a kind of general utility program of information privacy easily for terminal (client computer) user.General purpose and purposes are the secrets of protection user profile.
The present invention at first proposes a kind of information security method, relates to the encryption and decryption to information.The basic ideas of the inventive method are in the editing input information stage, and the information text among the editor is carried out encryption and decryption at any time, on the spot, no matter and follow-up will how processing of information that editor finishes (for example storage or transmission).Nearly all utility program, input information are all edited in one or more control windows, but any moment has only one of them window to enliven and obtain input focus.Will allow certain window obtain focus in the operation, simple approach is to click it with mouse-pointing, and also available tab key is travelled the location.In order to realize encryption and decryption to information, need to introduce the functionalization encryption/decryption element, this encryption/decryption element is realized clear and definite cryptographic algorithm process, or by means of certain encryption apparatus hardware, also need provide in good time or be provided with key.So, just the information text in the window can be become ciphertext from plain text encryption, or become expressly from decrypt ciphertext.Encrypt each time or deciphering, (no matter be expressly or ciphertext at the information text in the window, or expressly be mixed with ciphertext), its target zone is distinguished two kinds of situations: the one, and (normally the user uses mouse, keyboard operation in peripheral operation, special in other process operation) selected a part of text, as selected text; The 2nd, the full text of window internal information.Key is that described encryption is an instant encryption, after the information in the window in the target zone is expressly extracted immediately and is encrypted again by loopback immediately and be presented in the same window; Described deciphering also is instant deciphering, and the information ciphertext in the window in the target zone is extracted after the deciphering again by loopback immediately immediately and is presented in the same window.In other words, instant encryption causes text message in the target zone in the same window by expressly being replaced into ciphertext immediately, and instant deciphering causes that the text message in the target zone is replaced into expressly immediately by ciphertext in the same window.Instant encryption and deciphering in time, agreement need not identify before encryption after selecting at the information text in the target zone in the current window (promptly enlivening and obtain the window of input focus), identifies but can add ciphertext automatically after encryption.To encryption or the deciphering that full text in the window is implemented, be instant encryption or instant deciphering completely; To encryption or the deciphering that selected text in the window is implemented, be optionally instant encryption or instant deciphering.The above-mentioned essential characteristic that constitutes the inventive method.
Detection about the target zone of information text in the current window is judged, establishes a criterion: if find to have peripheral operation to select text, be considered as selecting text, otherwise be considered as full text.Instant encryption and instant the deciphering can be defined the information text object of its processing according to this criterion.So to implementing instant encryption, still instant deciphering is established another automatic criterion: if in the information text in the target zone, include complete ciphertext sign, then should implement instant deciphering, otherwise should implement instant encryption again.Have expressly and the information text of ciphertext for being mixed with, the processing policy that instant deciphering can be followed has two kinds: the one, ignore expressly and only decrypting ciphertext, and the 2nd, keep expressly and decrypting ciphertext.The present invention recommends to adopt a kind of strategy in back, to realize complete selectivity instant encryption and instant deciphering.
The ciphertext that encrypt to generate is byte sequence normally, by byte to the hinting obliquely at of visual character set (for example BCD numerical symbol collection), but can be converted into videotex.For distinguish ciphertext with expressly, can be when encrypting, with the ciphertext that generated voluntarily in addition mark discern, to avoid instant encryption and the contingent misoperation of instant deciphering (as repeating or misusing).In ciphertext, can add knowledge information about algorithm and even key.Special arrangements of the present invention, at least one item in ciphertext in these two secret informations of also additional back: the identify label of communicating pair or information sharing side, as email address, ID users etc.; The sign of the encryption apparatus that communicating pair or information sharing side are used is as product ID.So arranging, is for the ease of authentication, check and interchange key.Because visual conversion, and plus external information can cause the ciphertext lengthening, mail matter topics or chat record are elongated such as causing, so can introduce the data compression step in ciphering process.
The operation of instant encryption and instant deciphering can be by the selection function menu, press function button, and prompt operation (as functional hot key) drives.The inventive method special recommendation drives the operation of instant encryption and instant deciphering with same prompt operation, make encrypt and decrypt hocket, expressly with the ciphertext alternating permutation and be presented in the same window.
The inventive method is in a concrete application (as instant messaging, E-mail address) service routine, and technology realizes being easy to.In order to reach flexible, general purpose, be necessary to consider collaborative realization the in different threads and even different process.The committed step of similar realization is collapse thread and even the striding course extraction and the transmission of window information text (no matter being plaintext or ciphertext).One of the inventive method embodiment is the clipbook operation by analogue system, is embodied as instant encryption and instant deciphering and picks up text and transmit text.Simulation clipbook operation relates to two aspects, and the one, the simulating keyboard combination button is realized the general full choosing of edit operation, is duplicated/shear, paste operation, the 2nd, read and be provided with the clipbook data.These all are easy to programming and realize.By simulation clipbook operation, the judgment criterion of above-mentioned target zone about information text in the current window, just can realize easily: the analoging reproduction operation if pick up the text data non-NULL, then has peripheral operation to select, otherwise has the peripheral operation selection.
The present invention reintroduces a kind of information security method, relates to the deciphering to the information ciphertext.Encrypt the ciphertext that generates, the marquis is read-only sometimes, just decipher and can not go to handle by preceding method.For example, the mail tabulation title in the inbox and open the mail of reading, the information in the chat record tabulation, etc., all read-only, can not rewrite.Understand (i.e. deciphering read) ciphertext wherein, can in another window existing or that newly open, decipher and present.For easy to use and efficient, driving opportunity of read operation is separated in the inventive method special recommendation, continues to reach scheduled duration on the ciphertext due to resting on when cursor, then deciphers immediately and presents corresponding plaintext.So separating another use of read operation, is information additional when extracting out encryption from ciphertext, comprises the identify label of communicating pair or information sharing side, the sign of the encryption apparatus that communicating pair or information sharing side are used, etc.
The present invention also designs a kind of information privacy program according to above-mentioned information security method.Program running of the present invention is particularly useful for working in coordination with such as instant messaging, E-mail address and other target programs that comprises the text editing function and uses in terminal, but independent operating.Program of the present invention realizes the cryptographic algorithm determined, alternatively or preferably, also is equipped with encryption apparatus hardware, also need provide in good time or be provided with password, and information text is become ciphertext or becomes expressly from decrypt ciphertext from plain text encryption.Program of the present invention is characterised in that, described encryption and decryption, be the instant encryption and instant deciphering of carrying out, make the interior text of the same window target zone be presented immediately to expressly replacing also immediately from plaintext to ciphertext or from ciphertext at the text in the current editor internal object of the target program scope (selecting text or full text).The ciphertext that program encryption of the present invention generates is including but not limited at least one in the following message item: the ciphertext identification information; The secret information of communicating pair or the identify label of information sharing side; The secret information of communicating pair or information sharing side's encryption apparatus sign.The special-purpose encryption hot key of registration as quick operating mode, both had been used to drive instant encryption during program running of the present invention, also was used to drive instant deciphering, make encrypt and decrypt hocket, expressly with the ciphertext alternating permutation and be presented in the same window.Program of the present invention is embodied as instant encryption and instant deciphering and picks up text and transmit text also by the clipbook operation of analogue system.
The typical implementation of program of the present invention normally as an independently utility program use, in case of necessity, also can be used as the part that operation system function is formed.Not only can on personal computer, portable computer, realize, and can go up at hand-held terminal device (as mobile phone, personal digital assistant etc.) and realize.For example, a kind of scheme that realizes on mobile phone is: built-in encryption apparatus parts wherein store key; Define a button and be used to drive instant encryption and instant decryption oprerations, the information text in the current editor target zone is alternately encrypted or deciphering immediately, and just in the same window, replace and present.Can expect that program of the present invention can be implanted in the operating system of hand-held terminal devices such as mobile phone, and will become the part of the safe and secret function of this kind equipment.
Good effect of the present invention on the one hand, aspect the information source encryption, for maintaining secrecy of instant messaging, Email and other editing input informations, provides a kind of general, easy, flexible, high-efficiency method; On the other hand, also designed a kind of convenient effective information privacy utility program for terminal (client computer) user, the obvious equipment of this program all has nothing to do with hardware and application software, thereby has pervasive versatility.
Description of drawings
Fig. 1 is a schematic diagram of the present invention.Terminal use (1), input information (121) in current editor (2); In editing process, can do encryption and decryption operation (122) at any time, can also select text (20) at any time; By instant driving encryption and decryption operation (122), automatically pick up the full detail text in the editor (2), as whole plain/cipher text (23), give encryption/decryption element (3) and carry out the encryption and decryption functions of realizing by cryptographic algorithm process and/or encryption apparatus and key immediately, again with (32) loopback of whole ciphertexts of being generated/expressly and original full detail text in the replacement editing window (2) fully; Can also pick up the selected text (20) in the editor (2) automatically, as selected plain/cipher text (203), give encryption/decryption element (3) and carry out same encryption and decryption functions immediately, again with selected ciphertext/expressly (320) loopback and the interior original selected text (20) of replacement editing window (2) fully that is generated.The arrow of line among the figure, the direction that expression is transmitted or acted on.
Fig. 2 is a process chart of the present invention.Ready (1) afterwards, at current window editor (2), input information text; At any time judge whether to want encryption and decryption (3), if (Y), then pick up target information text (4), whether check ciphertext (5), being (Y) then decrypting ciphertext (7) generation plaintext, denys (N) then encrypting plaintext (6) generation ciphertext, then with newly-generated plaintext or ciphertext, displacement target information text (8) transfers to continue in current window editor (2) again; Being not (N) if judge encryption and decryption (3), then seeing whether finish (9), is that (Y) then returns (10), and (N) then do not change and go continuation in current window editor (2).The arrow of line among the figure, the flow direction that expression is handled.
Fig. 3 is the interface schematic diagram of an embodiment of the present invention.Program name " information privacy program " is arranged on the title bar (1), and the upper right corner arranges to minimize button (11) and X button (12) as usual.The purposes of program has been listed classification (2), has chat (21) and mail (22) to select respectively, and the latter is a default option.The means that drive encryption and decryption are provided by definition hot key (3), hot key adds ' ~ ' key by Ctr1 or numerical key constitutes, encryption key drop-down list box (31) all contains identical key characters collection { ' ~ ' with deciphering key drop-down list box (32), ' 1 ', ' 2 ' ... ' 9 ', ' 0 ' }, default option is, encrypting hot key is [Ctrl+ ~], and understanding hot key is [Ctrl+1].Key input frame (4) receives key or the password that is used for encryption and decryption; Help button (51) is used to show help information, and expansion button (52) is used to launch this program auxiliary operation interface for relevant parameter is set; Presenting bank (6) is used for display operation and guides and report operating result.
Fig. 4 is instant encryption of the present invention and instant deciphering effect schematic diagram.Operate in same editor, left frame is the information text (expressly) before encrypting, and after the instant encryption, then generates the information Wen Mu (ciphertext) of left frame; Again this ciphertext is carried out instant encryption, then be reduced into the plaintext shown in the left frame again.
Embodiment
Work out the utility program of a Windows dialog box framework, called after " information privacy program ".Program main operation interfacial structure, as shown in Figure 3.The encryption apparatus product of the USB interface of program integrated a kind of " password gold armour " by name loads its supporting API dynamic link library, calls its DLL (dynamic link library) function and realizes the encryption and decryption function.Program response is in equipment variations message, detects the access of encryption apparatus automatically and shifts out, for the encryption and decryption operation provides encryption apparatus availability criterion.During the program running initialization, be provided with and registration encryption hot key and deciphering hot key.Program is reelected the operation of hot key thereafter to the user, automatic approach avoidance conflict is also finished registration updating.Program is response hot key message, distinguishes and encrypts hot key and understand hot key, and each realizes a response function, carries out instant encryption and the instant function of understanding respectively.Wherein, encrypt hot key and be used for selected text in the current editor or full text are carried out instant encryption or deciphering, depend on that specifically the current information text is expressly (then to encrypt) or ciphertext (then deciphering); Deciphering is used for the ciphertext of choosing in the current window is deciphered immediately, and opens a new dialog box and show the plaintext that is drawn.For distinguish ciphertext with expressly, special regulation is attached to the head and the tail of ciphertext respectively with head note " { ~ " and tail tag note " ~ } " when encryption; And when deciphering, then reject it.By searching this a pair of mark, just can differentiating the current information text is plaintext or ciphertext, thereby only encrypts accordingly or decipher, and effectively avoids misoperation.During encryption, also additional in ciphertext " password gold armour " product ID is for identifying identity and/or interchange key.The processing procedure of encrypting the response function of hot key is: 1. simulation [Ctrl+C] is earlier attempted and is extracted text through clipbook, if gained text data non-NULL then changes and goes 4., otherwise continues 2.; 2. simulation [Ctrl+A] button selects the full text in the current window entirely; 3. simulate [Ctrl+C] and extract text through clipbook; 4. differentiating is plaintext or ciphertext, calls " password gold armour " corresponding function function and encrypts or decipher; 5. through clipbook and the simulation [Ctrl+V] and loopback and displacement current window in the extraction original text.The processing procedure of understanding the response function of hot key is: suppose that 1. the user has chosen ciphertext (inverse demonstration) with mouse; 2. simulate [Ctrl+C] and extract text through clipbook; 3. calling " password gold armour " power function is decrypted and draws expressly; 4. opening a new dialog box shows expressly; 5. close this new dialog box voluntarily by the user.The normal use of this program need not to keep this program window to open, and it can be minimized, and can be compared to the hidden operation in backstage, and its functional mechanism is still effective.This program of use is carried out instant encryption and instant deciphering, once at the actual effect example of full text operation in the window, as shown in Figure 4.

Claims (12)

1, a kind of information security method, be particularly useful for the information privacy of instant messaging, Email and other Edit Texts, by the cryptographic algorithm process of determining, and/or by encryption apparatus hardware, with information text from plain text encryption be ciphertext or from decrypt ciphertext for expressly, it is characterized in that, described encryption and decryption, be instant encryption and the instant deciphering of carrying out at the selected text in the current editor or full text, make should selected text or full text from expressly to ciphertext or from ciphertext to expressly and by instant displacement and be presented in the same window immediately.
2, method according to claim 1 is characterized in that, described instant encryption and instant deciphering institute at range of text be decided to be approximately, selected the part text as if peripheral operation, then at this selected text, otherwise at full text.
3, method according to claim 1 is characterized in that, described instant encryption, also at least one in the additional following message item in the ciphertext that generates
(1) identification information of ciphertext;
(2) secret information of communicating pair or information sharing side identify label;
(3) secret information of communicating pair or information sharing side encryption apparatus sign.
4, method according to claim 1 is characterized in that, described instant encryption and instant deciphering are driven by same prompt operation, make encrypt and decrypt hocket, expressly with the ciphertext alternating permutation and present.
According to claim 1,2,3,4 described methods, it is characterized in that 5, described instant encryption is deciphered with instant, operate by the simulation clipbook and realize picking up text and transmission text.
6, a kind of information security method, be particularly useful for the decrypts information of instant messaging, Email and other videotexs, by the cryptographic algorithm process of determining, and/or by encryption apparatus hardware, visible and read-only information ciphertext is read as expressly, it is characterized in that described deciphering is to continue scheduled duration and then decipher immediately and present corresponding plaintext when cursor rests on the ciphertext.
7, method according to claim 6 is characterized in that, described deciphering, at least one item in the following message item of also extracting out from ciphertext
(1) information of communicating pair or information sharing side identify label;
(2) information of communicating pair or information sharing side encryption apparatus sign.
8, a kind of information privacy program, be particularly useful for collaborative such as instant messaging, the target program that E-mail address and other comprise the text editing function uses and independent operating, realize definite cryptographic algorithm, and/or control encryption apparatus hardware, with information text from plain text encryption be ciphertext or from decrypt ciphertext for expressly, it is characterized in that, described encryption and decryption, be instant encryption and the instant deciphering of carrying out at the selected text in the current editor or full text, make should selected text or full text from expressly to ciphertext or from ciphertext to expressly and by instant displacement and be presented in the same window immediately.
9, program according to claim 1 is characterized in that, described instant encryption and instant deciphering institute at range of text be decided to be approximately, selected the part text as if peripheral operation, then at this selected text, otherwise at full text.
10, program according to claim 8 is characterized in that, described instant encryption, also at least one in the additional following message item in the ciphertext that generates
(1) identification information of ciphertext;
(2) secret information of communicating pair or information sharing side identify label;
(3) secret information of communicating pair or information sharing side encryption apparatus sign.
11, program according to claim 8 is characterized in that, described instant encryption and instant deciphering are driven by same prompt operation, make encrypt and decrypt hocket, expressly with the ciphertext alternating permutation and present.
12, according to Claim 8,9,10,11 described programs, it is characterized in that described instant encryption and instant deciphering are operated by the simulation clipbook and to be realized picking up text and to transmit text.
CN200910136867A 2009-04-14 2009-04-14 An information security method and procedure Pending CN101534311A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910136867A CN101534311A (en) 2009-04-14 2009-04-14 An information security method and procedure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910136867A CN101534311A (en) 2009-04-14 2009-04-14 An information security method and procedure

Publications (1)

Publication Number Publication Date
CN101534311A true CN101534311A (en) 2009-09-16

Family

ID=41104698

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910136867A Pending CN101534311A (en) 2009-04-14 2009-04-14 An information security method and procedure

Country Status (1)

Country Link
CN (1) CN101534311A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011137868A2 (en) * 2011-07-18 2011-11-10 华为终端有限公司 Method and device for instantly encrypting and decrypting messages
CN102315976A (en) * 2011-10-19 2012-01-11 杭州华三通信技术有限公司 Password management method and equipment thereof
CN102355353A (en) * 2011-08-12 2012-02-15 无锡城市云计算中心有限公司 Encrypted input method and encrypted communication method and device
CN104243291A (en) * 2014-04-21 2014-12-24 许建国 Instant messaging method and system thereof capable of guaranteeing safety of user communication content
CN104270517A (en) * 2014-09-23 2015-01-07 中兴通讯股份有限公司 Information encryption method and mobile terminal
CN104580160A (en) * 2014-12-16 2015-04-29 上海天奕达电子科技有限公司 Information interaction method and system
CN104917603A (en) * 2014-09-22 2015-09-16 中兴通讯股份有限公司 Information secure transmission method, receiving terminal and sending terminal
CN105468960A (en) * 2014-09-11 2016-04-06 阿里巴巴集团控股有限公司 Method and apparatus for displaying password clear text, mobile device and computer
CN105825121A (en) * 2015-01-04 2016-08-03 阿里巴巴集团控股有限公司 Cipher input control method and device
CN105981423A (en) * 2013-12-20 2016-09-28 三星电子株式会社 Method and apparatus for transmitting and receiving encrypted message between terminals
CN106411719A (en) * 2016-11-22 2017-02-15 北京奇虎科技有限公司 Method for processing instant messages and equipment thereof
CN106685792A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Confidential information sending method and device
CN106685897A (en) * 2015-11-09 2017-05-17 国民技术股份有限公司 Safe input method, device and system
CN108664803A (en) * 2018-04-04 2018-10-16 中国电子科技集团公司第三十研究所 A kind of document content fine granularity access control system based on password
CN108830095A (en) * 2018-06-20 2018-11-16 中国银行股份有限公司 A kind of data encryption/decryption method and device
CN110292306A (en) * 2019-06-26 2019-10-01 九阳股份有限公司 A kind of heating means and insulating pot of insulating pot
CN111277489A (en) * 2020-01-20 2020-06-12 合肥高维数据技术有限公司 Instant messaging sending method, device and equipment

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102334306A (en) * 2011-07-18 2012-01-25 华为终端有限公司 Information instant enciphering and deciphering method and device
WO2011137868A3 (en) * 2011-07-18 2012-06-14 华为终端有限公司 Method and device for instantly encrypting and decrypting messages
WO2011137868A2 (en) * 2011-07-18 2011-11-10 华为终端有限公司 Method and device for instantly encrypting and decrypting messages
CN102355353A (en) * 2011-08-12 2012-02-15 无锡城市云计算中心有限公司 Encrypted input method and encrypted communication method and device
CN102315976A (en) * 2011-10-19 2012-01-11 杭州华三通信技术有限公司 Password management method and equipment thereof
CN102315976B (en) * 2011-10-19 2014-05-07 杭州华三通信技术有限公司 Password management method and equipment thereof
US10880736B2 (en) 2013-12-20 2020-12-29 Samsung Electronics Co., Ltd. Method and apparatus for transmitting and receiving encrypted message between terminals
CN105981423A (en) * 2013-12-20 2016-09-28 三星电子株式会社 Method and apparatus for transmitting and receiving encrypted message between terminals
CN104243291A (en) * 2014-04-21 2014-12-24 许建国 Instant messaging method and system thereof capable of guaranteeing safety of user communication content
CN105468960B (en) * 2014-09-11 2019-12-06 阿里巴巴集团控股有限公司 method and device for displaying password plaintext, mobile equipment and computer
CN105468960A (en) * 2014-09-11 2016-04-06 阿里巴巴集团控股有限公司 Method and apparatus for displaying password clear text, mobile device and computer
CN104917603A (en) * 2014-09-22 2015-09-16 中兴通讯股份有限公司 Information secure transmission method, receiving terminal and sending terminal
CN104917603B (en) * 2014-09-22 2019-03-12 中兴通讯股份有限公司 A kind of information security transfer method receives terminal and sends terminal
CN104270517A (en) * 2014-09-23 2015-01-07 中兴通讯股份有限公司 Information encryption method and mobile terminal
WO2016045469A1 (en) * 2014-09-23 2016-03-31 中兴通讯股份有限公司 Information encryption method and mobile terminal
CN104270517B (en) * 2014-09-23 2019-06-14 中兴通讯股份有限公司 Information ciphering method and mobile terminal
CN104580160A (en) * 2014-12-16 2015-04-29 上海天奕达电子科技有限公司 Information interaction method and system
CN105825121B (en) * 2015-01-04 2019-02-12 阿里巴巴集团控股有限公司 Password Input control method and device
CN105825121A (en) * 2015-01-04 2016-08-03 阿里巴巴集团控股有限公司 Cipher input control method and device
CN106685792A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Confidential information sending method and device
CN106685897B (en) * 2015-11-09 2020-09-08 国民技术股份有限公司 Safe input method, device and system
WO2017080356A1 (en) * 2015-11-09 2017-05-18 国民技术股份有限公司 Secure input method, device and system
CN106685897A (en) * 2015-11-09 2017-05-17 国民技术股份有限公司 Safe input method, device and system
CN106411719A (en) * 2016-11-22 2017-02-15 北京奇虎科技有限公司 Method for processing instant messages and equipment thereof
CN108664803A (en) * 2018-04-04 2018-10-16 中国电子科技集团公司第三十研究所 A kind of document content fine granularity access control system based on password
CN108830095A (en) * 2018-06-20 2018-11-16 中国银行股份有限公司 A kind of data encryption/decryption method and device
CN108830095B (en) * 2018-06-20 2022-05-27 中国银行股份有限公司 Data encryption and decryption method and device
CN110292306A (en) * 2019-06-26 2019-10-01 九阳股份有限公司 A kind of heating means and insulating pot of insulating pot
CN111277489A (en) * 2020-01-20 2020-06-12 合肥高维数据技术有限公司 Instant messaging sending method, device and equipment
WO2021147727A1 (en) * 2020-01-20 2021-07-29 合肥高维数据技术有限公司 Instant messaging sending method, apparatus and device

Similar Documents

Publication Publication Date Title
CN101534311A (en) An information security method and procedure
CN104270517B (en) Information ciphering method and mobile terminal
CN101753311A (en) Information privacy and identity authentication method and digital signature program
CN104660589B (en) Method, system and terminal for encrypting control and information analysis of information
CN104270516B (en) Decryption method and mobile terminal
CN104243149B (en) Encrypt and Decrypt method, device and server
CN104768148B (en) A kind of message encryption method and device
CN104463004A (en) Method and device for protecting interface content
CN103324898A (en) Method for encrypting/decrypting display content in touch screen, and communication terminal
CN107180197A (en) file operation method and device
CN105898740A (en) Information encryption and decryption method and system based on mobile device communication
CN102334306A (en) Information instant enciphering and deciphering method and device
CN103268456A (en) Method and device for file safety control
CN106570405B (en) Method and device for encrypting/decrypting characters in input method
CN106599632A (en) Password input method and device
CN106685897A (en) Safe input method, device and system
CN105577361A (en) Information processing method and device thereof
KR100447777B1 (en) Hacking prevention of key stroke data
CN102404107A (en) Method, device, transmitting end and receiving end all capable of guaranteeing safety of inputted content
CN101841785A (en) Method for sending encrypted message by cellphone and system thereof
CN111818466B (en) Information sending and receiving method and device, electronic equipment and readable storage medium
CN112367323B (en) Text end-to-end encryption and decryption system and method of intelligent terminal
CN106022147A (en) Method and device for file encryption and decryption
CN109101116B (en) iOS terminal equipment safety keyboard and implementation method thereof
CN106909850A (en) A kind of internet code keypad system and its implementation based on HTML5

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20090916