CN101895396A - Mobile terminal and encryption method thereof - Google Patents

Mobile terminal and encryption method thereof Download PDF

Info

Publication number
CN101895396A
CN101895396A CN2010102302493A CN201010230249A CN101895396A CN 101895396 A CN101895396 A CN 101895396A CN 2010102302493 A CN2010102302493 A CN 2010102302493A CN 201010230249 A CN201010230249 A CN 201010230249A CN 101895396 A CN101895396 A CN 101895396A
Authority
CN
China
Prior art keywords
password
portable terminal
file
encryption level
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102302493A
Other languages
Chinese (zh)
Inventor
王武斌
张芝萍
傅启洪
裴莉辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2010102302493A priority Critical patent/CN101895396A/en
Priority to PCT/CN2010/077893 priority patent/WO2012006830A1/en
Publication of CN101895396A publication Critical patent/CN101895396A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Abstract

The invention discloses a mobile terminal and an encryption method thereof. The mobile terminal comprises a password management module, a password receiving module and a file display module, wherein the password management module is used for managing a first password and a second password of the mobile terminal; the first password is used for encrypting files in the first encryption level in the mobile terminal; the second password is used for encrypting files in the second encryption level in the mobile terminal; the second encryption level is higher than the first encryption level; the password receiving module is used for receiving the first password or the second password which is input by the user of the mobile terminal; the file display module is used for displaying the files in the first encryption level according to the first password and displaying the files in the first and second encryption levels according to the second password. The encryption method avoids the exposure of the files in the second encryption level in the mobile terminal so as to ensure the safety of the files.

Description

Portable terminal and encryption method thereof
Technical field
The present invention relates to the communications field, in particular to a kind of portable terminal and encryption method thereof.
Background technology
At present, the portable terminal of various styles all has cipher protection function, and it usually can be to the vital document stored in the portable terminal or information by being provided with password protection, the content of having only the correct password of input just can check encryption.
This mode has effectively stoped the leakage of information, but also there is following hidden danger simultaneously, the people in close relations (as lover, children etc.) with the portable terminal owner, thereby may obtain password by inquiring this portable terminal owner, thereby then portable terminal is decrypted the encrypted content of learning in this portable terminal.
This shows, present portable terminal encryption technology is encrypted or the operation of deciphering is disclosed, and anyone may know that this portable terminal encrypts, thereby cause and above-mentionedly have to inform under the situation of other people portable terminal password the exposure of the enciphered message in the portable terminal at some.
Summary of the invention
At portable terminal in the correlation technique operation of encrypting or decipher is disclosed, thereby cause anyone to know that all this portable terminal carried out the problem of encrypting and proposed the present invention, for this reason, main purpose of the present invention is to provide a kind of portable terminal and encryption method thereof, to address the above problem.
To achieve these goals, according to an aspect of the present invention, provide a kind of portable terminal.
Portable terminal according to the present invention comprises: the Password Management module, be used for first password and second password of portable terminal are managed, wherein, first password is used for the file of first encryption level of portable terminal is encrypted, second password is used for the file of second encryption level of portable terminal is encrypted, and second encryption level is higher than first encryption level; The password receiver module is used for first password or second password of the user input of mobile terminal receive; The file display module is used for showing according to first password file of first encryption level; And be used for showing the file of first encryption level and the file of second encryption level according to second password.
Further, above-mentioned portable terminal also comprises: receiver module is used to receive the encrypting messages that file is encrypted; Judge module is used to judge whether the password that the password receiver module receives is second password; Encrypting module is used in judged result according to encrypting messages, using second password file to be carried out the encryption of second encryption level when being.
Further, Password Management module also is used for when using portable terminal first second password being provided with.
Further, above-mentioned portable terminal also comprises the password modified module, is used to point out user's modification first password and/or second password.
To achieve these goals, according to another aspect of the present invention, also provide a kind of portable terminal encryption method.
Portable terminal encryption method according to the present invention comprises: portable terminal uses first password that the file of first encryption level is encrypted, and use second password that the file of second encryption level is encrypted, wherein second encryption level is higher than first encryption level; Portable terminal receives first password of user's input, and shows the file of first encryption level according to first password; Perhaps portable terminal receives second password of user's input, and shows the file of first encryption level and the file of second encryption level according to second password.
Further, use before second password encrypts the file of second encryption level at portable terminal, also comprise: portable terminal receives and is used for the encrypting messages that file is encrypted and the password of user's input; Portable terminal judges whether password is second password; If judged result is for being, then portable terminal is carried out the operation of using second password that file is encrypted according to encrypting messages.
Further, portable terminal is provided with second password when using first.
Further, before second password is provided with, also comprise: portable terminal receives first password of user's input; Portable terminal prompting user selects whether to carry out the setting of second password, and receives user's selection result; If selection result is for being then to carry out the operation that second password is provided with.
Further, if selection result for not, is not then reresented in follow-up use second password is not provided with.
Further, also comprise: portable terminal prompting user's modification first password and/or second password.
By the present invention, adopt the file display module only to show the file of first encryption level according to first password, do not point out the file that also has second encryption level, solved in the correlation technique portable terminal to encrypting or the operation of deciphering discloses, thereby cause anyone to know that all this portable terminal carried out the problem of encrypting, avoid the exposure of the file of second encryption level in the portable terminal, guaranteed file security.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, do not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 is the structured flowchart according to the portable terminal of the embodiment of the invention;
Fig. 2 is the structured flowchart of portable terminal according to the preferred embodiment of the invention;
Fig. 3 is the flow chart according to the portable terminal encryption method of the embodiment of the invention;
Fig. 4 moves the flow chart that terminal password is provided with when opening according to the common cryptographic function of the embodiment of the invention;
Fig. 5 moves the flow chart that terminal password is provided with when not opening according to the common cryptographic function of the embodiment of the invention;
Fig. 6 is the flow chart according to the browsing file of the embodiment of the invention.
Embodiment
Need to prove that under the situation of not conflicting, embodiment and the feature among the embodiment among the application can make up mutually.Describe the present invention below with reference to the accompanying drawings and in conjunction with the embodiments in detail.
Encrypt some problems that implementation is set at portable terminal, the present invention proposes a kind of portable terminal that allows and encrypts the implementation method that relative stealth is set, even utilize method described in the invention can reasonable realization other people obtain portable terminal and be familiar with under the situation of portable terminal cryptographic operation, also can't know whether be provided with encrypted content in the portable terminal.Also can guarantee simultaneously to know under the portable terminal password situation and still can't see whole encrypted contents at others.
According to embodiments of the invention, a kind of portable terminal is provided, Fig. 1 is the structured flowchart according to the portable terminal of the embodiment of the invention, comprises Password Management module 11, password receiver module 12 and file display module 13.Below its structure is described in detail.
Password Management module 11, be used for first password and second password of portable terminal are managed, wherein, first password is used for the file of first encryption level of portable terminal is encrypted, second password is used for the file of second encryption level of portable terminal is encrypted, and second encryption level is higher than first encryption level.
Password receiver module 12 is used for first password or second password of the user input of mobile terminal receive.
File display module 13 is connected to Password Management module 11 and password receiver module 12, is used for first password according to 12 receptions of password receiver module, the file of first encryption level of the first password correspondence of display password administration module 11 management; And be used for second password that receives according to password receiver module 12, the file of second encryption level of the second password correspondence of the file of first encryption level of the first password correspondence of display password administration module 11 management and 11 management of Password Management module.
Need to prove,, in the time of the file of first encryption level of the first password correspondence of display password administration module 11 management, do not point out the file that also has second encryption level at first password that file display module 13 receives according to password receiver module 12.
In the correlation technique, portable terminal discloses the operation of encrypting or decipher, thereby causes anyone to know that all this portable terminal carried out encryption.In the embodiment of the invention, portable terminal has adopted first password and second password, two cover passwords, and, when the user inputs first password, portable terminal only shows the file of first encryption level of the first password correspondence, does not point out this user also to have the file of second encryption level.Owing to know the user of first password and do not know also to exist the file of second encryption level, so this portable terminal of its there is no telling also adopts second password to carry out encryption.Like this, can avoid the exposure of the file of second encryption level in the portable terminal, secure documents.
Preferably, above-mentioned portable terminal also comprises: receiver module 14, judge module 15 and encrypting module 16.Below its structure is described in detail.
Receiver module 14 is used to receive the encrypting messages that file is encrypted; Judge module 15 is connected to password receiver module 14, is used to judge whether the password that password receiver module 14 receives is second password; Encrypting module 16 is connected to judge module 15, is used in the judged result of judge module 15 when being, the encrypting messages according to receiver module 14 receives uses second password file to be carried out the encryption of second encryption level.
Need to prove that the file that this preferred embodiment has been described second encryption level carries out encrypted process.Consider the disguise of the file of second password and second encryption level, this portable terminal does not for example carry out the clearly prompting of " please input second password " to the user.Therefore, the password that password receiver module 14 receives may also may be second password for first password, when judge module 15 judges that password that password receiver modules 14 receive is second password, then file is carried out the encryption of second encryption level, otherwise file is carried out the encryption of first encryption level, to improve the fail safe of portable terminal.
Preferably, Password Management module 11 also is used for when using portable terminal first second password being provided with.
Need to prove that the portable terminal in this preferred embodiment will no longer be pointed out second password is set when follow-up use, thus avoid touching this portable terminal other people learn the existence of this second password, improve the disguise of second password.
Preferably, above-mentioned portable terminal also comprises password modified module 17, is used to point out user's modification first password and/or second password.
Need to prove that this preferred embodiment has been described the modification process to second password.Consider the disguise of second password, this portable terminal does not for example carry out the clearly prompting of " please input second password " to the user.Therefore, the password that password receiver module 14 receives may also may be second password for first password, when judge module 15 judges that password that password receiver modules 14 receive is second password, then allow user's modification second password, otherwise only allow user's modification first password, thereby improve the disguise of second password.
The present invention also provides a preferred embodiment, combines the technical scheme of above-mentioned a plurality of preferred embodiments, describes in detail below in conjunction with Fig. 2.
Fig. 2 is the structured flowchart of portable terminal according to the preferred embodiment of the invention, comprise password setting module and Password Management module, wherein, the password setting module is responsible for finishing setting, the change that the user carries out common password and high grade cryptosystem, realizes that simultaneously two cover passwords are independent of each other.The password setting module is responsible for calling the Password Management module, and realization password hold function and current password information are obtained function.The Password Management module adopts two block access zones: common password (corresponding to above-mentioned first password) storage area and high grade cryptosystem (corresponding to above-mentioned second password) storage area.The file browser is judged the encrypted message of current input by calling the Password Management module, carries out the demonstration of different content according to different encrypted messages.
According to embodiments of the invention, also provide a kind of portable terminal encryption method.Fig. 3 is the flow chart according to the portable terminal encryption method of the embodiment of the invention, comprises that following step S302 is to step S304.
Step S302, portable terminal use first password that the file of first encryption level is encrypted, and use second password that the file of second encryption level is encrypted, and wherein second encryption level is higher than first encryption level.
Step S304, portable terminal receive first password of user's input, and show the file of first encryption level according to first password; Perhaps portable terminal receives second password of user's input, and shows the file of first encryption level and the file of second encryption level according to second password.
Need to prove that the file that shows first encryption level according to first password at portable terminal is not simultaneously pointed out the file that also has second encryption level.
In the correlation technique, portable terminal discloses the operation of encrypting or decipher, thereby causes anyone to know that all this portable terminal carried out encryption.In the embodiment of the invention, portable terminal has adopted first password and second password, two cover passwords, and, when the user inputs first password, portable terminal only shows the file of first encryption level of the first password correspondence, does not point out this user also to have the file of second encryption level.Owing to know the user of first password and do not know also to exist the file of second encryption level, so this portable terminal of its there is no telling also adopts second password to carry out encryption.Like this, can avoid the exposure of the file of second encryption level in the portable terminal, secure documents.
Preferably, use before second password encrypts the file of second encryption level at portable terminal, portable terminal receives and is used for the encrypting messages that file is encrypted and the password of user's input; Portable terminal judges whether password is second password; If judged result is for being, then portable terminal is carried out the operation of using second password that file is encrypted according to encrypting messages.
Need to prove that the file that this preferred embodiment has been described second encryption level carries out encrypted process.Consider the disguise of the file of second password and second encryption level, this portable terminal does not for example carry out the clearly prompting of " please input second password " to the user.Therefore, the password that portable terminal receives may also may be second password for first password, when portable terminal judges that this password is second password, then file is carried out the encryption of second encryption level, otherwise file is carried out the encryption of first encryption level, to improve the fail safe of portable terminal.
Preferably, portable terminal is provided with second password when using first.And before second password was provided with, portable terminal received first password of user's input; Portable terminal prompting user selects whether to carry out the setting of second password, and receives user's selection result; If selection result is for being then to carry out the operation that second password is provided with.If selection result for not, is not then reresented in follow-up use second password is not provided with.
Need to prove that the portable terminal in this preferred embodiment will no longer be pointed out second password is set when follow-up use, thus avoid touching this portable terminal other people learn the existence of this second password, improve the fail safe of second password.
Preferably, portable terminal prompting user's modification first password and/or second password.
Need to prove that this preferred embodiment has been described the modification process to second password.Consider the disguise of second password, this portable terminal does not for example carry out the clearly prompting of " please input second password " to the user.Therefore, the password that portable terminal receives may also may be second password for first password, when portable terminal judges that the password that receives is second password, then allows user's modification second password, otherwise only allow user's modification first password, thereby improve the disguise of second password.
In order to help to understand the foregoing description, further describe other a plurality of preferred embodiments of the present invention below.
Preferred embodiment one
When this preferred embodiment one has been described the unlatching of common password (corresponding to above-mentioned first password) function, the process of portable terminal password setting.
Fig. 4 moves the flow chart that terminal password is provided with when opening according to the common cryptographic function of the embodiment of the invention, comprises that following step S402 is to step S410.
Step S402: the user enters the password setting module, module is set judges whether it is to enter for the first time, if forward step S404 to, if not then forwarding step S408 to.
Step S404: whether the prompting user is provided with high grade cryptosystem.If selection is then forwards step S406 to; If selection is not then withdraws from the password setting module.
Step S406: carry out the high grade cryptosystem set handling, withdraw from the password setting module after setting completed.
Step S408: wait for that the user inputs the portable terminal password.If the input password is common password, then forward step S410 to; If the input password is a high grade cryptosystem, then forward step S406 to.
Step S410: carry out common password setting and handle, withdraw from the password setting module after setting completed.
Preferred embodiment two
When this preferred embodiment two has been described common cryptographic function and has not been opened, the process of portable terminal password setting.
Fig. 5 moves the flow chart that terminal password is provided with when not opening according to the common cryptographic function of the embodiment of the invention, comprises that following step S502 is to step S508.
Step S502: the user enters the password setting module, module is set judges whether it is to enter for the first time, if then forward step S504 to, if not then forwarding step S508 to.
Step S504: whether the prompting user is provided with high grade cryptosystem.If selection is then forwards step S506 to; If selection is not then withdraws from the password setting module.
Step S506: carry out the high grade cryptosystem set handling, withdraw from the password setting module after setting completed.
Step S508: judge whether the user imports high grade cryptosystem.If input high grade cryptosystem then forward step S506 to is not if import high grade cryptosystem then withdraw from the password setting module.
Preferred embodiment three
This preferred embodiment three has been described in password setting and has been finished the process that laggard style of writing part is browsed based on preferred embodiment one.
Fig. 6 is the flow chart according to the browsing file of the embodiment of the invention, comprises following step S602 to S610.
Step S602: enter the file browser module, judge whether the user inputs the portable terminal password.If do not input the portable terminal password then forward step S604 to; If input password then forward step S606 to.
Step S604: unencrypted content in the file browser display portable terminal.
Step S606: the kind of judging the input password.If the input password is common password, then forward step S608 to; If the input password is a high grade cryptosystem, then forward step S610 to.
Step S608: unencrypted content and common encrypted content in the file browser display portable terminal.
Step S610: file browser display full content.
This preferred embodiment is by distinguishing Crypted password, thereby shows other file of respective encrypted level.Particularly, when the user inputed common password, portable terminal only showed unencrypted content and common encrypted content, does not point out the user also to have the superencipherment content among the step S608.Owing to know the user of common password and do not know also to exist the superencipherment content, so this portable terminal of its there is no telling also adopts high grade cryptosystem to carry out encryption, thereby can avoid the exposure of the file of higher encryption level in the portable terminal, secure documents.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation, and protection scope of the present invention is as the criterion with claim.
Need to prove, can in computer system, carry out in the step shown in the flow chart of accompanying drawing such as a set of computer-executable instructions, and, though there is shown logical order in flow process, but in some cases, can carry out step shown or that describe with the order that is different from herein.
The present invention can make a distinction privately owned encryption setting of portable terminal owner (high grade cryptosystem is encrypted or second password encryption) and general portable terminal encryption setting (password encryption or first password encryption usually) easily, also can't realize the function that superencipherment exists even realize knowing common encryption, and superencipherment can have all authorities of common encryption, otherwise then not all right.Usually encrypt in addition and superencipherment can not influence each other, no matter common password is opened or is closed and can be provided with high grade cryptosystem, like this at general user's portable terminal just as cryptoguard is not set.
In sum, according to the abovementioned embodiments of the present invention, adopt the file display module only to show the file of first encryption level according to first password, do not point out the file that also has second encryption level, solved in the correlation technique portable terminal to encrypting or the operation of deciphering discloses, thereby cause anyone to know that all this portable terminal carried out the problem of encrypting, avoided the exposure of the file of second encryption level in the portable terminal, guaranteed file security.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with the general calculation device, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation element forms, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the storage device and carry out by calculation element, perhaps they are made into each integrated circuit modules respectively, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a portable terminal is characterized in that, comprising:
The Password Management module, be used for first password and second password of described portable terminal are managed, wherein, described first password is used for the file of first encryption level of described portable terminal is encrypted, described second password is used for the file of second encryption level of described portable terminal is encrypted, and described second encryption level is higher than described first encryption level;
The password receiver module is used to receive described first password or described second password that described mobile terminal user is imported;
The file display module is used for showing according to described first password file of described first encryption level; And be used for showing the file of described first encryption level and the file of described second encryption level according to described second password.
2. portable terminal according to claim 1 is characterized in that, also comprises:
Receiver module is used to receive the encrypting messages that file is encrypted;
Judge module is used to judge whether the password that described password receiver module receives is described second password;
Encrypting module is used in judged result according to described encrypting messages, using described second password described file to be carried out the encryption of described second encryption level when being.
3. portable terminal according to claim 1 is characterized in that, described Password Management module also is used for when using described portable terminal first described second password being provided with.
4. portable terminal according to claim 1 is characterized in that, also comprises the password modified module, is used to point out described first password of described user's modification and/or described second password.
5. a portable terminal encryption method is characterized in that, comprising:
Described portable terminal uses first password that the file of first encryption level is encrypted, and uses second password that the file of second encryption level is encrypted, and wherein said second encryption level is higher than described first encryption level;
Described portable terminal receives described first password of user's input, and shows the file of described first encryption level according to described first password; Perhaps described portable terminal receives described second password of described user's input, and shows the file of described first encryption level and the file of described second encryption level according to described second password.
6. method according to claim 5 is characterized in that, uses before described second password encrypts the file of described second encryption level at described portable terminal, also comprises:
Described portable terminal receives and is used for encrypting messages that file is encrypted, and the password of described user input;
Described portable terminal judges whether described password is described second password;
If judged result is for being, then described portable terminal is carried out the operation of using described second password that described file is encrypted according to described encrypting messages.
7. method according to claim 5 is characterized in that, described portable terminal is provided with described second password when using first.
8. method according to claim 7 is characterized in that, before described second password is provided with, also comprises:
Described portable terminal receives first password of user's input;
Described portable terminal points out described user to select whether carry out the setting of described second password, and receives described user's selection result;
If described selection result is for being then to carry out the operation that described second password is provided with.
9. method according to claim 8 is characterized in that, if described selection result for not, is not then reresented in follow-up use described second password is not provided with.
10. method according to claim 5 is characterized in that, also comprises:
Described portable terminal is pointed out described first password of described user's modification and/or described second password.
CN2010102302493A 2010-07-14 2010-07-14 Mobile terminal and encryption method thereof Pending CN101895396A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2010102302493A CN101895396A (en) 2010-07-14 2010-07-14 Mobile terminal and encryption method thereof
PCT/CN2010/077893 WO2012006830A1 (en) 2010-07-14 2010-10-19 Mobile terminal and encryption method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102302493A CN101895396A (en) 2010-07-14 2010-07-14 Mobile terminal and encryption method thereof

Publications (1)

Publication Number Publication Date
CN101895396A true CN101895396A (en) 2010-11-24

Family

ID=43104475

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102302493A Pending CN101895396A (en) 2010-07-14 2010-07-14 Mobile terminal and encryption method thereof

Country Status (2)

Country Link
CN (1) CN101895396A (en)
WO (1) WO2012006830A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102271332A (en) * 2011-07-18 2011-12-07 中兴通讯股份有限公司 Method and device for maintaining secrecy of terminal information
CN102542210A (en) * 2010-12-31 2012-07-04 富泰华工业(深圳)有限公司 Electronic device and method for managing file permissions
CN103377332A (en) * 2012-04-26 2013-10-30 腾讯科技(深圳)有限公司 Application program accessing method and device
CN103455737A (en) * 2012-05-28 2013-12-18 百度在线网络技术(北京)有限公司 User information protection method and device
WO2014012515A1 (en) * 2012-07-20 2014-01-23 Tencent Technology (Shenzhen) Company Limited Method and system to decrypt private contents
CN104134046A (en) * 2014-07-29 2014-11-05 深圳市中兴移动通信有限公司 Encryption method and device
CN104620249A (en) * 2012-07-12 2015-05-13 罗文有限公司 Password authentication system and password authentication method using consecutive password authentication
CN106209896A (en) * 2016-07-29 2016-12-07 网宿科技股份有限公司 Streaming media encryption method based on audio frequency and video form and module
CN111385656A (en) * 2020-03-04 2020-07-07 四川长虹电器股份有限公司 Authority management and control method for program file imported by outdoor electronic advertising machine

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060294391A1 (en) * 2005-06-24 2006-12-28 Hitrust.Com Incorporated Data encryption and decryption method
CN101005661A (en) * 2006-11-15 2007-07-25 深圳凯虹移动通信有限公司 Mobile terminal with data and menu hidden function and its enciphering hiding method
CN101257681A (en) * 2008-03-26 2008-09-03 宇龙计算机通信科技(深圳)有限公司 Private data protecting equipment, mobile terminal, private data memory and read method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100446021C (en) * 2006-11-29 2008-12-24 北京飞天诚信科技有限公司 Method of realizing intelligence cryptographic key set of fingerprint for multiple users to use

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060294391A1 (en) * 2005-06-24 2006-12-28 Hitrust.Com Incorporated Data encryption and decryption method
CN101005661A (en) * 2006-11-15 2007-07-25 深圳凯虹移动通信有限公司 Mobile terminal with data and menu hidden function and its enciphering hiding method
CN101257681A (en) * 2008-03-26 2008-09-03 宇龙计算机通信科技(深圳)有限公司 Private data protecting equipment, mobile terminal, private data memory and read method

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102542210A (en) * 2010-12-31 2012-07-04 富泰华工业(深圳)有限公司 Electronic device and method for managing file permissions
WO2012151975A1 (en) * 2011-07-18 2012-11-15 中兴通讯股份有限公司 Method and device for concealing terminal information
CN102271332B (en) * 2011-07-18 2017-09-12 中兴通讯股份有限公司 End message time slot scrambling and device
CN102271332A (en) * 2011-07-18 2011-12-07 中兴通讯股份有限公司 Method and device for maintaining secrecy of terminal information
CN103377332B (en) * 2012-04-26 2016-04-20 腾讯科技(深圳)有限公司 The method of access application and device
CN103377332A (en) * 2012-04-26 2013-10-30 腾讯科技(深圳)有限公司 Application program accessing method and device
CN103455737A (en) * 2012-05-28 2013-12-18 百度在线网络技术(北京)有限公司 User information protection method and device
CN104620249A (en) * 2012-07-12 2015-05-13 罗文有限公司 Password authentication system and password authentication method using consecutive password authentication
US9350546B2 (en) 2012-07-20 2016-05-24 Tencent Technology (Shenzhen) Company Limited Method and system to decrypt private contents
WO2014012515A1 (en) * 2012-07-20 2014-01-23 Tencent Technology (Shenzhen) Company Limited Method and system to decrypt private contents
CN104134046A (en) * 2014-07-29 2014-11-05 深圳市中兴移动通信有限公司 Encryption method and device
CN106209896A (en) * 2016-07-29 2016-12-07 网宿科技股份有限公司 Streaming media encryption method based on audio frequency and video form and module
CN106209896B (en) * 2016-07-29 2020-02-18 网宿科技股份有限公司 Streaming media encryption method and module based on audio and video formats
CN111385656A (en) * 2020-03-04 2020-07-07 四川长虹电器股份有限公司 Authority management and control method for program file imported by outdoor electronic advertising machine

Also Published As

Publication number Publication date
WO2012006830A1 (en) 2012-01-19

Similar Documents

Publication Publication Date Title
CN101895396A (en) Mobile terminal and encryption method thereof
US10237247B2 (en) User interface systems and methods for secure message oriented communications
JP4866863B2 (en) Security code generation method and user device
CN102196422B (en) Method for preventing leakage of lost file of handheld communication terminal
CN102781001A (en) Method for encrypting built-in file of mobile terminal and mobile terminal
CN104205891A (en) Virtual sim card cloud platform
CN105812332A (en) Data protection method
US8819415B2 (en) Method and device for authenticating personal network entity
CN108512987A (en) Mobile communication equipment
CN104412273A (en) Method and system for activation
CN109639702A (en) A kind of data communications method, system and electronic equipment and storage medium
CN106992851A (en) TrustZone-based database file password encryption and decryption method and device and terminal equipment
CN105653986A (en) Micro SD card-based data protection method and device
EP3511853A1 (en) Security authentication method, integrated circuit and system
CN103186720A (en) Digital rights management method, equipment and system
CN103188219A (en) Method, equipment and system for digital right management
CN1612522B (en) Challenge-based authentication without requiring knowledge of secret authentication data
US20110170689A1 (en) Terminal and method for processing encrypted message
CN105634884A (en) Control instruction writing method, intelligent home control method and related device
CN105656870A (en) Data transmission method, device and system
CN101754209A (en) Method for protecting contents of mobile phone
CN104753679A (en) User authentication method and system as well as intelligent wearing equipment
CN105827403B (en) Security method, security gate and server
CN103107881A (en) Access method, device and system of smart card
WO2015124798A2 (en) Method & system for enabling authenticated operation of a data processing device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20101124