CN102769699A - Method and system for encrypting cell phone information - Google Patents

Method and system for encrypting cell phone information Download PDF

Info

Publication number
CN102769699A
CN102769699A CN2012102320109A CN201210232010A CN102769699A CN 102769699 A CN102769699 A CN 102769699A CN 2012102320109 A CN2012102320109 A CN 2012102320109A CN 201210232010 A CN201210232010 A CN 201210232010A CN 102769699 A CN102769699 A CN 102769699A
Authority
CN
China
Prior art keywords
card
encryption
information
contact person
groove
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012102320109A
Other languages
Chinese (zh)
Inventor
叶佥昱
禄鹏
李海强
耿炎
金坦
李霞
侯志杰
许明
杜俊蛟
滕达
李炜
孙维超
闫少晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SURFING TELECOM TERMINAL CO Ltd
Original Assignee
SURFING TELECOM TERMINAL CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SURFING TELECOM TERMINAL CO Ltd filed Critical SURFING TELECOM TERMINAL CO Ltd
Priority to CN2012102320109A priority Critical patent/CN102769699A/en
Publication of CN102769699A publication Critical patent/CN102769699A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and a system for encrypting cell phone information, and relates to the field of information encryption. The method comprises the steps as follows: S100, reading marking information of the current ID card of a cell phone, judging whether the marking information is matched with a target ID card or not, if so, executing a step S400, otherwise, executing a step S200; S200, selecting corresponding contacts of the current ID card as encryption contacts according to user input, and encrypting relative information on the encryption contacts; S300, recording the encryption contacts of the current ID card, marking the target ID card as the current ID card, marking the marking information as the marking information of the target ID card, and finishing the process; and S400, encrypting relative information on the encryption contacts of the target ID card. The method and the system disclosed by the invention mark the ID card or a card slot, execute clustering unified encryption process aiming at the ID characteristics of users, effectively simplify encryption operation and facilitate the users.

Description

A kind of cellphone information encryption method and system
Technical field
The present invention relates to the information encryption field, particularly a kind of cellphone information encryption method and system.
Background technology
The encryption mechanism of cellphone information is based on single clauses and subclauses or information more at present, and the mechanism that the information of a certain class or a certain memory location is handled is not arranged.Because social development, social classification and complexity progressively increase, and people are in different role transforming periods in the life of every day, for the encryption and the secret characteristic that also demonstrates different classification along with these roles' conversion of user mobile phone information.
Universal day by day along with mobile phone products; More high-end user all carries many mobile subscriber identifier cards; Such as UIM (User Identity Module, subscriber identification module) card or SIM (Subscriber Identity Module) card, the files such as associated person information that different cards is preserved corresponding user different role in society; Because role's difference, these information also exist different secret needs.Because current cellphone information encryption mechanism; Mainly be to carry out safe and secret processing for the characteristic of part clauses and subclauses or partial information; Do not have with some relevant hardware mechanisms of individual and combine; Do not carry out the Unified Treatment of clusterization to user's identity characteristics yet, the migration of its safe and secret mechanism and duplicate all more complicated, there is inconvenience in use.
Summary of the invention
The technical problem that (one) will solve
The technical problem that the present invention will solve is: how a kind of cellphone information encryption method and system are provided, to simplify cryptographic operation, are user-friendly to.
(2) technical scheme
For solving the problems of the technologies described above, the present invention provides a kind of cellphone information encryption method, and it comprises step:
S100: read the beacon information of the fooled preceding ID card of mobile phone, judge whether said beacon information is complementary with the target identities card, if, execution in step S400; Otherwise, execution in step S200;
S200: import the respective contacts of selecting on the current ID card according to the user and be the encryption contact person, said encryption contact person's relevant information is encrypted;
S300: write down the encryption contact person of current ID card, current ID card note is made the target identities card, and said beacon information is remembered the beacon information of making the target identities card, process ends;
S400: the relevant information to the encryption contact person of target identities card is encrypted.
Wherein, said ID card is SIM or UIM card.
Wherein, said beacon information is ICCID sign indicating number or UIMID sign indicating number.
Wherein, said step S200 specifically comprises step:
S210:, select the part contact person on the current ID card or all get in touch the artificial contact person of encryption, and password is set according to user's input;
S220: the relevant information to said encryption contact person is encrypted.
Wherein, among the said step S220, said encryption contact person's relevant information comprises, contact method, communications records and/or calendar information that said encryption contact person is correlated with.
Wherein, among the said step S220, said encryption contact person's relevant information is positioned on mobile phone and/or the current ID card.
Wherein, after said step S220, also comprise step:
S230: receive the password of user's input, show said encryption contact person's relevant information.
Wherein, after said step S230, also comprise step:
S240: according to user input, reselect part contact person or whole artificial contact persons of encryption of contact on the current ID card, the encryption contact person's that reselects relevant information is encrypted.
The present invention also provides a kind of cellphone information encryption system, and it comprises:
Card reader, the beacon information of ID card before being suitable for reading mobile phone and being taken in;
Judging unit is suitable for judging whether said beacon information is complementary with the target identities card;
Input unit is suitable for when said beacon information is not complementary with the target identities card, and receiving user's input serves as to encrypt the contact person to select the respective contacts on the current ID card;
Ciphering unit; Be suitable for when said beacon information is not complementary with the target identities card; Relevant information to the encryption contact person of current ID card is encrypted, and when said beacon information and target identities card are complementary, and the encryption contact person's of target identities card relevant information is encrypted;
Memory is suitable for writing down the encryption contact person of current ID card, and current ID card note is made the target identities card, and said beacon information note is made the beacon information of target identities card.
Wherein, said judging unit and said ciphering unit all adopt processor.
Wherein, said ID card is SIM or UIM card.
Wherein, said beacon information is ICCID sign indicating number or UIMID sign indicating number.
Wherein, said input unit adopts touch-screen or keyboard.
Wherein, said encryption contact person's relevant information comprises, contact method, communications records and/or calendar information that said encryption contact person is correlated with.
Wherein, said encryption contact person's relevant information is positioned on mobile phone and/or the current ID card.
The present invention also provides a kind of cellphone information encryption method, and it comprises step:
P100: ID card is inserted predetermined draw-in groove, judge whether said predetermined draw-in groove is to encrypt draw-in groove, if, execution in step P300; Otherwise, execution in step P200;
P200: according to user's input, All Contacts's on the ID card relevant information is encrypted, and said predetermined draw-in groove note is made to encrypt draw-in groove, process ends;
P300: the relevant information to All Contacts on the ID card is encrypted.
Wherein, said step P200 specifically comprises step:
P210:, All Contacts's on the ID card contact method, communications records and/or calendar information are encrypted, and corresponding password is set according to user's input;
P220: said predetermined draw-in groove note is made to encrypt draw-in groove, process ends.
Wherein, in the said step that also comprises after said predetermined draw-in groove note is done to encrypt draw-in groove:
P230: receive the password of user's input, show All Contacts's on the said ID card contact method, communications records and/or calendar information, process ends.
Wherein, at the password of said reception user input, show that All Contacts's on the said ID card contact method, communications records and/or calendar information also comprises step afterwards:
P240: according to user's input, cancellation is encrypted All Contacts's on the ID card relevant information, and said predetermined draw-in groove note is made non-encrypted draw-in groove, process ends.
The present invention also provides a kind of cellphone information encryption system, and it comprises:
Draw-in groove is suitable for the clamping ID card;
Judging unit is suitable for judging whether said draw-in groove is to encrypt draw-in groove;
Input unit, being suitable at said draw-in groove is not when encrypting draw-in groove, receives user's input;
Ciphering unit is suitable for All Contacts's on the said ID card relevant information is encrypted;
Memory is suitable for according to user's input said draw-in groove note being done to encrypt draw-in groove and write down corresponding password.
Wherein, said system also comprises: display unit.
Said input unit also is suitable for receiving the password that the user imports;
Said display unit is suitable for the password according to user's input, shows All Contacts's on the said ID card relevant information.
(3) beneficial effect
Cellphone information encryption method of the present invention and system carry out mark to ID card or draw-in groove, carry out the unified encryption of clusterization to user's identity characteristics, effectively simplify cryptographic operation, and be convenient for users.
Description of drawings
Fig. 1 is the embodiment of the invention one a said cellphone information encryption method flow chart;
Fig. 2 is the modular structure sketch map of the embodiment of the invention one said cellphone information encryption system;
Fig. 3 is the embodiment of the invention two said cellphone information encryption method flow charts;
Fig. 4 is the modular structure sketch map of the embodiment of the invention two said cellphone information encryption systems.
Embodiment
Below in conjunction with accompanying drawing and embodiment, specific embodiments of the invention describes in further detail.Following examples are suitable for explaining the present invention, but are not used for limiting scope of the present invention.
Embodiment 1
Fig. 1 is the embodiment of the invention one a said cellphone information encryption method flow chart, and as shown in Figure 1, said method comprises step:
S100: read the beacon information of the fooled preceding ID card of mobile phone, judge whether said beacon information is complementary with the target identities card, if, execution in step S400; Otherwise, execution in step S200.
Wherein, said ID card is SIM or UIM card.Said beacon information is ICCID (Integrate circuit card identity, integrated circuit card identification code) sign indicating number or UIMID (a kind of integrated circuit card identification code) sign indicating number.
S200: import the respective contacts of selecting on the current ID card according to the user and be the encryption contact person, said encryption contact person's relevant information is encrypted.
Said step S200 specifically comprises step:
S210:, select the part contact person on the current ID card or all get in touch the artificial contact person of encryption, and password is set according to user's input.
S220: the relevant information to said encryption contact person is encrypted.
Among the said step S220, said encryption contact person's relevant information comprises, contact method, communications records and/or calendar information that said encryption contact person is correlated with.Among the said step S220, said encryption contact person's relevant information is positioned on mobile phone and/or the current ID card.
After said step S220, can also comprise step:
S230: receive the password of user's input, show said encryption contact person's relevant information.
After said step S230, can also comprise step:
S240: according to user input, reselect part contact person or whole artificial contact persons of encryption of contact on the current ID card, the encryption contact person's that reselects relevant information is encrypted.
S300: write down the encryption contact person of current ID card, current ID card note is made the target identities card, and said beacon information is remembered the beacon information of making the target identities card, process ends.
S400: the relevant information to the encryption contact person of target identities card is encrypted.
Fig. 2 is the modular structure sketch map of the embodiment of the invention one said cellphone information encryption system, and is as shown in Figure 2, and said system comprises:
Card reader 110, the beacon information of ID card before being suitable for reading mobile phone and being taken in.Said ID card is SIM or UIM card.Said beacon information is ICCID sign indicating number or UIMID sign indicating number.
Judging unit 120 is suitable for judging whether said beacon information is complementary with the target identities card.Said judging unit 120 adopts a processor, and whether mainly the beacon information through the target identities card stored in beacon information that said card reader 110 is read and the memory 150 compares, be complementary with the target identities card to judge said beacon information.
Input unit 130 is suitable for when said beacon information is not complementary with the target identities card, and receiving user's input serves as to encrypt the contact person to select the respective contacts on the current ID card.Said input unit 130 also is suitable for when said beacon information is not complementary with the target identities card, receives user's input generating corresponding password, and is stored in the memory 150.Simultaneously; Said input unit 130 also is suitable for when said beacon information and target identities card are complementary; Receive the corresponding password of user's input; So that the user gets into decryption interface, and then the part contact person who reselects on the current ID card according to user's input perhaps all gets in touch the artificial contact person of encryption.
Said input unit generally adopts touch-screen or keyboard.
Ciphering unit 140; Be suitable for when said beacon information is not complementary with the target identities card; Relevant information to the encryption contact person of current ID card is encrypted, and when said beacon information and target identities card are complementary, and the encryption contact person's of target identities card relevant information is encrypted.Simultaneously, the encryption contact person's on the said ciphering unit 140 current ID card that also is suitable for the user is reselected modification information is encrypted.
Said encryption contact person's relevant information comprises, contact method, communications records and/or calendar information that said encryption contact person is correlated with.Said encryption contact person's relevant information is positioned on mobile phone and/or the current ID card.Said ciphering unit 140 also adopts a processor, perhaps with said judging unit 120 shared processors.
Memory 150 is suitable for writing down the encryption contact person of current ID card, and current ID card note is made the target identities card, and said beacon information note is made the beacon information of target identities card.
Embodiment 2
Fig. 3 is the embodiment of the invention two said cellphone information encryption method flow charts, and as shown in Figure 3, said method comprises step:
P100: ID card is inserted predetermined draw-in groove, judge whether said predetermined draw-in groove is to encrypt draw-in groove, if, execution in step P300; Otherwise, execution in step P200.
P200: according to user's input, All Contacts's on the ID card relevant information is encrypted, and said predetermined draw-in groove note is made to encrypt draw-in groove, process ends.
Said step P200 specifically comprises step:
P210:, All Contacts's on the ID card contact method, communications records and/or calendar information are encrypted, and corresponding password is set according to user's input.
P220: said predetermined draw-in groove note is made to encrypt draw-in groove, process ends.
Said said predetermined draw-in groove note is done can also comprise step after the encryption draw-in groove:
P230: receive the password of user's input, show All Contacts's on the said ID card contact method, communications records and/or calendar information, process ends.
At the password of said reception user input, show that All Contacts's on the said ID card contact method, communications records and/or calendar information can also comprise step afterwards:
P240: according to user's input, cancellation is encrypted All Contacts's on the ID card relevant information, and said predetermined draw-in groove note is made non-encrypted draw-in groove, process ends.
P300: the relevant information to All Contacts on the ID card is encrypted.
Fig. 4 is the modular structure sketch map of the embodiment of the invention two said cellphone information encryption systems, and is of Fig. 4, and said system comprises:
Draw-in groove 210 is suitable for the clamping ID card.Mobile phone described in the present embodiment generally has at least two draw-in grooves, and each said draw-in groove 210 should have a unique numbering.
Judging unit 220 is suitable for judging whether said draw-in groove 210 is to encrypt draw-in groove.Said judging unit 220 adopts a processor, is used for the numbering consults memory 150 according to said draw-in groove 210, and then judges whether it is to encrypt draw-in groove.
Input unit 230, being suitable at said draw-in groove is not when encrypting draw-in groove, receives user's input.Said input unit 230 general keyboard or the touch-screens of adopting.
Ciphering unit 240 is suitable for All Contacts's on the said ID card relevant information is encrypted.Said ciphering unit 240 can adopt a separate processor or with said judging unit 220 shared processors.
Memory 250 is suitable for according to user's input said draw-in groove 210 notes being done to encrypt draw-in groove and write down corresponding password.The said draw-in groove 210 of present embodiment has two states: encrypted state and non-encrypted state, can use the one token encrypted state, and with the non-encrypted state of " 0 " mark, and then realize state storage to said draw-in groove 210.
Said system also comprises: the display unit (not shown).
Said input unit also is suitable for receiving the password that the user imports.
Said display unit is suitable for the password according to user's input, shows All Contacts's on the said ID card relevant information.Said display unit generally adopt liquid crystal display screen or with said input unit 230 shared touch-screens.
Said cellphone information encryption method of the embodiment of the invention and system carry out mark to ID card or draw-in groove, carry out the unified encryption of clusterization to user's identity characteristics, effectively simplify cryptographic operation, and be convenient for users.
Above execution mode only is suitable for explaining the present invention; And be not limitation of the present invention; The those of ordinary skill in relevant technologies field under the situation that does not break away from the spirit and scope of the present invention, can also be made various variations and modification; Therefore all technical schemes that are equal to also belong to category of the present invention, and scope of patent protection of the present invention should be defined by the claims.

Claims (21)

1. a cellphone information encryption method is characterized in that, comprises step:
S100: read the beacon information of the fooled preceding ID card of mobile phone, judge whether said beacon information is complementary with the target identities card, if, execution in step S400; Otherwise, execution in step S200;
S200: import the respective contacts of selecting on the current ID card according to the user and be the encryption contact person, said encryption contact person's relevant information is encrypted;
S300: write down the encryption contact person of current ID card, current ID card note is made the target identities card, and said beacon information is remembered the beacon information of making the target identities card, process ends;
S400: the relevant information to the encryption contact person of target identities card is encrypted.
2. the method for claim 1 is characterized in that, said ID card is SIM or UIM card.
3. the method for claim 1 is characterized in that, said beacon information is ICCID sign indicating number or UIMID sign indicating number.
4. the method for claim 1 is characterized in that, said step S200 specifically comprises step:
S210:, select the part contact person on the current ID card or all get in touch the artificial contact person of encryption, and password is set according to user's input;
S220: the relevant information to said encryption contact person is encrypted.
5. method as claimed in claim 4 is characterized in that, among the said step S220, said encryption contact person's relevant information comprises, contact method, communications records and/or calendar information that said encryption contact person is correlated with.
6. method as claimed in claim 4 is characterized in that, among the said step S220, said encryption contact person's relevant information is positioned on mobile phone and/or the current ID card.
7. method as claimed in claim 4 is characterized in that, after said step S220, also comprises step:
S230: receive the password of user's input, show said encryption contact person's relevant information.
8. the method for claim 1 is characterized in that, after said step S230, also comprises step:
S240: according to user input, reselect part contact person or whole artificial contact persons of encryption of contact on the current ID card, the encryption contact person's that reselects relevant information is encrypted.
9. a cellphone information encryption system is characterized in that, comprising:
Card reader, the beacon information of ID card before being suitable for reading mobile phone and being taken in;
Judging unit is suitable for judging whether said beacon information is complementary with the target identities card;
Input unit is suitable for when said beacon information is not complementary with the target identities card, and receiving user's input serves as to encrypt the contact person to select the respective contacts on the current ID card;
Ciphering unit; Be suitable for when said beacon information is not complementary with the target identities card; Relevant information to the encryption contact person of current ID card is encrypted, and when said beacon information and target identities card are complementary, and the encryption contact person's of target identities card relevant information is encrypted;
Memory is suitable for writing down the encryption contact person of current ID card, and current ID card note is made the target identities card, and said beacon information note is made the beacon information of target identities card.
10. system as claimed in claim 9 is characterized in that, said judging unit and said ciphering unit all adopt processor.
11. system as claimed in claim 9 is characterized in that, said ID card is SIM or UIM card.
12. system as claimed in claim 9 is characterized in that, said beacon information is ICCID sign indicating number or UIMID sign indicating number.
13. system as claimed in claim 9 is characterized in that, said input unit adopts touch-screen or keyboard.
14. system as claimed in claim 9 is characterized in that, said encryption contact person's relevant information comprises, contact method, communications records and/or calendar information that said encryption contact person is correlated with.
15. system as claimed in claim 9 is characterized in that, said encryption contact person's relevant information is positioned on mobile phone and/or the current ID card.
16. a cellphone information encryption method is characterized in that, comprises step:
P100: ID card is inserted predetermined draw-in groove, judge whether said predetermined draw-in groove is to encrypt draw-in groove, if, execution in step P300; Otherwise, execution in step P200;
P200: according to user's input, All Contacts's on the ID card relevant information is encrypted, and said predetermined draw-in groove note is made to encrypt draw-in groove, process ends;
P300: the relevant information to All Contacts on the ID card is encrypted.
17. method as claimed in claim 16 is characterized in that, said step P200 specifically comprises step:
P210:, All Contacts's on the ID card contact method, communications records and/or calendar information are encrypted, and corresponding password is set according to user's input;
P220: said predetermined draw-in groove note is made to encrypt draw-in groove, process ends.
18. method as claimed in claim 17 is characterized in that, in the said step that also comprises after said predetermined draw-in groove note is done to encrypt draw-in groove:
P230: receive the password of user's input, show All Contacts's on the said ID card contact method, communications records and/or calendar information, process ends.
19. method as claimed in claim 18 is characterized in that, at the password of said reception user input, shows that All Contacts's on the said ID card contact method, communications records and/or calendar information also comprises step afterwards:
P240: according to user's input, cancellation is encrypted All Contacts's on the ID card relevant information, and said predetermined draw-in groove note is made non-encrypted draw-in groove, process ends.
20. a cellphone information encryption system is characterized in that, comprising:
Draw-in groove is suitable for the clamping ID card;
Judging unit is suitable for judging whether said draw-in groove is to encrypt draw-in groove;
Input unit, being suitable at said draw-in groove is not when encrypting draw-in groove, receives user's input;
Ciphering unit is suitable for All Contacts's on the said ID card relevant information is encrypted;
Memory is suitable for according to user's input said draw-in groove note being done to encrypt draw-in groove and write down corresponding password.
21. system as claimed in claim 20 is characterized in that, said system also comprises: display unit.
Said input unit also is suitable for receiving the password that the user imports;
Said display unit is suitable for the password according to user's input, shows All Contacts's on the said ID card relevant information.
CN2012102320109A 2012-07-05 2012-07-05 Method and system for encrypting cell phone information Pending CN102769699A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012102320109A CN102769699A (en) 2012-07-05 2012-07-05 Method and system for encrypting cell phone information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012102320109A CN102769699A (en) 2012-07-05 2012-07-05 Method and system for encrypting cell phone information

Publications (1)

Publication Number Publication Date
CN102769699A true CN102769699A (en) 2012-11-07

Family

ID=47096946

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012102320109A Pending CN102769699A (en) 2012-07-05 2012-07-05 Method and system for encrypting cell phone information

Country Status (1)

Country Link
CN (1) CN102769699A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103902920A (en) * 2012-12-27 2014-07-02 联想(北京)有限公司 Information processing method and electronic device
CN104768148A (en) * 2015-03-11 2015-07-08 浙江翼信科技有限公司 Message encryption method and device
CN106231141A (en) * 2016-09-30 2016-12-14 珠海市魅族科技有限公司 A kind of information processing method and terminal thereof
WO2018095045A1 (en) * 2016-11-22 2018-05-31 北京金山安全软件有限公司 Method and apparatus for processing information, and electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227683A (en) * 2008-01-28 2008-07-23 宇龙计算机通信科技(深圳)有限公司 Mobile terminal, system and method for securing data information
CN101282534A (en) * 2008-05-26 2008-10-08 宇龙计算机通信科技(深圳)有限公司 Method and system for secrecy of multimode mobile communication terminal data as well as mobile terminal
CN101790161A (en) * 2009-12-30 2010-07-28 宇龙计算机通信科技(深圳)有限公司 Mobile terminal, method for acquiring private data of mobile terminal and system therefor
CN101795328A (en) * 2010-04-13 2010-08-04 中兴通讯股份有限公司 Set-card separation mobile phone and method for realizing card initialization
CN202679465U (en) * 2012-07-05 2013-01-16 天翼电信终端有限公司 Mobile phone information encrypting apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227683A (en) * 2008-01-28 2008-07-23 宇龙计算机通信科技(深圳)有限公司 Mobile terminal, system and method for securing data information
CN101282534A (en) * 2008-05-26 2008-10-08 宇龙计算机通信科技(深圳)有限公司 Method and system for secrecy of multimode mobile communication terminal data as well as mobile terminal
CN101790161A (en) * 2009-12-30 2010-07-28 宇龙计算机通信科技(深圳)有限公司 Mobile terminal, method for acquiring private data of mobile terminal and system therefor
CN101795328A (en) * 2010-04-13 2010-08-04 中兴通讯股份有限公司 Set-card separation mobile phone and method for realizing card initialization
CN202679465U (en) * 2012-07-05 2013-01-16 天翼电信终端有限公司 Mobile phone information encrypting apparatus

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103902920A (en) * 2012-12-27 2014-07-02 联想(北京)有限公司 Information processing method and electronic device
CN104768148A (en) * 2015-03-11 2015-07-08 浙江翼信科技有限公司 Message encryption method and device
CN104768148B (en) * 2015-03-11 2019-01-18 浙江翼信科技有限公司 A kind of message encryption method and device
CN106231141A (en) * 2016-09-30 2016-12-14 珠海市魅族科技有限公司 A kind of information processing method and terminal thereof
WO2018095045A1 (en) * 2016-11-22 2018-05-31 北京金山安全软件有限公司 Method and apparatus for processing information, and electronic device

Similar Documents

Publication Publication Date Title
Cai et al. On the practicality of motion based keystroke inference attack
Shi et al. Implicit authentication through learning user behavior
Jansen Authenticating users on handheld devices
US8477940B2 (en) Symmetric cryptography with user authentication
US11580208B2 (en) System and method for PIN entry on mobile devices
CN105005731A (en) Data encryption and decryption methods and mobile terminal
CN103366107A (en) Method, device and mobile phone for protecting access permission of application program
CN103488940A (en) Password protection system and method for application programs of intelligent equipment
EP2740065A1 (en) Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device
CN102497465A (en) High-secrecy mobile information safety system and safety method for distributed secret keys
KR20100016579A (en) System and method for distribution of credentials
JP2015502719A (en) Mobile terminal and identification method of user identity
US20180034799A1 (en) Method of pushing passwords, pushing system and terminal device
CN102984698A (en) Near field communication safety protection method and mobile communication terminal
EP2891291A1 (en) Pluggable authentication mechanism for mobile device applications
CN104992120A (en) Picture encryption method and mobile terminal
EP2060100A1 (en) Differentiated access to a data item store
CN105069365A (en) Data processing method and mobile terminal
CN102769699A (en) Method and system for encrypting cell phone information
CN105809000A (en) Information processing method and electronic device
CN102867157A (en) Mobile terminal and data protecting method
CN101877195A (en) Password protection method
Singh et al. Smart card ID: an evolving and viable technology
CN204069000U (en) Mobile encrypted authenticate device
CN201150069Y (en) Information safety equipment supporting multiple identification authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20121107