CN103634313B - Address list processing method and device, as well as mobile terminal - Google Patents

Address list processing method and device, as well as mobile terminal Download PDF

Info

Publication number
CN103634313B
CN103634313B CN201310617111.2A CN201310617111A CN103634313B CN 103634313 B CN103634313 B CN 103634313B CN 201310617111 A CN201310617111 A CN 201310617111A CN 103634313 B CN103634313 B CN 103634313B
Authority
CN
China
Prior art keywords
information
ciphertext
address list
reading
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310617111.2A
Other languages
Chinese (zh)
Other versions
CN103634313A (en
Inventor
李翔宇
张潇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Institute of Advanced Technology of CAS
Original Assignee
Shenzhen Institute of Advanced Technology of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Institute of Advanced Technology of CAS filed Critical Shenzhen Institute of Advanced Technology of CAS
Priority to CN201310617111.2A priority Critical patent/CN103634313B/en
Publication of CN103634313A publication Critical patent/CN103634313A/en
Application granted granted Critical
Publication of CN103634313B publication Critical patent/CN103634313B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention is suitable for the technical field of communication, and provides an address list processing method and device, as well as a mobile terminal. The method comprises the steps of reading information in an address list one by one; respectively encrypting each read information one by one and generating corresponding ciphertexts one by one; uploading the generated ciphertexts to a server one by one or together. According to the address list processing method and device, as well as the mobile terminal, provided by the invention, the information in the address list is encrypted one by one to generate the ciphertexts, so that the address list data of a user can be effectively protected, data safety is increased, and the condition that someone else obtains the address list and then uses the relationship network of the user to swindle and the like can be effectively prevented.

Description

A kind of processing method of address list, device and mobile terminal
Technical field
The invention belongs to communication technical field, more particularly to a kind of processing method of address list, device and mobile terminal.
Background technology
As the development of network technology and the popularization of mobile phone are used, dependence of the people to network is more and more stronger.Each user There is the address list of oneself, it is many for the complicated user communication record entry of network of personal connections, there are many websites or application to be supplied to Cellphone subscriber backs up the service of address list.The process of backup address list is cellphone subscriber, and upload to the address list file of storage should With the server being located, server preserves these information for user, when user needs to give address list for change again, can be to the clothes Business device is downloaded, and recovers address list.What user uploaded is the plaintext version of address list, and the information such as name and phone is all visible true Real information, these information belong to the privacy information of user, and for a user, address list is exactly the symbol of network of personal connections, is One indispensable resource.Once these information leakages, it is possible to cause others using the network of personal connections of user, or generation one The illegal activities such as a little swindles.
In sum, it is dangerous on address list is uploaded onto the server with plaintext version in prior art.
The content of the invention
The purpose of the embodiment of the present invention is to provide a kind of processing method of address list, it is intended to solve to be communicated in prior art On record is uploaded onto the server with plaintext version, unsafe problem.
The embodiment of the present invention is achieved in that a kind of processing method of address list, and methods described includes:
The information in address list is read one by one;
By the information for reading one by one encryption and one by one one corresponding ciphertext of generation respectively one by one;
The ciphertext of generation is uploaded onto the server one by one or together.
The embodiment of the present invention additionally provides a kind of processing meanss of address list, and described device includes:
Reading unit, for reading the information in address list one by one;
Ciphering unit, for the information for reading one by one to be encrypted respectively one by one and generated one by one a corresponding ciphertext;
Uploading unit, for the ciphertext of generation to be uploaded onto the server one by one or together.
The embodiment of the present invention additionally provides a kind of mobile terminal, and the mobile terminal includes above-mentioned device.
Compared with prior art, beneficial effect is the embodiment of the present invention:By encrypting generation ciphertext one by one to address list, Can effective protection user address book data, increase the safety of data, can effectively prevent other people from obtaining after address list profit Carry out the activity such as swindling with the network of personal connections of user.
Description of the drawings
Fig. 1 is a kind of flow chart of the processing method of address list provided in an embodiment of the present invention;
Fig. 2 is a kind of the first logical construction schematic diagram of the processing meanss of address list provided in an embodiment of the present invention;
Fig. 3 is a kind of the second logical construction schematic diagram of the processing meanss of address list provided in an embodiment of the present invention;
Fig. 4 is a kind of the 3rd logical construction schematic diagram of the processing meanss of address list provided in an embodiment of the present invention.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the present invention, and It is not used in the restriction present invention.
Embodiment provided in an embodiment of the present invention is as follows:
Fig. 1 is referred to, the invention provides a kind of processing method of address list, methods described includes:
101st, the information in address list is read one by one.
In the present embodiment, described information is the information that each field is included.
In " address list " database of mobile terminal, " row " of table are referred to as " field ", and each field includes a certain special topic Information.These are all the total attributes of all rows in " address list " table for such as " name ", " telephone number ", and these row are referred to as " name " field and " telephone number " field.
102nd, by the information for reading one by one encryption and one by one one corresponding ciphertext of generation respectively one by one.
In the present embodiment, by the way that the information for reading is encrypted respectively into one ciphertext of generation, it is secret that each ciphertext is adopted Key is different, the difficulty for cracking more is increased, so as to strengthen the security of address book data.
In the present embodiment, the form of ciphertext is identical with the form of address list in mobile terminal.If ciphertext communication is recorded Form and differed originally, be likely to result in upload failure, so as to user cannot back up the address list of oneself.
In the present embodiment, it is encrypted by the method for symmetric cryptography.
Using the encryption method of one-key cryptosystem, same key can simultaneously be used as the encryption and decryption of information, this Plant encryption method and be referred to as symmetric cryptography, also referred to as secret key cryptography.Need to calculate using the encryption of same key encrypting and decrypting Method.Because its speed is fast, symmetry encryption is generally used when message sender needs and encrypts mass data.Symmetry is encrypted Referred to as key encryption.It is so-called symmetrical, exactly it is encrypted with same key using both sides' occupation mode of this encryption method And decryption.Key is control encryption and the instruction of decrypting process.Algorithm is one group regular, it is stipulated that how to be encrypted and decrypted.
The method of the symmetric cryptography employed in the present embodiment is specially DEA, AES, DES or 3DES.It is preferred that 3DES is adopted, Security performance more preferably, and operates that calculating process is simple, efficiency high.
3DES in the present embodiment, also known as Triple DES, is a kind of pattern of des encryption algorithm, and it uses 3 56 Data key carry out Tertiary infilling.Data encryption standards(DES)It is a kind of long-standing encryption standard in the U.S., it makes With symmetric key cryptography, and in 1981 by ANSI organizational norms be ANSI X.3.92.DES uses 56 keys and password The method of block, and in the method for cryptographic block, text is divided into the text block of 64 sizes and then is encrypted again.Compared with initial DES, 3DES is safer.
It is described by the information for reading one by one encryption and one by one one corresponding ciphertext of generation respectively one by one in the present embodiment The step of be specially:
The information that each field for reading one by one is included is one by one respectively with the encryption side of DEA, AES, DES or 3DES A corresponding ciphertext is encrypted respectively and generated one by one to method.
103rd, the ciphertext of generation is uploaded onto the server one by one or together.
By by servers such as backup communications to high in the clouds in the present embodiment, can be when user loses address list or when user needs When wanting original backup file, can download from a server.
In the present embodiment, by encrypting generation ciphertext one by one to address list, can effective protection user address book data, increase Plus the safety of data, can effectively prevent other people from obtaining after address list carries out the activity such as swindling using the network of personal connections of user.
In one embodiment of the present of invention, it is described one by one read address list in information the step of after also include:
Create information, code name corresponding relation list that name field is included;
It is described by the information for reading one by one one by one respectively encryption and one by one generation one corresponding ciphertext the step of after Also include:
By the ciphertext for generating according to the corresponding relation in the list, with code name name;
The step of ciphertext by generation uploads onto the server one by one or together is specially:
The ciphertext that code name is named is uploaded onto the server one by one or together.
For example, the information in the name field in address list include Zhang San, Li Si and king five, code name can correspond to be set to A, B, C, the list of establishment is exactly Zhang San, Li Si and king five difference corresponding A, the list of B, C, and the Zhang San's information for reading is encrypted into institute The ciphertext name nominating of generation is " A ", and on the server the title " A " of ciphertext is visible, when the content of user communication record is more and When huge, when the address list of user is lost, when the situation is critical, when being badly in need of downloading the information such as Zhang San under a certain concrete name, The list stored according to mobile terminal local terminal is only needed to, the A found in server carries out timely download decryption, without the need for inciting somebody to action All ciphertexts that address list is stored one by one are all downloaded from server, all decryption, solve the matter of great urgency of user, are saved Plenty of time, greatly facilitate user.
Code name can be arranged arbitrarily as needed in the present embodiment, and such as 1,2,3, main purpose is distinguished in server end Come and do not reveal the specifying information in name field.
In the present embodiment, methods described also includes:
When download command is received, then the ciphertext is downloaded from the server;
The ciphertext of download is decrypted according to the key for being adopted during encryption, is reverted in plain text.
In the present embodiment, when downloading ciphertext, can one by one download, decrypt one by one, it is also possible to by all ciphertexts on server Download and then decrypt one by one.
In the present embodiment, in encryption process, the information of need for confidentiality is referred to as " plaintext ", the letter after encrypted process Breath is referred to as " ciphertext ".Encryption is the process that " plaintext " is changed into " ciphertext ";It is similar, " ciphertext " is changed into into the mistake of " plaintext " Journey is referred to as decryption.
In order to overall encryption method further below makes a distinction, aforesaid method can be referred to as encryption method one by one.This In bright one embodiment, methods described also includes:
When the overall encryption order of user is received, then the information in address list is read, by all information for reading It is overall to generate a ciphertext, the ciphertext of generation is uploaded onto the server.
In the present embodiment, when the download command of user is received, then the close of overall generation is downloaded from the server Text, is decrypted according to the key for being adopted during encryption, reverts in plain text.
In the present embodiment, by overall encryption method, mode is fast simple, but security performance do not have it is aforesaid one by one Encryption method effect is good.
In the present embodiment, it is encrypted by the method for symmetric cryptography.DEA, AES, DES or 3DES etc. can be specifically adopted, It is preferred that 3DES.
In one embodiment of the present of invention, two kinds of cipher modes can be also in the terminal provided, i.e., aforesaid entirety adds Decryption method and one by one encryption method, can in the terminal arrange select button, select for user, switch, and such as overall encryption is pressed Button, encrypts one by one button, when user in emergency circumstances, such as cell phone address book soon lost, not have electricity again, now can select Overall encryption is selected, quickly and easily.When user time is idle, it is also contemplated that safety high, preferable safe effect is more preferable The method encrypted one by one.Two ways is provided, flexibly selection is available for.
Fig. 2 is referred to, the embodiment of the present invention additionally provides a kind of processing meanss of address list, and described device includes:
Reading unit 201, for reading the information in address list one by one;
Ciphering unit 202, for by the information for reading one by one one by one respectively encryption and generate one by one one it is accordingly close Text;
Uploading unit 203, for the ciphertext of generation to be uploaded onto the server one by one or together.
In the present embodiment, described information is the information that each field is included.
In the present embodiment, the ciphering unit 202, specifically for the information for being included each field for reading one by one Encrypt with the encryption method of DEA, AES, DES or 3DES and generate one by one a corresponding ciphertext respectively respectively one by one.
Fig. 3 is referred to, in one embodiment of the present of invention, described device also includes:
List cell 301, for creating information, the code name corresponding relation list that name field is included;
Name unit 302, for the ciphertext that will generate according to the corresponding relation in the list, with code name name;
The uploading unit 203, the ciphertext specifically for code name is named uploads onto the server one by one or together.
Fig. 4 is referred to, in one embodiment of the present of invention, described device also includes:
Download unit 401, when download command is received, then downloads the ciphertext from the server;
Decryption unit 402, the ciphertext of download is decrypted according to the key for being adopted during encryption, is reverted in plain text.
In one embodiment of the present of invention, described device also includes:
Overall ciphering unit, for when the overall encryption order of user is received, then reading the information in address list, will The all information for reading integrally generate a ciphertext, and the ciphertext of generation is uploaded onto the server.
In the present embodiment, described device also includes:
Overall download unit, it is overall raw for when the download command of user is received, then downloading from the server Into ciphertext, be decrypted according to the key for being adopted during encryption, revert in plain text.
Device in the present embodiment, detail schema described in preceding method, will not be described here.
The embodiment of the present invention additionally provides a kind of mobile terminal, and the mobile terminal includes above-mentioned device.
The processing method of address list of the present invention, device and mobile terminal, from the data of protection user, by logical News record one by one encryption generate ciphertext, can effective protection user address book data, increase data safety, can effectively prevent it Other people obtain and carry out the activity such as swindling using the network of personal connections of user after address list.
Presently preferred embodiments of the present invention is the foregoing is only, not to limit the present invention, all essences in the present invention Any modification, equivalent and improvement made within god and principle etc., should be included within the scope of the present invention.

Claims (6)

1. a kind of processing method of address list, it is characterised in that methods described includes:
The information in address list is read one by one, and described information is the information that each field is included;
Create information, code name corresponding relation list that name field is included;
Judge the cipher mode of address list information, if cipher mode one by one, then respectively add the information for reading one by one one by one It is close and one by one generate a corresponding ciphertext;Wherein, the key that each ciphertext is adopted is different;By the ciphertext for generating according to described Corresponding relation in list, with code name name;
If overall cipher mode, then the information for reading integrally is encrypted into the corresponding ciphertext of one entirety of generation;
The ciphertext that the ciphertext of generation and code name are named is uploaded onto the server one by one or together.
2. the method for claim 1, it is characterised in that it is described by the information for reading one by one one by one respectively encryption and by The step of bar generates a corresponding ciphertext is specially:
The information that each field for reading one by one is included is one by one respectively with the encryption method point of DEA, AES, DES or 3DES A corresponding ciphertext and Jia Mi not be one by one generated.
3. the method as any one of claim 1 to 2, it is characterised in that methods described also includes:
When download command is received, then the ciphertext is downloaded from the server;
The ciphertext of download is decrypted according to the key for being adopted during encryption, is reverted in plain text.
4. a kind of processing meanss of address list, it is characterised in that described device includes:
Reading unit, for reading the information in address list one by one, described information is the information that each field is included;
List cell, for creating information, the code name corresponding relation list that name field is included;
Ciphering unit, for judging the cipher mode of address list information, if cipher mode one by one, then by the letter for reading one by one Breath encryption and one by one one corresponding ciphertext of generation respectively one by one;Wherein, the key that each ciphertext is adopted is different;By what is generated Ciphertext is named according to the corresponding relation in the list with code name;If overall cipher mode, then by the information entirety for reading The corresponding ciphertext of encryption one entirety of generation, then integrally encrypt the corresponding ciphertext of one entirety of generation by the information for reading;
Uploading unit, for the ciphertext that the ciphertext of generation and code name are named to be uploaded onto the server one by one or together.
5. device as claimed in claim 4, it is characterised in that the ciphering unit, specifically for every by what is read one by one The information that individual field is included is encrypted respectively with the encryption method of DEA, AES, DES or 3DES respectively one by one and generates one one by one Corresponding ciphertext.
6. a kind of mobile terminal, it is characterised in that the mobile terminal includes the device any one of claim 4 to 5.
CN201310617111.2A 2013-11-27 2013-11-27 Address list processing method and device, as well as mobile terminal Active CN103634313B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310617111.2A CN103634313B (en) 2013-11-27 2013-11-27 Address list processing method and device, as well as mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310617111.2A CN103634313B (en) 2013-11-27 2013-11-27 Address list processing method and device, as well as mobile terminal

Publications (2)

Publication Number Publication Date
CN103634313A CN103634313A (en) 2014-03-12
CN103634313B true CN103634313B (en) 2017-05-10

Family

ID=50214940

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310617111.2A Active CN103634313B (en) 2013-11-27 2013-11-27 Address list processing method and device, as well as mobile terminal

Country Status (1)

Country Link
CN (1) CN103634313B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105592191A (en) * 2014-10-22 2016-05-18 中兴通讯股份有限公司 Method and apparatus for storing private information of contact
CN108881383B (en) * 2018-05-07 2022-06-21 深圳壹账通智能科技有限公司 Address book data processing method and device, computer equipment and storage medium
CN114785533B (en) * 2021-01-20 2024-04-30 腾讯科技(深圳)有限公司 Address book data safety control method and device, electronic equipment and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102209152A (en) * 2011-06-14 2011-10-05 北京百纳威尔科技有限公司 Method and device for deleting short messages

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006358A (en) * 2010-11-02 2011-04-06 深圳市金立通信设备有限公司 Mobile phone private communication management system and method
CN102624683A (en) * 2011-06-30 2012-08-01 北京小米科技有限责任公司 Method for adding contact person
CN102497633A (en) * 2011-12-14 2012-06-13 华中科技大学 Protection method for private information in cellphones
CN102427581B (en) * 2011-12-30 2015-03-11 上海华勤通讯技术有限公司 Backup method, mobile terminal and backup system for contact person information
KR101978956B1 (en) * 2012-07-27 2019-05-16 엘지전자 주식회사 Mobile terminal
CN103281375B (en) * 2013-05-30 2016-02-17 腾讯科技(深圳)有限公司 A kind of contact management method of third-party application and device, system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102209152A (en) * 2011-06-14 2011-10-05 北京百纳威尔科技有限公司 Method and device for deleting short messages

Also Published As

Publication number Publication date
CN103634313A (en) 2014-03-12

Similar Documents

Publication Publication Date Title
CN101203025B (en) Method for transmitting and receiving safe mobile message
US8499156B2 (en) Method for implementing encryption and transmission of information and system thereof
Rayarikar et al. SMS encryption using AES algorithm on android
CN105323070B (en) A kind of safety E-mail implementation method based on digital envelope
CN105376261B (en) Encryption method and system for instant messaging message
CN101720071A (en) Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN107579903B (en) Picture message secure transmission method and system based on mobile device
CN103198261A (en) Method and system for protecting file content security
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN101374251B (en) Method for encrypting short message and used terminal equipment thereof
CN108390755B (en) Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip
CN102572750A (en) Method and terminal for protecting short messages
CN106549858A (en) A kind of instant messaging encryption method based on id password
CN105281897A (en) File encryption method and device and file decryption method and device
CN103634313B (en) Address list processing method and device, as well as mobile terminal
CN101854594A (en) Method and device for transmitting information and method and device for receiving information
CN112637230B (en) Instant messaging method and system
KR101760376B1 (en) Terminal and method for providing secure messenger service
CN101262340A (en) MMS encryption method and mobile terminal for transmitting and receiving encrypted MMS
CN103685239A (en) Real-time encryption and decryption system and real-time encryption and decryption method for mobile products
CN104243291A (en) Instant messaging method and system thereof capable of guaranteeing safety of user communication content
CN109726583A (en) Cloud data base encryption server system
CN201623859U (en) System for encrypting short messages through mobile phone terminal
CN103634276A (en) Privacy protection method for instant communication messages
Pushpa Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20140312

Assignee: Shenzhen Zhikong Yunhai Technology Co.,Ltd.

Assignor: SHENZHEN INSTITUTES OF ADVANCED TECHNOLOGY CHINESE ACADEMY OF SCIENCES

Contract record no.: X2023980043398

Denomination of invention: A processing method, device, and mobile terminal for address book

Granted publication date: 20170510

License type: Common License

Record date: 20231013

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20140312

Assignee: Shenzhen three pen Technology Co.,Ltd.

Assignor: SHENZHEN INSTITUTES OF ADVANCED TECHNOLOGY CHINESE ACADEMY OF SCIENCES

Contract record no.: X2023980043771

Denomination of invention: A processing method, device, and mobile terminal for address book

Granted publication date: 20170510

License type: Common License

Record date: 20231019