CN103873521A - Cloud architecture-based mobile phone privacy file protection system and method - Google Patents
Cloud architecture-based mobile phone privacy file protection system and method Download PDFInfo
- Publication number
- CN103873521A CN103873521A CN201210544084.6A CN201210544084A CN103873521A CN 103873521 A CN103873521 A CN 103873521A CN 201210544084 A CN201210544084 A CN 201210544084A CN 103873521 A CN103873521 A CN 103873521A
- Authority
- CN
- China
- Prior art keywords
- file
- user
- module
- privacy
- mobile phone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention discloses a cloud architecture-based mobile phone privacy file protection system. The cloud architecture-based mobile phone privacy file protection system mainly comprises an early warning module, an encryption and decryption module, an authentication module, a guide module, a cloud service module and a log module. The invention also discloses a cloud architecture-based mobile phone privacy file protection method. The method includes the following steps of: guide determination: different guides are given to a user according to different operation modes, such that the interests of intruders can be effectively reduced; password determination: the identity of the user can be effectively checked; early warning starting: a privacy file can be timely uploaded, such that the privacy file can be backed up, and a local privacy file can be destroyed such that leakage can be prevented; and log check: intrusion behaviors can be viewed, and real-time keys can be generated according to the occurrence time of the intrusion behaviors so as to encrypt and decrypt the privacy file. With the cloud architecture-based mobile phone privacy file protection system and method of the invention adopted, mobile phone privacy files can be effectively protected, and the interests of the intruders for continuously peeping the privacy files can be effectively reduced.
Description
Technical field
The invention belongs to information security field, relate in particular to a kind of mobile phone private file protecting system and method based on cloud framework.
Background technology
Along with the continuous enhancing of cell-phone function, the continuous lifting of cell phone system and hardware, more and more important private datas are stored in mobile phone terminal.Meanwhile, the data on mobile phone are very easily peeped, are stolen by other people again, and mobile phone private data leak and happen occasionally.For the protection problem of privacy of user on mobile phone, urgently to be resolved hurrily.
Along with the development of cloud, the influence power of cloud computing is also increasing.Mobile phone private data protection based on cloud framework give with user more select, provide greater flexibility, the safety of protection user data that can be large as far as possible.
Summary of the invention
The present invention is just in order to solve the protection problem of user mobile phone privacy file, a kind of mobile phone private file protecting system and method based on cloud framework proposed, can set up a false mirror image with invasion Peeping Tom at privacy file, to reach the interest that weakens invader and continue mined information; Simultaneously by with being connected of Cloud Server end, can before invader see privacy file, upload in time and destroy original document, reach the object of protection privacy file; And the present invention adopts real-time cipher key to encrypt for privacy file, the hidden danger of having avoided single key to bring.
To achieve these goals, the present invention adopts following technical scheme:
A mobile phone private file protecting system based on cloud framework, comprising: warning module, encryption and decryption module, authentication module, oriented module, high in the clouds service module and log pattern.
Wherein:
Warning module: in the time finding doubtful invasion snoopery, according to invasion time generation real-time cipher key seed, starting encryption and decryption module is encrypted file, and in daily record, record corresponding information, after pending file is encrypted, start high in the clouds service module, upload encrypt file and daily record to Cloud Server end; In the time confirming as invasion snoopery, pending file is uploaded complete destruction local file.
Encryption and decryption module: be responsible for the encryption and decryption work of file.In the time having other module to start encryption and decryption module, according to the key seed in daily record, produce real-time cipher key to file encryption-decryption.
Authentication module; Carry out the authentication of password for different user, guarantee the independent safety of privacy of user file between different user.For different authentication results, starting log module or warning module respond.
Oriented module: allow user, to privacy file, different operational guidances is set.For different operational guidances, user will be guided to different simulated papers.Wherein, operational guidance can be mobile phone touch screen gesture, mobile phone gravity sensing and optoelectronic induction and different key operation etc.Simulated papers can be also same file or different file.
High in the clouds service module: be mainly used to authenticate and be connected to upload and download user privacy file and journal file with Cloud Server end.
Log pattern: time and the normal opening time of privacy file that invasion snoopery occurs mainly recorded in daily record.Log pattern can produce key seed to be used for the generation of real-time cipher key, the risk of avoiding single key to bring according to nearest time of intrusion behavior.
As a preferred embodiment of the present invention, described privacy file adopts ciphertext form in mobile phone terminal storage, and its encryption key is to be generated by the key seed in journal file.
As a preferred embodiment of the present invention, described journal file is with the storage of ciphertext form, and its key is that seed generates by user password.
The step of a kind of mobile phone private document protection method based on cloud framework that the present invention carries is as follows:
S1, in the time that user will open privacy file, if when the mode of operation of user's mistake in using, oriented module by user's guiding to simulated papers to avoid privacy to divulge a secret; If when user uses correct mode of operation, enter step S2;
S2, according to login user, authentication module carries out the authentication of password to user, if pass through, think user, registers log-on message and turn to step S4 in journal file; If do not pass through, think that doubtful intrusion behavior occurs, call warning module, enter step S3;
S3, warning module start, if password authentication number of times does not exceed and sets in advance, think that doubtful intrusion behavior occurs, the time and the user profile that turn to S2 and intrusion behavior is occurred write journal file, call encryption and decryption module simultaneously and produce real-time cipher key encryption privacy file and upload to Cloud Server end; If password authentication number of times exceedes set in advance, think that intrusion behavior occurs, wait privacy file to be encrypted to upload complete, destroy local file also user guiding simulated papers.
S4, carry out daily record and check, if there is no intrusion behavior after last login, directly decipher and open file; If there is intrusion behavior after last login, authenticate and be connected and download privacy file and daily record to local file with high in the clouds, download rear deciphering and opened file.
The present invention has realized a kind of mobile phone private file protecting system and method based on cloud framework, and by simulated papers and guiding setting are set, protection privacy, weakens invasion Peeping Tom's interest; Meanwhile, by with being closely connected of Cloud Server end, to back up and to recover former privacy file, and then can destroy local privacy file in the time running into invasion, prevent that privacy file from revealing.
Accompanying drawing explanation
Fig. 1 is system configuration schematic diagram provided by the invention;
Fig. 2 is the schematic diagram that mobile phone terminal provided by the invention and Cloud Server end communicate;
Fig. 3 is privacy document protection method schematic flow sheet provided by the invention;
Embodiment
Describe the present invention in detail below in conjunction with accompanying drawing, it illustrates principle of the present invention as the part of this specification by embodiment, other aspects of the present invention, and feature and advantage thereof will become very clear by this detailed description.
As shown in Figure 1, system provided by the present invention comprises: warning module, encryption and decryption module, authentication module, oriented module, high in the clouds service module and log pattern.
Wherein:
Warning module: in the time finding doubtful invasion snoopery, according to invasion time generation real-time cipher key seed, starting encryption and decryption module is encrypted file, and in daily record, record corresponding information, after pending file is encrypted, start high in the clouds service module, upload encrypt file and daily record to Cloud Server end; In the time confirming as invasion snoopery, pending file is uploaded complete destruction local file.
Encryption and decryption module: be responsible for the encryption and decryption work of file.In the time having other module to start encryption and decryption module, according to the key seed in daily record, produce real-time cipher key to file encryption-decryption.
Authentication module; Carry out the authentication of password for different user, guarantee the independent safety of privacy of user file between different user.For different authentication results, starting log module or warning module respond.
Oriented module: allow user, to privacy file, different operational guidances is set.For different operational guidances, user will be guided to different simulated papers.Wherein, operational guidance can be mobile phone touch screen gesture, mobile phone gravity sensing and optoelectronic induction and different key operation etc.Simulated papers can be also same file or different file.
High in the clouds service module: be mainly used to authenticate and be connected to upload and download user privacy file and journal file with Cloud Server end.
Log pattern: time and the normal opening time of privacy file that invasion snoopery occurs mainly recorded in daily record.Log pattern can produce key seed to be used for the generation of real-time cipher key, the risk of avoiding single key to bring according to nearest time of intrusion behavior.Wherein, journal file is also with the storage of ciphertext form.
As shown in Figure 2, in the time that warning module is found doubtful intrusion behavior, to file carry out real-time encrypted after, be connected with Cloud Server end, and encrypt after privacy file and journal file upload so that user's privacy file is protected.When after logging in system by user, and check according to daily record, while finding that there is intrusion behavior, now, local private data is destroyed, and user and Cloud Server connect, and the privacy file of downloading high in the clouds backup is to local, to check.
The step of the privacy document protection method that as shown in Figure 3, the present invention carries is as follows:
S1, in the time that user will open privacy file, if when the mode of operation of user's mistake in using, oriented module by user's guiding to simulated papers to avoid privacy to divulge a secret; If when user uses correct mode of operation, enter step S2;
S2, according to login user, authentication module carries out the authentication of password to user, if pass through, think user, registers log-on message and turn to step S4 in journal file; If do not pass through, think that doubtful intrusion behavior occurs, call warning module, enter step S3;
S3, warning module start, if password authentication number of times does not exceed and sets in advance, think that doubtful intrusion behavior occurs, the time and the user profile that turn to S2 and intrusion behavior is occurred write journal file, call encryption and decryption module simultaneously and produce real-time cipher key encryption privacy file and upload to Cloud Server end; If password authentication number of times exceedes set in advance, think that intrusion behavior occurs, wait privacy file to be encrypted to upload complete, destroy local file also user guiding simulated papers.
S4, carry out daily record and check, if there is no intrusion behavior after last login, directly deciphering opens file; If there is intrusion behavior after last login, authenticate and be connected and download privacy file and daily record to local file with high in the clouds, download rear deciphering and opened file.
Above disclosed is only the preferred embodiments of the present invention, certainly can not limit with this interest field of the present invention, and the equivalent variations of therefore doing according to the present patent application the scope of the claims, still belongs to the scope that the present invention is contained.
Claims (4)
1. the mobile phone private file protecting system based on cloud framework, is characterized in that, described system comprises:
Warning module: in the time finding doubtful invasion snoopery, according to invasion time generation real-time cipher key seed, starting encryption and decryption module is encrypted file, and in daily record, record corresponding information, after pending file is encrypted, start high in the clouds service module, upload encrypt file and daily record to Cloud Server end; In the time confirming as invasion snoopery, pending file is uploaded complete destruction local file.
Encryption and decryption module: be responsible for the encryption and decryption work of file.In the time having other module to start encryption and decryption module, according to the key seed in daily record, produce real-time cipher key to file encryption-decryption.
Authentication module; Carry out the authentication of password for different user, guarantee the independent safety of privacy of user file between different user.For different authentication results, starting log module or warning module respond.
Oriented module: allow user, to privacy file, different operational guidances is set.For different operational guidances, user will be guided to different simulated papers.Wherein, operational guidance can be mobile phone touch screen gesture, mobile phone gravity sensing and optoelectronic induction and different key operation etc.Simulated papers can be also same file or different file.
High in the clouds service module: be mainly used to authenticate and be connected to upload and download user privacy file and journal file with Cloud Server end.
Log pattern: time and the normal opening time of privacy file that invasion snoopery occurs mainly recorded in daily record.Log pattern can produce key seed to be used for the generation of real-time cipher key, the risk of avoiding single key to bring according to nearest time of intrusion behavior.
2. a kind of mobile phone private file protecting system based on cloud framework as claimed in claim 1, is characterized in that, described privacy file adopts ciphertext form in mobile phone terminal storage, and its encryption key is to be generated by the key seed in journal file.
3. a kind of mobile phone private file protecting system based on cloud framework as claimed in claim 1, is characterized in that, described journal file is with the storage of ciphertext form, and its key is that seed generates by user password.
4. the mobile phone private document protection method based on cloud framework, is characterized in that, the method comprises the steps:
S1, in the time that user will open privacy file, if when the mode of operation of user's mistake in using, oriented module by user's guiding to simulated papers to avoid privacy to divulge a secret; If when user uses correct mode of operation, enter step S2;
S2, according to login user, authentication module carries out the authentication of password to user, if pass through, think user, registers log-on message and turn to step S4 in journal file; If do not pass through, think that doubtful intrusion behavior occurs, call warning module, enter step S3;
S3, warning module start, if password authentication number of times does not exceed and sets in advance, think that doubtful intrusion behavior occurs, the time and the user profile that turn to S2 and intrusion behavior is occurred write journal file, call encryption and decryption module simultaneously and produce real-time cipher key encryption privacy file and upload to Cloud Server end; If password authentication number of times exceedes set in advance, think that intrusion behavior occurs, wait privacy file to be encrypted to upload complete, destroy local file also user guiding simulated papers.
S4, carry out daily record and check, if there is no intrusion behavior after last login, directly deciphering opens file; If there is intrusion behavior after last login, authenticate and be connected and download privacy file and daily record to local file with high in the clouds, download rear deciphering and opened file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210544084.6A CN103873521A (en) | 2012-12-14 | 2012-12-14 | Cloud architecture-based mobile phone privacy file protection system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210544084.6A CN103873521A (en) | 2012-12-14 | 2012-12-14 | Cloud architecture-based mobile phone privacy file protection system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103873521A true CN103873521A (en) | 2014-06-18 |
Family
ID=50911642
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210544084.6A Pending CN103873521A (en) | 2012-12-14 | 2012-12-14 | Cloud architecture-based mobile phone privacy file protection system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103873521A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104537328A (en) * | 2015-01-28 | 2015-04-22 | 北京红马传媒文化发展有限公司 | Anti-invasion detection method based on RFID bill |
CN106096435A (en) * | 2016-05-31 | 2016-11-09 | 北京联合大学 | Help each other the smart mobile phone sensitive data protection system of mode and method based on good friend |
CN107147702A (en) * | 2017-04-20 | 2017-09-08 | 北京小米移动软件有限公司 | Document down loading method and device |
CN109063011A (en) * | 2018-07-11 | 2018-12-21 | Oppo(重庆)智能科技有限公司 | Log processing method, electronic device and computer readable storage medium |
CN114050936A (en) * | 2021-11-15 | 2022-02-15 | 南方电网数字电网研究院有限公司 | User privacy protection method based on combination of big data analysis and cloud computing |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1831834A (en) * | 2006-04-20 | 2006-09-13 | 成都昊芯科技有限公司 | Dynamic enciphering method and circuit for information |
CN101699462A (en) * | 2009-10-26 | 2010-04-28 | 杨东凯 | Mobile terminal and using method thereof |
CN101986663A (en) * | 2010-11-29 | 2011-03-16 | 北京卓微天成科技咨询有限公司 | OTP-based cloud storage data storing method, device and system |
US20110167258A1 (en) * | 2009-12-30 | 2011-07-07 | Suridx, Inc. | Efficient Secure Cloud-Based Processing of Certificate Status Information |
CN102497633A (en) * | 2011-12-14 | 2012-06-13 | 华中科技大学 | Protection method for private information in cellphones |
CN102611711A (en) * | 2012-04-09 | 2012-07-25 | 中山爱科数字科技股份有限公司 | Cloud data safe storing method |
CN102710668A (en) * | 2012-06-29 | 2012-10-03 | 上海海事大学 | Data privacy guarantee method suitable for cloud storage |
CN102799827A (en) * | 2011-07-26 | 2012-11-28 | 卡巴斯基实验室封闭式股份公司 | Data effective protection of mobile device |
-
2012
- 2012-12-14 CN CN201210544084.6A patent/CN103873521A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1831834A (en) * | 2006-04-20 | 2006-09-13 | 成都昊芯科技有限公司 | Dynamic enciphering method and circuit for information |
CN101699462A (en) * | 2009-10-26 | 2010-04-28 | 杨东凯 | Mobile terminal and using method thereof |
US20110167258A1 (en) * | 2009-12-30 | 2011-07-07 | Suridx, Inc. | Efficient Secure Cloud-Based Processing of Certificate Status Information |
CN101986663A (en) * | 2010-11-29 | 2011-03-16 | 北京卓微天成科技咨询有限公司 | OTP-based cloud storage data storing method, device and system |
CN102799827A (en) * | 2011-07-26 | 2012-11-28 | 卡巴斯基实验室封闭式股份公司 | Data effective protection of mobile device |
CN102497633A (en) * | 2011-12-14 | 2012-06-13 | 华中科技大学 | Protection method for private information in cellphones |
CN102611711A (en) * | 2012-04-09 | 2012-07-25 | 中山爱科数字科技股份有限公司 | Cloud data safe storing method |
CN102710668A (en) * | 2012-06-29 | 2012-10-03 | 上海海事大学 | Data privacy guarantee method suitable for cloud storage |
Non-Patent Citations (1)
Title |
---|
张迪等: "基于WEB的移动端云存储技术研究", 《计算机工程与应用》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104537328A (en) * | 2015-01-28 | 2015-04-22 | 北京红马传媒文化发展有限公司 | Anti-invasion detection method based on RFID bill |
CN104537328B (en) * | 2015-01-28 | 2017-10-03 | 北京红马传媒文化发展有限公司 | A kind of invasion-proof detection method based on RFID bills |
CN106096435A (en) * | 2016-05-31 | 2016-11-09 | 北京联合大学 | Help each other the smart mobile phone sensitive data protection system of mode and method based on good friend |
CN107147702A (en) * | 2017-04-20 | 2017-09-08 | 北京小米移动软件有限公司 | Document down loading method and device |
CN107147702B (en) * | 2017-04-20 | 2021-03-30 | 北京小米移动软件有限公司 | File downloading method and device |
CN109063011A (en) * | 2018-07-11 | 2018-12-21 | Oppo(重庆)智能科技有限公司 | Log processing method, electronic device and computer readable storage medium |
CN109063011B (en) * | 2018-07-11 | 2021-03-16 | Oppo(重庆)智能科技有限公司 | Log processing method, electronic device and computer readable storage medium |
CN114050936A (en) * | 2021-11-15 | 2022-02-15 | 南方电网数字电网研究院有限公司 | User privacy protection method based on combination of big data analysis and cloud computing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wu et al. | Security threats to mobile multimedia applications: Camera-based attacks on mobile phones | |
CN102624699B (en) | Method and system for protecting data | |
CN102136048B (en) | Mobile phone Bluetooth-based ambient intelligent computer protection device and method | |
EP2835997B1 (en) | Cell phone data encryption method and decryption method | |
CN102831346B (en) | A kind of file protecting system carries out the method for file encryption-decryption | |
CN103390026A (en) | Mobile intelligent terminal security browser and working method thereof | |
CN103559451A (en) | Method and device for protecting and displaying privacy information | |
KR101403626B1 (en) | Method of integrated smart terminal security management in cloud computing environment | |
CN107133993A (en) | A kind of image processing method and device | |
CN105447357A (en) | Application processing method and terminal | |
CN101674575A (en) | Method for protecting security of mobile communication terminal data and device thereof | |
CN102306255B (en) | Document protection method and system | |
CN104468937A (en) | Data encryption and decryption methods and devices for mobile terminal and protection system | |
CN103873521A (en) | Cloud architecture-based mobile phone privacy file protection system and method | |
CN101795450A (en) | Method and device for carrying out security protection on mobile phone data | |
CN103440462A (en) | Embedded control method for improving security and secrecy performance of security microprocessor | |
CN103619014A (en) | Method and system preventing application data from leakage | |
CN107908974A (en) | A kind of method and terminal for protecting privacy of user | |
CN101815292A (en) | Device and method for protecting data of mobile terminal | |
CN105787319A (en) | Iris recognition-based portable terminal and method for same | |
CN103634789A (en) | Mobile terminal and method | |
CN101777097A (en) | Monitorable mobile storage device | |
JP2009081487A (en) | Security terminal unit, computer program, and information communication system | |
CN104239809A (en) | File protecting method, file protecting device, file decryption method, file decryption device and terminal | |
WO2016026333A1 (en) | Data protection method, device and storage medium in connection between terminal and pc |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140618 |