CN103873521A - Cloud architecture-based mobile phone privacy file protection system and method - Google Patents

Cloud architecture-based mobile phone privacy file protection system and method Download PDF

Info

Publication number
CN103873521A
CN103873521A CN201210544084.6A CN201210544084A CN103873521A CN 103873521 A CN103873521 A CN 103873521A CN 201210544084 A CN201210544084 A CN 201210544084A CN 103873521 A CN103873521 A CN 103873521A
Authority
CN
China
Prior art keywords
file
user
module
privacy
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210544084.6A
Other languages
Chinese (zh)
Inventor
李志华
李朋飞
尹熙
张海涛
张华伟
孙雅
李林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangnan University
Original Assignee
Jiangnan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangnan University filed Critical Jiangnan University
Priority to CN201210544084.6A priority Critical patent/CN103873521A/en
Publication of CN103873521A publication Critical patent/CN103873521A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a cloud architecture-based mobile phone privacy file protection system. The cloud architecture-based mobile phone privacy file protection system mainly comprises an early warning module, an encryption and decryption module, an authentication module, a guide module, a cloud service module and a log module. The invention also discloses a cloud architecture-based mobile phone privacy file protection method. The method includes the following steps of: guide determination: different guides are given to a user according to different operation modes, such that the interests of intruders can be effectively reduced; password determination: the identity of the user can be effectively checked; early warning starting: a privacy file can be timely uploaded, such that the privacy file can be backed up, and a local privacy file can be destroyed such that leakage can be prevented; and log check: intrusion behaviors can be viewed, and real-time keys can be generated according to the occurrence time of the intrusion behaviors so as to encrypt and decrypt the privacy file. With the cloud architecture-based mobile phone privacy file protection system and method of the invention adopted, mobile phone privacy files can be effectively protected, and the interests of the intruders for continuously peeping the privacy files can be effectively reduced.

Description

A kind of mobile phone private file protecting system and method based on cloud framework
Technical field
The invention belongs to information security field, relate in particular to a kind of mobile phone private file protecting system and method based on cloud framework.
Background technology
Along with the continuous enhancing of cell-phone function, the continuous lifting of cell phone system and hardware, more and more important private datas are stored in mobile phone terminal.Meanwhile, the data on mobile phone are very easily peeped, are stolen by other people again, and mobile phone private data leak and happen occasionally.For the protection problem of privacy of user on mobile phone, urgently to be resolved hurrily.
Along with the development of cloud, the influence power of cloud computing is also increasing.Mobile phone private data protection based on cloud framework give with user more select, provide greater flexibility, the safety of protection user data that can be large as far as possible.
Summary of the invention
The present invention is just in order to solve the protection problem of user mobile phone privacy file, a kind of mobile phone private file protecting system and method based on cloud framework proposed, can set up a false mirror image with invasion Peeping Tom at privacy file, to reach the interest that weakens invader and continue mined information; Simultaneously by with being connected of Cloud Server end, can before invader see privacy file, upload in time and destroy original document, reach the object of protection privacy file; And the present invention adopts real-time cipher key to encrypt for privacy file, the hidden danger of having avoided single key to bring.
To achieve these goals, the present invention adopts following technical scheme:
A mobile phone private file protecting system based on cloud framework, comprising: warning module, encryption and decryption module, authentication module, oriented module, high in the clouds service module and log pattern.
Wherein:
Warning module: in the time finding doubtful invasion snoopery, according to invasion time generation real-time cipher key seed, starting encryption and decryption module is encrypted file, and in daily record, record corresponding information, after pending file is encrypted, start high in the clouds service module, upload encrypt file and daily record to Cloud Server end; In the time confirming as invasion snoopery, pending file is uploaded complete destruction local file.
Encryption and decryption module: be responsible for the encryption and decryption work of file.In the time having other module to start encryption and decryption module, according to the key seed in daily record, produce real-time cipher key to file encryption-decryption.
Authentication module; Carry out the authentication of password for different user, guarantee the independent safety of privacy of user file between different user.For different authentication results, starting log module or warning module respond.
Oriented module: allow user, to privacy file, different operational guidances is set.For different operational guidances, user will be guided to different simulated papers.Wherein, operational guidance can be mobile phone touch screen gesture, mobile phone gravity sensing and optoelectronic induction and different key operation etc.Simulated papers can be also same file or different file.
High in the clouds service module: be mainly used to authenticate and be connected to upload and download user privacy file and journal file with Cloud Server end.
Log pattern: time and the normal opening time of privacy file that invasion snoopery occurs mainly recorded in daily record.Log pattern can produce key seed to be used for the generation of real-time cipher key, the risk of avoiding single key to bring according to nearest time of intrusion behavior.
As a preferred embodiment of the present invention, described privacy file adopts ciphertext form in mobile phone terminal storage, and its encryption key is to be generated by the key seed in journal file.
As a preferred embodiment of the present invention, described journal file is with the storage of ciphertext form, and its key is that seed generates by user password.
The step of a kind of mobile phone private document protection method based on cloud framework that the present invention carries is as follows:
S1, in the time that user will open privacy file, if when the mode of operation of user's mistake in using, oriented module by user's guiding to simulated papers to avoid privacy to divulge a secret; If when user uses correct mode of operation, enter step S2;
S2, according to login user, authentication module carries out the authentication of password to user, if pass through, think user, registers log-on message and turn to step S4 in journal file; If do not pass through, think that doubtful intrusion behavior occurs, call warning module, enter step S3;
S3, warning module start, if password authentication number of times does not exceed and sets in advance, think that doubtful intrusion behavior occurs, the time and the user profile that turn to S2 and intrusion behavior is occurred write journal file, call encryption and decryption module simultaneously and produce real-time cipher key encryption privacy file and upload to Cloud Server end; If password authentication number of times exceedes set in advance, think that intrusion behavior occurs, wait privacy file to be encrypted to upload complete, destroy local file also user guiding simulated papers.
S4, carry out daily record and check, if there is no intrusion behavior after last login, directly decipher and open file; If there is intrusion behavior after last login, authenticate and be connected and download privacy file and daily record to local file with high in the clouds, download rear deciphering and opened file.
The present invention has realized a kind of mobile phone private file protecting system and method based on cloud framework, and by simulated papers and guiding setting are set, protection privacy, weakens invasion Peeping Tom's interest; Meanwhile, by with being closely connected of Cloud Server end, to back up and to recover former privacy file, and then can destroy local privacy file in the time running into invasion, prevent that privacy file from revealing.
Accompanying drawing explanation
Fig. 1 is system configuration schematic diagram provided by the invention;
Fig. 2 is the schematic diagram that mobile phone terminal provided by the invention and Cloud Server end communicate;
Fig. 3 is privacy document protection method schematic flow sheet provided by the invention;
Embodiment
Describe the present invention in detail below in conjunction with accompanying drawing, it illustrates principle of the present invention as the part of this specification by embodiment, other aspects of the present invention, and feature and advantage thereof will become very clear by this detailed description.
As shown in Figure 1, system provided by the present invention comprises: warning module, encryption and decryption module, authentication module, oriented module, high in the clouds service module and log pattern.
Wherein:
Warning module: in the time finding doubtful invasion snoopery, according to invasion time generation real-time cipher key seed, starting encryption and decryption module is encrypted file, and in daily record, record corresponding information, after pending file is encrypted, start high in the clouds service module, upload encrypt file and daily record to Cloud Server end; In the time confirming as invasion snoopery, pending file is uploaded complete destruction local file.
Encryption and decryption module: be responsible for the encryption and decryption work of file.In the time having other module to start encryption and decryption module, according to the key seed in daily record, produce real-time cipher key to file encryption-decryption.
Authentication module; Carry out the authentication of password for different user, guarantee the independent safety of privacy of user file between different user.For different authentication results, starting log module or warning module respond.
Oriented module: allow user, to privacy file, different operational guidances is set.For different operational guidances, user will be guided to different simulated papers.Wherein, operational guidance can be mobile phone touch screen gesture, mobile phone gravity sensing and optoelectronic induction and different key operation etc.Simulated papers can be also same file or different file.
High in the clouds service module: be mainly used to authenticate and be connected to upload and download user privacy file and journal file with Cloud Server end.
Log pattern: time and the normal opening time of privacy file that invasion snoopery occurs mainly recorded in daily record.Log pattern can produce key seed to be used for the generation of real-time cipher key, the risk of avoiding single key to bring according to nearest time of intrusion behavior.Wherein, journal file is also with the storage of ciphertext form.
As shown in Figure 2, in the time that warning module is found doubtful intrusion behavior, to file carry out real-time encrypted after, be connected with Cloud Server end, and encrypt after privacy file and journal file upload so that user's privacy file is protected.When after logging in system by user, and check according to daily record, while finding that there is intrusion behavior, now, local private data is destroyed, and user and Cloud Server connect, and the privacy file of downloading high in the clouds backup is to local, to check.
The step of the privacy document protection method that as shown in Figure 3, the present invention carries is as follows:
S1, in the time that user will open privacy file, if when the mode of operation of user's mistake in using, oriented module by user's guiding to simulated papers to avoid privacy to divulge a secret; If when user uses correct mode of operation, enter step S2;
S2, according to login user, authentication module carries out the authentication of password to user, if pass through, think user, registers log-on message and turn to step S4 in journal file; If do not pass through, think that doubtful intrusion behavior occurs, call warning module, enter step S3;
S3, warning module start, if password authentication number of times does not exceed and sets in advance, think that doubtful intrusion behavior occurs, the time and the user profile that turn to S2 and intrusion behavior is occurred write journal file, call encryption and decryption module simultaneously and produce real-time cipher key encryption privacy file and upload to Cloud Server end; If password authentication number of times exceedes set in advance, think that intrusion behavior occurs, wait privacy file to be encrypted to upload complete, destroy local file also user guiding simulated papers.
S4, carry out daily record and check, if there is no intrusion behavior after last login, directly deciphering opens file; If there is intrusion behavior after last login, authenticate and be connected and download privacy file and daily record to local file with high in the clouds, download rear deciphering and opened file.
Above disclosed is only the preferred embodiments of the present invention, certainly can not limit with this interest field of the present invention, and the equivalent variations of therefore doing according to the present patent application the scope of the claims, still belongs to the scope that the present invention is contained.

Claims (4)

1. the mobile phone private file protecting system based on cloud framework, is characterized in that, described system comprises:
Warning module: in the time finding doubtful invasion snoopery, according to invasion time generation real-time cipher key seed, starting encryption and decryption module is encrypted file, and in daily record, record corresponding information, after pending file is encrypted, start high in the clouds service module, upload encrypt file and daily record to Cloud Server end; In the time confirming as invasion snoopery, pending file is uploaded complete destruction local file.
Encryption and decryption module: be responsible for the encryption and decryption work of file.In the time having other module to start encryption and decryption module, according to the key seed in daily record, produce real-time cipher key to file encryption-decryption.
Authentication module; Carry out the authentication of password for different user, guarantee the independent safety of privacy of user file between different user.For different authentication results, starting log module or warning module respond.
Oriented module: allow user, to privacy file, different operational guidances is set.For different operational guidances, user will be guided to different simulated papers.Wherein, operational guidance can be mobile phone touch screen gesture, mobile phone gravity sensing and optoelectronic induction and different key operation etc.Simulated papers can be also same file or different file.
High in the clouds service module: be mainly used to authenticate and be connected to upload and download user privacy file and journal file with Cloud Server end.
Log pattern: time and the normal opening time of privacy file that invasion snoopery occurs mainly recorded in daily record.Log pattern can produce key seed to be used for the generation of real-time cipher key, the risk of avoiding single key to bring according to nearest time of intrusion behavior.
2. a kind of mobile phone private file protecting system based on cloud framework as claimed in claim 1, is characterized in that, described privacy file adopts ciphertext form in mobile phone terminal storage, and its encryption key is to be generated by the key seed in journal file.
3. a kind of mobile phone private file protecting system based on cloud framework as claimed in claim 1, is characterized in that, described journal file is with the storage of ciphertext form, and its key is that seed generates by user password.
4. the mobile phone private document protection method based on cloud framework, is characterized in that, the method comprises the steps:
S1, in the time that user will open privacy file, if when the mode of operation of user's mistake in using, oriented module by user's guiding to simulated papers to avoid privacy to divulge a secret; If when user uses correct mode of operation, enter step S2;
S2, according to login user, authentication module carries out the authentication of password to user, if pass through, think user, registers log-on message and turn to step S4 in journal file; If do not pass through, think that doubtful intrusion behavior occurs, call warning module, enter step S3;
S3, warning module start, if password authentication number of times does not exceed and sets in advance, think that doubtful intrusion behavior occurs, the time and the user profile that turn to S2 and intrusion behavior is occurred write journal file, call encryption and decryption module simultaneously and produce real-time cipher key encryption privacy file and upload to Cloud Server end; If password authentication number of times exceedes set in advance, think that intrusion behavior occurs, wait privacy file to be encrypted to upload complete, destroy local file also user guiding simulated papers.
S4, carry out daily record and check, if there is no intrusion behavior after last login, directly deciphering opens file; If there is intrusion behavior after last login, authenticate and be connected and download privacy file and daily record to local file with high in the clouds, download rear deciphering and opened file.
CN201210544084.6A 2012-12-14 2012-12-14 Cloud architecture-based mobile phone privacy file protection system and method Pending CN103873521A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210544084.6A CN103873521A (en) 2012-12-14 2012-12-14 Cloud architecture-based mobile phone privacy file protection system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210544084.6A CN103873521A (en) 2012-12-14 2012-12-14 Cloud architecture-based mobile phone privacy file protection system and method

Publications (1)

Publication Number Publication Date
CN103873521A true CN103873521A (en) 2014-06-18

Family

ID=50911642

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210544084.6A Pending CN103873521A (en) 2012-12-14 2012-12-14 Cloud architecture-based mobile phone privacy file protection system and method

Country Status (1)

Country Link
CN (1) CN103873521A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104537328A (en) * 2015-01-28 2015-04-22 北京红马传媒文化发展有限公司 Anti-invasion detection method based on RFID bill
CN106096435A (en) * 2016-05-31 2016-11-09 北京联合大学 Help each other the smart mobile phone sensitive data protection system of mode and method based on good friend
CN107147702A (en) * 2017-04-20 2017-09-08 北京小米移动软件有限公司 Document down loading method and device
CN109063011A (en) * 2018-07-11 2018-12-21 Oppo(重庆)智能科技有限公司 Log processing method, electronic device and computer readable storage medium
CN114050936A (en) * 2021-11-15 2022-02-15 南方电网数字电网研究院有限公司 User privacy protection method based on combination of big data analysis and cloud computing

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1831834A (en) * 2006-04-20 2006-09-13 成都昊芯科技有限公司 Dynamic enciphering method and circuit for information
CN101699462A (en) * 2009-10-26 2010-04-28 杨东凯 Mobile terminal and using method thereof
CN101986663A (en) * 2010-11-29 2011-03-16 北京卓微天成科技咨询有限公司 OTP-based cloud storage data storing method, device and system
US20110167258A1 (en) * 2009-12-30 2011-07-07 Suridx, Inc. Efficient Secure Cloud-Based Processing of Certificate Status Information
CN102497633A (en) * 2011-12-14 2012-06-13 华中科技大学 Protection method for private information in cellphones
CN102611711A (en) * 2012-04-09 2012-07-25 中山爱科数字科技股份有限公司 Cloud data safe storing method
CN102710668A (en) * 2012-06-29 2012-10-03 上海海事大学 Data privacy guarantee method suitable for cloud storage
CN102799827A (en) * 2011-07-26 2012-11-28 卡巴斯基实验室封闭式股份公司 Data effective protection of mobile device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1831834A (en) * 2006-04-20 2006-09-13 成都昊芯科技有限公司 Dynamic enciphering method and circuit for information
CN101699462A (en) * 2009-10-26 2010-04-28 杨东凯 Mobile terminal and using method thereof
US20110167258A1 (en) * 2009-12-30 2011-07-07 Suridx, Inc. Efficient Secure Cloud-Based Processing of Certificate Status Information
CN101986663A (en) * 2010-11-29 2011-03-16 北京卓微天成科技咨询有限公司 OTP-based cloud storage data storing method, device and system
CN102799827A (en) * 2011-07-26 2012-11-28 卡巴斯基实验室封闭式股份公司 Data effective protection of mobile device
CN102497633A (en) * 2011-12-14 2012-06-13 华中科技大学 Protection method for private information in cellphones
CN102611711A (en) * 2012-04-09 2012-07-25 中山爱科数字科技股份有限公司 Cloud data safe storing method
CN102710668A (en) * 2012-06-29 2012-10-03 上海海事大学 Data privacy guarantee method suitable for cloud storage

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张迪等: "基于WEB的移动端云存储技术研究", 《计算机工程与应用》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104537328A (en) * 2015-01-28 2015-04-22 北京红马传媒文化发展有限公司 Anti-invasion detection method based on RFID bill
CN104537328B (en) * 2015-01-28 2017-10-03 北京红马传媒文化发展有限公司 A kind of invasion-proof detection method based on RFID bills
CN106096435A (en) * 2016-05-31 2016-11-09 北京联合大学 Help each other the smart mobile phone sensitive data protection system of mode and method based on good friend
CN107147702A (en) * 2017-04-20 2017-09-08 北京小米移动软件有限公司 Document down loading method and device
CN107147702B (en) * 2017-04-20 2021-03-30 北京小米移动软件有限公司 File downloading method and device
CN109063011A (en) * 2018-07-11 2018-12-21 Oppo(重庆)智能科技有限公司 Log processing method, electronic device and computer readable storage medium
CN109063011B (en) * 2018-07-11 2021-03-16 Oppo(重庆)智能科技有限公司 Log processing method, electronic device and computer readable storage medium
CN114050936A (en) * 2021-11-15 2022-02-15 南方电网数字电网研究院有限公司 User privacy protection method based on combination of big data analysis and cloud computing

Similar Documents

Publication Publication Date Title
Wu et al. Security threats to mobile multimedia applications: Camera-based attacks on mobile phones
CN102624699B (en) Method and system for protecting data
CN102136048B (en) Mobile phone Bluetooth-based ambient intelligent computer protection device and method
EP2835997B1 (en) Cell phone data encryption method and decryption method
CN102831346B (en) A kind of file protecting system carries out the method for file encryption-decryption
CN103390026A (en) Mobile intelligent terminal security browser and working method thereof
CN103559451A (en) Method and device for protecting and displaying privacy information
KR101403626B1 (en) Method of integrated smart terminal security management in cloud computing environment
CN107133993A (en) A kind of image processing method and device
CN105447357A (en) Application processing method and terminal
CN101674575A (en) Method for protecting security of mobile communication terminal data and device thereof
CN102306255B (en) Document protection method and system
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
CN103873521A (en) Cloud architecture-based mobile phone privacy file protection system and method
CN101795450A (en) Method and device for carrying out security protection on mobile phone data
CN103440462A (en) Embedded control method for improving security and secrecy performance of security microprocessor
CN103619014A (en) Method and system preventing application data from leakage
CN107908974A (en) A kind of method and terminal for protecting privacy of user
CN101815292A (en) Device and method for protecting data of mobile terminal
CN105787319A (en) Iris recognition-based portable terminal and method for same
CN103634789A (en) Mobile terminal and method
CN101777097A (en) Monitorable mobile storage device
JP2009081487A (en) Security terminal unit, computer program, and information communication system
CN104239809A (en) File protecting method, file protecting device, file decryption method, file decryption device and terminal
WO2016026333A1 (en) Data protection method, device and storage medium in connection between terminal and pc

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140618