CN103916233B - A kind of information ciphering method and device - Google Patents
A kind of information ciphering method and device Download PDFInfo
- Publication number
- CN103916233B CN103916233B CN201410121024.2A CN201410121024A CN103916233B CN 103916233 B CN103916233 B CN 103916233B CN 201410121024 A CN201410121024 A CN 201410121024A CN 103916233 B CN103916233 B CN 103916233B
- Authority
- CN
- China
- Prior art keywords
- information
- sensitive data
- described information
- data
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The disclosure is directed to a kind of information ciphering method and device, this method includes:Obtain the information that terminal receives;It determines to whether there is sensitive data in described information using default recognition rule;When, there are during sensitive data, the sensitive data in described information being converted into secure data according to predetermined encryption rule in described information;Described information of the display with the secure data.Sensitive data when can determine in the information that terminal receives which data by presetting recognition rule, after these sensitive datas are found, these sensitive datas in information are converted into secure data according to predetermined encryption rule, last only information of the display with secure data, in above-mentioned ciphering process, it is participated in without user, sensitive data in information can be encrypted, therefore, in the case that the scheme that the disclosure provides can ensure that the sensitive data in the information received to terminal is encrypted, mitigate the operating burden of user, so as to improve the experience of user.
Description
Technical field
The present invention relates to field of communication technology, more specifically, being related to information ciphering method and device.
Background technology
At present, in order to ensure that the information that terminal receives is not stolen by other people, there are much information encryption policies.
For relevant encryption policy there are mainly two types of mode, the first encryption policy is the letter that user manually receives terminal
Breath is encrypted.For example, the terminal of user has received an important information, user is in order to ensure that the important information will not be by it
Other people see, a password can be set to this important information, even if the terminal is stolen by other criminals, then illegal point
Son can not also check the important information for being provided with password, can be very good to ensure the peace of the important information of terminal in this way
Entirely.
Second of encryption policy presets some particular numbers for user, as long as terminal receives these particular numbers hair
During the information sent, the information that will be sent to these particular numbers is encrypted.For example, the terminal of user is handed over another terminal
Mutual information is mostly important information, so user pre-sets the number of another terminal as particular number, and is the specific number
Code sets a specific cryptosystem, as long as terminal receives the information that particular number is sent, then terminal will be to particular number
The information sent is encrypted automatically according to specific cryptosystem.
It is studying in practice process, inventor has found that above-mentioned correlation technique has at least the following problems:
For the first encryption policy mentioned above, although such encryption policy can be good at ensureing it is important in terminal
The safety of information, but the important information that terminal receives might have many items, if user to each important information all
It is encrypted, then the operating quantity of user may be excessively heavy, increases the operating burden of user.
For second of encryption policy mentioned above, although such mask strategy can more reduce the operation of user
Amount, but all information that not particular number is sent all are important informations, so according to second of encryption policy, user checks
All information of the particular number are required for decrypting, the number of operations decrypted so as to which user be added to need.
Therefore, how to ensure in the case that the important information of terminal is encrypted, mitigate the operating burden of user, become
It needs most and solves the problems, such as at present.
The content of the invention
To overcome the problems, such as present in correlation technique, the disclosure provides a kind of information ciphering method and device, to ensure
In the case that the important information of terminal is encrypted, mitigate the operating burden of user.
According to the embodiment of the present disclosure in a first aspect, provide a kind of information ciphering method, including:
Obtain the information that terminal receives;
It determines to whether there is sensitive data in described information using default recognition rule;
When in described information there are during sensitive data, according to predetermined encryption rule by the sensitive data in described information
It is converted into secure data;
Described information of the display with the secure data.
Optionally, the default recognition rule includes at least one recognition rule, described to be determined using default recognition rule
Include in described information with the presence or absence of sensitive data:
Judge to whether there is predetermined keyword in described information;
When there are during the predetermined keyword, determining recognition rule corresponding with the predetermined keyword in described information,
It determines to whether there is sensitive data in described information using the recognition rule.
Optionally, the default recognition rule includes at least one recognition rule, described to be determined using default recognition rule
Include in described information with the presence or absence of sensitive data:
A recognition rule in default recognition rule is obtained according to setting order;
It determines to whether there is sensitive data in described information using the recognition rule of acquisition;
When the recognition rule using acquisition determines that sensitive data is not present in described information, perform described suitable according to setting
Sequence obtains the step of recognition rule in default recognition rule, until all in the traversal completion default recognition rule
Recognition rule.
Optionally, the method further includes:
Receive the password input by user for being used to check the sensitive data;
Judge whether the password is correct;
When the password is correct, the secure data is reduced into the sensitive number according to the predetermined encryption rule
According to, and show the described information with the sensitive data.
Optionally, the method further includes:
The initial time of described information of the record display with the sensitive data;
Judge whether the difference of current time and the initial time is more than threshold value;
When the difference of the current time and the initial time is more than threshold value, perform described according to predetermined encryption rule
The step of sensitive data in described information is converted into secure data;
When the difference of the current time and the initial time is not more than threshold value, perform the judgement current time with
The step of whether difference of the initial time is more than threshold value.
Optionally, the password is the arbitrary of the one or more in fixed password, dynamic password or gesture password
Combination.
Optionally, it is described that the sensitive data in described information is converted into secure data step according to predetermined encryption rule
Suddenly include:
The sensitive data of part in described information or the sensitive data of whole are turned according to predetermined encryption rule
Change secure data into.
According to the second aspect of the embodiment of the present disclosure, a kind of information encryption device is provided, including:
Acquisition module, for obtaining the information that terminal receives;
Determining module, for determining to whether there is sensitive data in described information using default recognition rule;
Modular converter, in described information there are during sensitive data, will be in described information according to predetermined encryption rule
The sensitive data be converted into secure data;
Display module, for showing the described information with the secure data.
Optionally, the determining module includes:
First judging submodule, for judging to whether there is predetermined keyword in described information;
First implementation sub-module, for, there are during the predetermined keyword, being determined and the default pass in described information
The corresponding recognition rule of keyword determines to whether there is sensitive data in described information using the recognition rule.
Optionally, the determining module includes:
Acquisition submodule, for obtaining a recognition rule in default recognition rule according to setting order;
Determination sub-module, for determining to whether there is sensitive data in described information using the recognition rule of acquisition;
Control submodule, for when sensitive data is not present during described information is determined using the recognition rule of acquisition, touching
Sending out acquisition submodule described performs operation, until traversal completes all recognition rules in the default recognition rule.
Optionally, further include:
Receiving module, for receiving the password input by user for being used to check the sensitive data;
Second judgment module, for judging whether the password is correct;
Second execution module, for when the password is correct, according to the predetermined encryption rule by the secure data
The sensitive data is reduced into, and shows the described information with the sensitive data.
Optionally, further include:
Logging modle, for recording the initial time of described information of the display with the sensitive data;
Whether the 3rd judgment module, the difference for judging current time and the initial time are more than threshold value;
3rd execution module, for when the difference of the current time and the initial time is more than threshold value, performing institute
State modular converter;When the difference of the current time and the initial time is not more than threshold value, performs the described 3rd and judge mould
Block.
According to the third aspect of the embodiment of the present disclosure, a kind of information encryption device is provided, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Obtain the information that terminal receives;
It determines to whether there is sensitive data in described information using default recognition rule;
When in described information there are during sensitive data, according to predetermined encryption rule by the sensitive data in described information
It is converted into secure data;
Described information of the display with the secure data.
The technical scheme provided by this disclosed embodiment can include the following benefits:It can be with by default recognition rule
Determine which data is sensitive data in the information that terminal receives, and after these sensitive datas are found, advises according to predetermined encryption
These sensitive datas in information are then converted into secure data, last only information of the display with secure data adds above-mentioned
During close, participate in, the sensitive data in information can be encrypted without user, therefore, the scheme that the disclosure provides
In the case of can ensureing that the sensitive data in the information received to terminal is encrypted, mitigate the operating burden of user, from
And improve the experience of user.
It should be appreciated that above general description and following detailed description are only exemplary and explanatory, not
The disclosure can be limited.
Description of the drawings
Attached drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the present invention
Example, and the principle for explaining the present invention together with specification.
Fig. 1 is the flow chart according to a kind of information ciphering method shown in an exemplary embodiment.
Fig. 2 is the flow chart according to another information ciphering method shown in an exemplary embodiment.
Fig. 3 is the flow chart according to another information ciphering method shown in an exemplary embodiment.
Fig. 4 is the schematic diagram according to a kind of information encryption device shown in an exemplary embodiment.
Fig. 5 is the schematic diagram according to another information encryption device shown in an exemplary embodiment.
Fig. 6 is the schematic diagram according to another information encryption device shown in an exemplary embodiment.
Fig. 7 is the block diagram according to a kind of information encryption device shown in an exemplary embodiment.
Specific embodiment
Here exemplary embodiment will be illustrated in detail, example is illustrated in the accompanying drawings.Following description is related to
During attached drawing, unless otherwise indicated, the same numbers in different attached drawings represent the same or similar element.Following exemplary embodiment
Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects being described in detail in claims, of the invention.
Embodiment one
Fig. 1 is according to a kind of flow chart of information ciphering method shown in an exemplary embodiment, as shown in Figure 1, the letter
Encryption for information method can be used in terminal, and this method can ensure that the sensitive data in the information received to terminal is encrypted
In the case of, mitigate the operating burden of user, so as to improve the experience of user, this method comprises the following steps.
In step S101, the information that terminal receives is obtained.
Wherein, information can be the information such as short message or mail.The short message or mail of other-end transmission are received in terminal
When information, which is arrived, in case below the step of use.
In step s 102, determine to whether there is sensitive data in information using default recognition rule.
Wherein, sensitive data refers to very important information for a user, if these very important information
It once is stolen or loses, then user, which may exist, to lose property or lose private information, so the sensitive number in information
According to needing to be identified, in order to which sensitive data is encrypted in subsequent step.
Default recognition rule is sensitive data for which data in identification information, so default recognition rule can be determined
Justice is to include the recognition rule of at least one identification sensitive data.
For example, bank card account on the market is usually 16 bit digitals, bank card password is usually 6 bit digitals, then pre-
If recognition rule can be set to inquire about continuous 16 bit digital or continuous 6 bit digital of inquiry, once so terminal receives
To information in include continuous 16 bit digital or continuous 6 bit digital, then using default recognition rule just can recognize that come,
And using 16 bit digitals or continuous 6 bit digital as sensitive data.Here continuous 16 bit digital of inquiry may be considered one
Kind recognition rule, and inquire about continuous 6 bit digital and may be considered another recognition rule, both recognition rules are included in
In default recognition rule.
It refers to shown in table 1, is default recognition rule and the sensitive number inquired according to default recognition rule shown in table 1
According to relation table.Assuming that default recognition rule receives for 16 continuous numbers of inquiry or the continuous number of inquiry 6, terminal
To the information content for " bank card account of XX banks is 1111222233334444, and bank card password is 555555 ", then
The sensitive data that can be inquired using default recognition rule is " 1111222233334444 " and " 555555 ", in order to follow-up
These sensitive datas can be encrypted in step, can be stolen to avoid by disabled user.
Default recognition rule | Sensitive data |
The continuous number of inquiry 16 | 1111222233334444 |
The continuous number of inquiry 6 | 555555 |
Table 1
For another example, the account of certain chat software is continuous 10 bit digital, and the password of this chat software is to include English
With the combining characters of number, and the digit of the combining characters is between 8 to 12, then default recognition rule can be set
To inquire about continuous 10 bit digital or inquiry continuously between 8 to 12 and comprising English and digital combining characters, institute
Once in the information received with terminal comprising continuous 10 bit digital or continuously between 8 to 12 and comprising English with
The combining characters of number, then just can recognize that come and by continuous 10 bit digital or continuously 8 using default recognition rule
Position is between 12 and the combining characters comprising English and number are as sensitive data.Here continuous 10 bit digital of inquiry can
To be considered a kind of recognition rule, inquiry is continuously between 8 to 12, and the combining characters comprising English and number can be with
It is considered another recognition rule, both recognition rules are included in default recognition rule.
It refers to shown in table 2, is default recognition rule and the sensitive number inquired according to default recognition rule shown in table 2
According to relation table.Assuming that default recognition rule for inquire about continuous 10 bit digital or inquiry continuously between 8 to 12 and
Comprising English with number combining characters, the information content that terminal receives for " account of XX chat softwares is 1234567890,
The password of chat software is ABCD1234 ", then the sensitive data that can be inquired using default recognition rule is
" 1234567890 " and " ABCD1234 ", can be to avoid quilt in order to which these sensitive datas can be encrypted in subsequent step
Disabled user steals.
Table 2
In an optional embodiment, the first recognition rule that can be included since default recognition rule, according to
With the presence or absence of sensitive data in secondary judgement information, until determining that there are sensitive data or all identification rule of traversal completion in information
Then.It is the operating procedure of the optional embodiment below:Step 1), obtain according to setting order one in default recognition rule
Recognition rule;Step 2), using the recognition rule of acquisition determine in information whether there is sensitive data;Step 3), when using obtaining
When the recognition rule taken determines that sensitive data is not present in information, step 1 is performed), until traversal is completed in default recognition rule
All recognition rules.
In step s 103, when in information there are during sensitive data, according to predetermined encryption rule by the sensitive number in information
According to being converted into secure data.
Wherein, predetermined encryption rule is used to that the sensitive data in information to be encrypted to obtain secure data, and setting is default
There are many kinds of the modes of encryption rule, both the sensitive data of part in information can be converted into safety according to predetermined encryption rule
The sensitive data of part in information can also be converted into secure data by data according to predetermined encryption rule.For example, pass through step
S102 determines the sensitive data in information as " 1234567890 " and " ABCD1234 ", and encryption rule is by the sensitive number in information
According to becoming symbol " * ", then after the conversion of step S103, sensitive data " 1234567890 " and " ABCD1234 " will become
Into secure data " * * * * * * * * * * " and " * * * * * * * * ".For another example, determine that the sensitive data in information is by step S102
" 1234567890 " and " ABCD1234 ", encryption rule is that the center section of the sensitive data in information is become symbol " * ", quick
Feel data head and the tail character it is constant, then after the conversion of step S103, sensitive data " 1234567890 " and
" ABCD1234 " will become secure data " 1********0 " and " A******4 ".For another example, information is determined by step S102
In sensitive data for " 1234567890 " and " ABCD1234 ", encryption rule is by the odd bits change of the sensitive data in information
Into symbol " * ", the even number invariant position of sensitive data, then after the conversion of step S103, sensitive data " 1234567890 "
" ABCD1234 " will become secure data " * 2*4*6*8*0 " and " * B*D*2*4 ".
In step S104, information of the display with secure data.
Where it is assumed that the information content that terminal receives is " account of XX chat softwares is 1234567890, chat software
Password be ABCD1234 ", " 1234567890 " and " ABCD1234 " are learnt by step S102 as sensitive data, by step
Sensitive data " 1234567890 " and " ABCD1234 " are become secure data by S103 according to predetermined encryption rule
" * * * * * * * * * * " and " * * * * * * * * ", this step S104 will show that the information content is the " account of XX chat softwares
It is * * * * * * * * * *, the password of chat software is * * * * * * * * ", so even if the lost terminal or information of user are stolen by hacker
It takes, then hacker can not also learn the important information of user.
In the embodiment shown in fig. 1, the scheme that the disclosure provides can determine that terminal receives by default recognition rule
To information in which data be sensitive data, will be in information according to predetermined encryption rule after these sensitive datas are found
These sensitive datas are converted into secure data, last only information of the display with secure data, in above-mentioned ciphering process, without
User participates in, and the sensitive data in information can be encrypted, and therefore, the scheme that the disclosure provides can ensure to terminal
In the case that sensitive data in the information received is encrypted, mitigate the operating burden of user, so as to improve user's
Experience.
Embodiment two
Shown in Figure 2, Fig. 2 is the flow according to another information ciphering method shown in an exemplary embodiment
Figure.Since the present embodiment is the improvement based on embodiment one, so referring to reality with one something in common of embodiment in the present embodiment
The content of example one is applied, duplicate contents will not be described in great detail.The embodiment that the disclosure provides can be applied in the terminal.The present embodiment is public
The predetermined keyword that each sensitive data often can be coordinated appearance by the method opened in advance is found out, by each sensitive data
Recognition rule is contacted with predetermined keyword foundation, once find that there are predetermined keywords in information, then just according to the default pass
The corresponding recognition rule of keyword goes to determine the sensitive data in information, and the sensitive data in location information is more in this way
Fast.This method comprises the following steps.
In step s 201, the information that terminal receives is obtained.
In step S202, judge with the presence or absence of predetermined keyword in information, if it is, performing step S203.
Wherein, if the species of sensitive data reaches tens kinds, then just need to define sentencing for this tens kinds of sensitive datas
Other method when receiving information, it is necessary to after being judged by the method for discrimination of tens kinds of sensitive datas, can be determined quick
Feel data, so for the species of sensitive data it is more when, it may appear that the problem of recognition speed is slow.For the species of sensitive data
More situation can pre-define the corresponding recognition rule of each sensitive data, and in advance pass through each sensitive data
The predetermined keyword that often cooperation occurs is found out, and the recognition rule of each sensitive data and predetermined keyword foundation is contacted, one
Denier finds that there are predetermined keywords in information, then just goes to determine in information according to the corresponding recognition rule of the predetermined keyword
Sensitive data, the sensitive data in location information is more quick in this way.
For example, when sensitive data is bank card account number and bank card password, bank card account is 16 bit digitals, and bank card is close
Code is 6 bit digitals.The corresponding recognition rule of such sensitive data is inquires about continuous 16 bit digital or inquiry continuous 6
Bit digital, such sensitive data often coordinate the predetermined keyword of appearance for " bank card account number ", " bank card password ",
" money transfer amount " etc..If the information received is " bank card account of XX banks is 1111222233334444, and bank card is close
Code is 555555 ", then first determines whether that judging result, which is to determine in the information, to be existed with the presence or absence of predetermined keyword in the information
Predetermined keyword " bank card account number " and " bank card password ", then start the corresponding recognition rule of the keyword, i.e. inquiry connects
Continuous 16 bit digitals or continuous 6 bit digital of inquiry, the sensitive data that can be inquired using recognition rule are
" 1111222233334444 " and " 555555 ".
In step S203, determine recognition rule corresponding with predetermined keyword, determined using recognition rule be in information
It is no that there are sensitive datas.
Wherein, the recognition rule mentioned in step S203 from the default recognition rule mentioned in step S204 be it is different,
Recognition rule represents the recognition rule for corresponding to a certain sensitive data, and default recognition rule represents to correspond at least one sensitive
The recognition rule of data.For example, recognition rule corresponds only to the recognition rule of bank card account number and bank card password, and preset and know
Rule can both not correspond only to the recognition rule of bank card account number and bank card password, may correspond to a variety of sensitive datas
Recognition rule.
In step S204, when in information there are during sensitive data, according to predetermined encryption rule by the sensitive number in information
According to being converted into secure data.
In step S205, information of the display with secure data.
In the embodiment shown in Figure 2, the method that embodiment of the disclosure provides can in advance pass through each sensitive data
The predetermined keyword that often cooperation occurs is found out, and the recognition rule of each sensitive data and predetermined keyword foundation is contacted, one
Denier finds that there are predetermined keywords in information, then just goes to determine in information according to the corresponding recognition rule of the predetermined keyword
Sensitive data, the sensitive data in location information is more quick in this way.
Embodiment three
Shown in Figure 3, Fig. 3 is the flow according to another information ciphering method shown in an exemplary embodiment
Figure.Since the present embodiment is the improvement based on embodiment one, so referring to reality with one something in common of embodiment in the present embodiment
The content of example one is applied, duplicate contents will not be described in great detail.The embodiment that the disclosure provides can be applied in the terminal.The present embodiment is public
The method opened can not only receive password input by user, so that user checks the information with sensitive data, moreover, showing
After the information reaches the predetermined time, can the sensitive data in information be automatically converted into secure data, so as to lasting
Ensure the safety of sensitive data in information.This method comprises the following steps.
In step S301, the information that terminal receives is obtained.
In step s 302, determine to whether there is sensitive data in information using default recognition rule.
In step S303, when in information there are during sensitive data, according to predetermined encryption rule by the sensitive number in information
According to being converted into secure data.
In step s 304, information of the display with secure data.
In step S305, the password input by user for being used to check sensitive data is received.
Wherein, preset to check that the password of sensitive data can be there are many mode, for example, password can be to fix
Password, or dynamic password, or gesture password or any combination of these three passwords, certain password
Species can also be other types, it is not limited to the species provided.
In step S306, judge whether password is correct, if correctly, performing step S307.
Wherein, if password input by user is correct, then secure data is reduced into sensitivity according to predetermined encryption rule
Data, in order to which user checks the original contents of the information.
In step S307, when password is correct, secure data is reduced into sensitive data according to predetermined encryption rule, and
Information of the display with sensitive data.
In step S308, the initial time of information of the record display with sensitive data.
Wherein, correct password is inputted in user, and after showing the original contents of information, watches believing for user at this time
The original contents of breath.After user finishes watching the original contents of information, in order to continue to ensure the sensitive data in the information not by
Leakage can record the initial time for showing the information, and judge whether the difference of current time and initial time is more than threshold value,
If greater than threshold value, then illustrate that the sensitive data needs in the information continue encrypted, so step S305 is performed, if
No more than threshold value, illustrate to reach not yet the predetermined time, and judge in real time current time and initial time difference whether
More than threshold value.
Threshold value is for the preset period, for example, threshold value can be set as 30 minutes, can also be set as that 1 is small
When etc..
In step S309, judge whether the difference of current time and initial time is more than threshold value, if it is, performing step
Otherwise rapid S303, performs step S309.
In the embodiment shown in fig. 3, method disclosed in the present embodiment can not only receive password input by user, display
Go out the original contents of information, so that user checks the information with sensitive data;It is moreover, quick in the information in order to continue to ensure
Sense data are not leaked, and after showing that the information reaches the predetermined time, automatically can be converted into pacifying by the sensitive data in information
Total evidence, so as to the safety of sensitive data in lasting guarantee information.
Example IV
It is shown in Figure 4, Fig. 4 be according to a kind of module map of information encryption device shown in an exemplary embodiment,
In the case that device disclosed in the present embodiment can ensure that the sensitive data in the information received is encrypted, mitigate user's
Operating burden, so as to improve the experience of user.The device includes:
Acquisition module 11, for obtaining the information that terminal receives;
Determining module 12, for determining to whether there is sensitive data in information using default recognition rule;
Modular converter 13, in the information there are during sensitive data, according to predetermined encryption rule by the sensitivity in information
Data conversion is into secure data;
Display module 14, for showing the information with secure data.
In the embodiment shown in fig. 4, the function of information encryption device provided in this embodiment is realized with embodiment one
Function is corresponding, so the function on the present embodiment modules can be found in the content in embodiment one, herein no longer one by one
It repeats.
Embodiment five
Shown in Figure 5, Fig. 5 is the module according to another information encryption device shown in an exemplary embodiment
Figure, the predetermined keyword that each sensitive data often can be coordinated appearance by device disclosed in the present embodiment in advance are found out, will
The recognition rule of each sensitive data is contacted with predetermined keyword foundation, once find that there are predetermined keywords in information, then
It is just gone to determine the sensitive data in information according to the corresponding recognition rule of the predetermined keyword, in this way in location information
Sensitive data it is more quick.The device includes:
Acquisition module 21, for obtaining the information that terminal receives;
Determining module 24, for determining to whether there is sensitive data in information using default recognition rule;
Optionally, determining module 24 can include the first judging submodule 22 and the first implementation sub-module 23, wherein, first
Judging submodule 22, for judging to whether there is predetermined keyword in information;First implementation sub-module 23, for depositing in the information
In predetermined keyword, determine recognition rule corresponding with predetermined keyword, the sensitive number in information is determined using recognition rule
According to.
Optionally, determining module 24 can also include acquisition submodule, determination sub-module and control submodule, wherein, it obtains
Submodule is taken, for obtaining a recognition rule in default recognition rule according to setting order;Determination sub-module, for utilizing
The recognition rule of acquisition determines to whether there is sensitive data in information;Control submodule, for utilizing the recognition rule obtained
When determining that sensitive data is not present in information, triggering acquisition submodule performs operation, until traversal is completed in default recognition rule
All recognition rules.It is not shown in Figure 5 on acquisition submodule, determination sub-module and control submodule.
Modular converter 25, in the information there are during sensitive data, according to predetermined encryption rule by the sensitivity in information
Data conversion is into secure data;
Display module 26, for showing the information with secure data.
In the embodiment shown in fig. 4, the function of information encryption device provided in this embodiment is realized with embodiment two
Function is corresponding, so the function on the present embodiment modules can be found in the content in embodiment two, herein no longer one by one
It repeats.
Embodiment six
Shown in Figure 6, Fig. 6 is the module according to another information encryption device shown in an exemplary embodiment
Figure, device can not only receive password input by user disclosed in the present embodiment, so that user checks the letter with sensitive data
Sensitive data in information moreover, after showing that the information reaches the predetermined time, automatically can be converted into secure data by breath,
So as to the safety of sensitive data in lasting guarantee information.The device includes:
Acquisition module 31, for obtaining the information that terminal receives;
Determining module 32, for determining to whether there is sensitive data in information using default recognition rule;
Modular converter 33, in the information there are during sensitive data, according to predetermined encryption rule by the sensitivity in information
Data conversion is into secure data;
Display module 34, for showing the information with secure data.
Receiving module 35, for receiving the password input by user for being used to check sensitive data;
Second judgment module 36, for judging whether password is correct;
Second execution module 37, for when password is correct, secure data to be reduced into sensitivity according to predetermined encryption rule
Data, and show the information with sensitive data.
Logging modle 38, for recording the initial time of information of the display with sensitive data;
3rd judgment module 39, for judging whether the difference of current time and initial time is more than threshold value;
3rd execution module 310, for when the difference of current time and initial time is more than threshold value, performing modular converter
33;When the difference of current time and initial time is not more than threshold value, the 3rd judgment module 39 is performed.
In the embodiment shown in fig. 6, the function of information encryption device provided in this embodiment is realized with embodiment three
Function is corresponding, so the function on the present embodiment modules can be found in the content in embodiment three, herein no longer one by one
It repeats.
Embodiment seven
Fig. 7 is the block diagram according to a kind of information encryption device 800 shown in an exemplary embodiment.For example, device 800 can
To be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices are good for
Body equipment, personal digital assistant etc..
With reference to Fig. 7, device 800 can include following one or more assemblies:Processing component 802, memory 804, power supply
Component 806, multimedia component 808, audio component 810, input/output(I/O)Interface 812, sensor module 814 and
Communication component 816.
The integrated operation of 802 usual control device 800 of processing component, such as with display, call, data communication, phase
Machine operates and record operates associated operation.Processing component 802 can refer to including one or more processors 820 to perform
Order, to perform all or part of the steps of the methods described above.In addition, processing component 802 can include one or more modules, just
Interaction between processing component 802 and other assemblies.For example, processing component 802 can include multi-media module, it is more to facilitate
Interaction between media component 808 and processing component 802.
Memory 804 is configured as storing various types of data to support the operation in device 800.These data are shown
Example is included for the instruction of any application program or method that are operated on device 800, contact data, and telephone book data disappears
Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group
It closes and realizes, such as static RAM(SRAM), electrically erasable programmable read-only memory(EEPROM), it is erasable to compile
Journey read-only memory(EPROM), programmable read only memory(PROM), read-only memory(ROM), magnetic memory, flash
Device, disk or CD.
Power supply module 806 provides electric power for the various assemblies of device 800.Power supply module 806 can include power management system
System, one or more power supplys and other generate, manage and distribute electric power associated component with for device 800.
Multimedia component 808 is included in the screen of one output interface of offer between described device 800 and user.One
In a little embodiments, screen can include liquid crystal display(LCD)And touch panel(TP).If screen includes touch panel, screen
Curtain may be implemented as touch-screen, to receive input signal from the user.Touch panel includes one or more touch sensings
Device is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding action
Border, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more matchmakers
Body component 808 includes a front camera and/or rear camera.When device 800 is in operation mode, such as screening-mode or
During video mode, front camera and/or rear camera can receive external multi-medium data.Each front camera and
Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 810 is configured as output and/or input audio signal.For example, audio component 810 includes a Mike
Wind(MIC), when device 800 is in operation mode, during such as call model, logging mode and speech recognition mode, microphone by with
It is set to reception external audio signal.The received audio signal can be further stored in memory 804 or via communication set
Part 816 is sent.In some embodiments, audio component 810 further includes a loud speaker, for exports audio signal.
I/O interfaces 812 provide interface between processing component 802 and peripheral interface module, and above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor module 814 includes one or more sensors, and the state for providing various aspects for device 800 is commented
Estimate.For example, sensor module 814 can detect opening/closed state of device 800, and the relative positioning of component, for example, it is described
Component is the display and keypad of device 800, and sensor module 814 can be with 800 1 components of detection device 800 or device
Position change, the existence or non-existence that user contacts with device 800,800 orientation of device or acceleration/deceleration and device 800
Temperature change.Sensor module 814 can include proximity sensor, be configured to detect without any physical contact
Presence of nearby objects.Sensor module 814 can also include optical sensor, such as CMOS or ccd image sensor, for into
As being used in application.In some embodiments, which can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between device 800 and other equipment.Device
800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or combination thereof.In an exemplary implementation
In example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, the communication component 816 further includes near-field communication(NFC)Module, to promote short range communication.Example
Such as, radio frequency identification can be based in NFC module(RFID)Technology, Infrared Data Association(IrDA)Technology, ultra wide band(UWB)Technology,
Bluetooth(BT)Technology and other technologies are realized.
In the exemplary embodiment, device 800 can be by one or more application application-specific integrated circuit(ASIC), number letter
Number processor(DSP), digital signal processing appts(DSPD), programmable logic device(PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components realize, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided
Such as include the memory 804 of instruction, above-metioned instruction can be performed to complete the above method by the processor 820 of device 800.For example,
The non-transitorycomputer readable storage medium can be ROM, random access memory(RAM), CD-ROM, tape, floppy disk
With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in storage medium is held by the processor of mobile terminal
During row so that mobile terminal is able to carry out a kind of information ciphering method, and method includes:Obtain the information that terminal receives;It utilizes
Default recognition rule determines to whether there is sensitive data in information;When, there are during sensitive data, being advised in information according to predetermined encryption
The sensitive data in information is then converted into secure data;Information of the display with secure data.
Those skilled in the art will readily occur to the present invention its after considering specification and putting into practice invention disclosed herein
Its embodiment.This application is intended to cover the present invention any variations, uses, or adaptations, these modifications, purposes or
Person's adaptive change follows the general principle of the present invention and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.Description and embodiments are considered only as illustratively, and true scope and spirit of the invention are by following
Claim is pointed out.
It should be appreciated that the invention is not limited in the precision architecture for being described above and being shown in the drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is only limited by appended claim.
Claims (5)
1. a kind of information ciphering method, which is characterized in that including:
Obtain the information that terminal receives;
Judge to whether there is predetermined keyword in described information;
When there are during the predetermined keyword, determine recognition rule corresponding with the predetermined keyword, utilization in described information
The recognition rule determines to whether there is sensitive data in described information;
When there are during sensitive data, the sensitive data in described information is converted according to predetermined encryption rule in described information
Into secure data;
Described information of the display with the secure data;
Receive the password input by user for being used to check the sensitive data;
Judge whether the password is correct;
When the password is correct, the secure data is reduced into the sensitive data according to the predetermined encryption rule, and
Described information of the display with the sensitive data;
The initial time of described information of the record display with the sensitive data;
Judge whether the difference of current time and the initial time is more than threshold value;
When the difference of the current time and the initial time is more than threshold value, perform it is described according to predetermined encryption rule by institute
State the step of sensitive data in information is converted into secure data;
When the difference of the current time and the initial time is not more than threshold value, perform the judgement current time with it is described
The step of whether difference of initial time is more than threshold value.
2. information ciphering method according to claim 1, which is characterized in that the password is fixed password, dynamic password
Or one or more kinds of any combination in gesture password.
3. information ciphering method according to claim 1, which is characterized in that it is described according to predetermined encryption rule by the letter
The sensitive data in breath, which is converted into secure data step, to be included:
The sensitive data of the sensitive data of part in described information or whole is converted into according to predetermined encryption rule
Secure data.
4. a kind of information encryption device, which is characterized in that including:
Acquisition module, for obtaining the information that terminal receives;
First judging submodule, for judging to whether there is predetermined keyword in described information;
First implementation sub-module, for, there are during the predetermined keyword, being determined and the predetermined keyword in described information
Corresponding recognition rule determines to whether there is sensitive data in described information using the recognition rule;
Modular converter, in described information there are during sensitive data, according to predetermined encryption rule by the institute in described information
It states sensitive data and is converted into secure data;
Display module, for showing the described information with the secure data;
Receiving module, for receiving the password input by user for being used to check the sensitive data;
Second judgment module, for judging whether the password is correct;
Second execution module, for when the password is correct, reducing the secure data according to the predetermined encryption rule
Into the sensitive data, and show the described information with the sensitive data;
Logging modle, for recording the initial time of described information of the display with the sensitive data;
Whether the 3rd judgment module, the difference for judging current time and the initial time are more than threshold value;
3rd execution module, for when the difference of the current time and the initial time is more than threshold value, performing described turn
Change the mold block;When the difference of the current time and the initial time is not more than threshold value, the 3rd judgment module is performed.
5. a kind of information encryption device, which is characterized in that including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Obtain the information that terminal receives;
Judge to whether there is predetermined keyword in described information;
When there are during the predetermined keyword, determine recognition rule corresponding with the predetermined keyword, utilization in described information
The recognition rule determines to whether there is sensitive data in described information;
When there are during sensitive data, the sensitive data in described information is converted according to predetermined encryption rule in described information
Into secure data;
Described information of the display with the secure data;
Receive the password input by user for being used to check the sensitive data;
Judge whether the password is correct;
When the password is correct, the secure data is reduced into the sensitive data according to the predetermined encryption rule, and
Described information of the display with the sensitive data;
The initial time of described information of the record display with the sensitive data;
Judge whether the difference of current time and the initial time is more than threshold value;
When the difference of the current time and the initial time is more than threshold value, perform it is described according to predetermined encryption rule by institute
State the step of sensitive data in information is converted into secure data;
When the difference of the current time and the initial time is not more than threshold value, perform the judgement current time with it is described
The step of whether difference of initial time is more than threshold value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410121024.2A CN103916233B (en) | 2014-03-28 | 2014-03-28 | A kind of information ciphering method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410121024.2A CN103916233B (en) | 2014-03-28 | 2014-03-28 | A kind of information ciphering method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103916233A CN103916233A (en) | 2014-07-09 |
CN103916233B true CN103916233B (en) | 2018-05-29 |
Family
ID=51041654
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410121024.2A Active CN103916233B (en) | 2014-03-28 | 2014-03-28 | A kind of information ciphering method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103916233B (en) |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104410486A (en) * | 2014-11-27 | 2015-03-11 | 西安酷派软件科技有限公司 | Automatic encryption method, device and terminal |
CN104506545B (en) * | 2014-12-30 | 2017-12-22 | 北京奇安信科技有限公司 | Leakage prevention method and device |
CN105426745B (en) * | 2015-10-28 | 2019-08-06 | 小米科技有限责任公司 | Information display method and device |
CN105635131B (en) * | 2015-12-25 | 2019-06-25 | 东软集团股份有限公司 | Transmit data method, device and server |
CN105554745A (en) * | 2016-01-27 | 2016-05-04 | 广东欧珀移动通信有限公司 | Information management method and system |
CN106156642A (en) * | 2016-07-28 | 2016-11-23 | 宇龙计算机通信科技(深圳)有限公司 | Data ciphering method and device |
CN106295367A (en) * | 2016-08-15 | 2017-01-04 | 北京奇虎科技有限公司 | Data ciphering method and device |
US10387670B2 (en) * | 2016-09-21 | 2019-08-20 | International Business Machines Corporation | Handling sensitive data in an application using external processing |
CN108111667A (en) * | 2016-11-25 | 2018-06-01 | 北京搜狗科技发展有限公司 | A kind of communication information encryption method, device and electronic equipment |
CN106506153A (en) * | 2016-11-28 | 2017-03-15 | 浙江齐治科技股份有限公司 | One kind changes decryption method, device and fort machine automatically |
CN106791087A (en) * | 2016-12-20 | 2017-05-31 | 北京小米移动软件有限公司 | The storage method of information, device and equipment |
CN106603568B (en) * | 2016-12-30 | 2019-09-17 | Oppo广东移动通信有限公司 | Data ciphering method, device and access point apparatus |
CN106921952A (en) * | 2017-01-25 | 2017-07-04 | 宇龙计算机通信科技(深圳)有限公司 | Communication data method for transformation and mobile terminal |
CN107102831A (en) * | 2017-04-14 | 2017-08-29 | 北京小度信息科技有限公司 | Data-printing method and apparatus |
CN106921805B (en) * | 2017-04-20 | 2021-04-23 | 维沃移动通信有限公司 | Encryption method and mobile terminal |
CN107147636A (en) * | 2017-05-03 | 2017-09-08 | 北京小米移动软件有限公司 | E-mail transmission method and device |
CN107332973B (en) * | 2017-05-19 | 2020-09-25 | 北京安云世纪科技有限公司 | Text data processing method and device and mobile terminal |
CN107508799B (en) * | 2017-07-31 | 2018-12-04 | 珠海格力电器股份有限公司 | Information presentation method and device based on instant messaging |
CN107493393A (en) * | 2017-09-25 | 2017-12-19 | 深圳辉烨通讯技术有限公司 | A kind of short message encryption method, device and mobile terminal |
CN107748848A (en) * | 2017-10-16 | 2018-03-02 | 维沃移动通信有限公司 | A kind of information processing method and mobile terminal |
CN107846351A (en) * | 2017-10-23 | 2018-03-27 | 苏州亿科赛卓电子科技有限公司 | A kind of chat messages sensitive information encryption method and device |
CN110163013B (en) * | 2019-05-22 | 2021-08-03 | 上海上湖信息技术有限公司 | Method and equipment for detecting sensitive information |
CN111460484A (en) * | 2020-04-20 | 2020-07-28 | 深圳市云智融科技有限公司 | Information encryption method, information encryption device and computer readable storage medium |
CN111899741A (en) * | 2020-08-06 | 2020-11-06 | 上海明略人工智能(集团)有限公司 | Audio keyword encryption method and device, storage medium and electronic device |
CN114598671B (en) * | 2022-03-21 | 2023-01-31 | 北京明略昭辉科技有限公司 | Session message processing method, device, storage medium and electronic equipment |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102638459B (en) * | 2012-03-23 | 2018-01-26 | 腾讯科技(深圳)有限公司 | Authentication information Transmission system, authentication information transmission service platform and transmission method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1540628A4 (en) * | 2002-07-12 | 2010-08-04 | Safenet Inc | Network attached encryption |
CN101957894B (en) * | 2009-07-17 | 2015-08-12 | 精品科技股份有限公司 | Conditional e-file authority controlling and managing system and method |
CN103677647A (en) * | 2013-12-06 | 2014-03-26 | 上海众人网络安全技术有限公司 | Electronic device power-on password input method and electronic device |
-
2014
- 2014-03-28 CN CN201410121024.2A patent/CN103916233B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102638459B (en) * | 2012-03-23 | 2018-01-26 | 腾讯科技(深圳)有限公司 | Authentication information Transmission system, authentication information transmission service platform and transmission method |
Also Published As
Publication number | Publication date |
---|---|
CN103916233A (en) | 2014-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103916233B (en) | A kind of information ciphering method and device | |
CN104933351B (en) | The treating method and apparatus of information security | |
CN105654302B (en) | Payment method and device | |
CN105389516A (en) | Sensitive picture reminding method and apparatus | |
CN105260673A (en) | Short message reading method and apparatus | |
CN104391712B (en) | Closedown method and device | |
CN104573550A (en) | Method and device for protecting data | |
CN104318177A (en) | Protection method and protection device for data of terminal equipment | |
CN108319832A (en) | Unlocking method and device | |
EP3447666A1 (en) | Processing fingerprint information | |
CN106909827A (en) | Using account management method and device | |
CN108111667A (en) | A kind of communication information encryption method, device and electronic equipment | |
TW202101392A (en) | Access control method and device, electronic device and storage medium | |
CN104899501A (en) | Dialog list display method and device and terminal | |
CN108710791A (en) | The method and device of voice control | |
CN104217328A (en) | Multi-verification payment method and multi-verification payment device | |
CN106778225A (en) | The method and apparatus for processing password | |
CN106127062A (en) | unlocking method and device | |
CN106789070A (en) | The decryption method of data, device and terminal | |
CN107404429A (en) | Circle of friends answering method, device and computer-readable recording medium | |
CN106845199A (en) | Object authentication method and device | |
CN105046127A (en) | Encryption and decryption method and apparatus | |
CN106096442B (en) | Applications trigger method and device | |
CN106778198A (en) | Perform the safety certifying method and device of operation | |
CN106791145A (en) | Short message management method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |