CN103916233B - A kind of information ciphering method and device - Google Patents

A kind of information ciphering method and device Download PDF

Info

Publication number
CN103916233B
CN103916233B CN201410121024.2A CN201410121024A CN103916233B CN 103916233 B CN103916233 B CN 103916233B CN 201410121024 A CN201410121024 A CN 201410121024A CN 103916233 B CN103916233 B CN 103916233B
Authority
CN
China
Prior art keywords
information
sensitive data
data
password
recognition rule
Prior art date
Application number
CN201410121024.2A
Other languages
Chinese (zh)
Other versions
CN103916233A (en
Inventor
陈志军
张涛
张波
王琳
Original Assignee
小米科技有限责任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 小米科技有限责任公司 filed Critical 小米科技有限责任公司
Priority to CN201410121024.2A priority Critical patent/CN103916233B/en
Publication of CN103916233A publication Critical patent/CN103916233A/en
Application granted granted Critical
Publication of CN103916233B publication Critical patent/CN103916233B/en

Links

Abstract

The disclosure is directed to a kind of information ciphering method and device, this method includes:Obtain the information that terminal receives;It determines to whether there is sensitive data in described information using default recognition rule;When, there are during sensitive data, the sensitive data in described information being converted into secure data according to predetermined encryption rule in described information;Described information of the display with the secure data.Sensitive data when can determine in the information that terminal receives which data by presetting recognition rule, after these sensitive datas are found, these sensitive datas in information are converted into secure data according to predetermined encryption rule, last only information of the display with secure data, in above-mentioned ciphering process, it is participated in without user, sensitive data in information can be encrypted, therefore, in the case that the scheme that the disclosure provides can ensure that the sensitive data in the information received to terminal is encrypted, mitigate the operating burden of user, so as to improve the experience of user.

Description

A kind of information ciphering method and device

Technical field

The present invention relates to field of communication technology, more specifically, being related to information ciphering method and device.

Background technology

At present, in order to ensure that the information that terminal receives is not stolen by other people, there are much information encryption policies.

For relevant encryption policy there are mainly two types of mode, the first encryption policy is the letter that user manually receives terminal Breath is encrypted.For example, the terminal of user has received an important information, user is in order to ensure that the important information will not be by it Other people see, a password can be set to this important information, even if the terminal is stolen by other criminals, then illegal point Son can not also check the important information for being provided with password, can be very good to ensure the peace of the important information of terminal in this way Entirely.

Second of encryption policy presets some particular numbers for user, as long as terminal receives these particular numbers hair During the information sent, the information that will be sent to these particular numbers is encrypted.For example, the terminal of user is handed over another terminal Mutual information is mostly important information, so user pre-sets the number of another terminal as particular number, and is the specific number Code sets a specific cryptosystem, as long as terminal receives the information that particular number is sent, then terminal will be to particular number The information sent is encrypted automatically according to specific cryptosystem.

It is studying in practice process, inventor has found that above-mentioned correlation technique has at least the following problems:

For the first encryption policy mentioned above, although such encryption policy can be good at ensureing it is important in terminal The safety of information, but the important information that terminal receives might have many items, if user to each important information all It is encrypted, then the operating quantity of user may be excessively heavy, increases the operating burden of user.

For second of encryption policy mentioned above, although such mask strategy can more reduce the operation of user Amount, but all information that not particular number is sent all are important informations, so according to second of encryption policy, user checks All information of the particular number are required for decrypting, the number of operations decrypted so as to which user be added to need.

Therefore, how to ensure in the case that the important information of terminal is encrypted, mitigate the operating burden of user, become It needs most and solves the problems, such as at present.

The content of the invention

To overcome the problems, such as present in correlation technique, the disclosure provides a kind of information ciphering method and device, to ensure In the case that the important information of terminal is encrypted, mitigate the operating burden of user.

According to the embodiment of the present disclosure in a first aspect, provide a kind of information ciphering method, including:

Obtain the information that terminal receives;

It determines to whether there is sensitive data in described information using default recognition rule;

When in described information there are during sensitive data, according to predetermined encryption rule by the sensitive data in described information It is converted into secure data;

Described information of the display with the secure data.

Optionally, the default recognition rule includes at least one recognition rule, described to be determined using default recognition rule Include in described information with the presence or absence of sensitive data:

Judge to whether there is predetermined keyword in described information;

When there are during the predetermined keyword, determining recognition rule corresponding with the predetermined keyword in described information, It determines to whether there is sensitive data in described information using the recognition rule.

Optionally, the default recognition rule includes at least one recognition rule, described to be determined using default recognition rule Include in described information with the presence or absence of sensitive data:

A recognition rule in default recognition rule is obtained according to setting order;

It determines to whether there is sensitive data in described information using the recognition rule of acquisition;

When the recognition rule using acquisition determines that sensitive data is not present in described information, perform described suitable according to setting Sequence obtains the step of recognition rule in default recognition rule, until all in the traversal completion default recognition rule Recognition rule.

Optionally, the method further includes:

Receive the password input by user for being used to check the sensitive data;

Judge whether the password is correct;

When the password is correct, the secure data is reduced into the sensitive number according to the predetermined encryption rule According to, and show the described information with the sensitive data.

Optionally, the method further includes:

The initial time of described information of the record display with the sensitive data;

Judge whether the difference of current time and the initial time is more than threshold value;

When the difference of the current time and the initial time is more than threshold value, perform described according to predetermined encryption rule The step of sensitive data in described information is converted into secure data;

When the difference of the current time and the initial time is not more than threshold value, perform the judgement current time with The step of whether difference of the initial time is more than threshold value.

Optionally, the password is the arbitrary of the one or more in fixed password, dynamic password or gesture password Combination.

Optionally, it is described that the sensitive data in described information is converted into secure data step according to predetermined encryption rule Suddenly include:

The sensitive data of part in described information or the sensitive data of whole are turned according to predetermined encryption rule Change secure data into.

According to the second aspect of the embodiment of the present disclosure, a kind of information encryption device is provided, including:

Acquisition module, for obtaining the information that terminal receives;

Determining module, for determining to whether there is sensitive data in described information using default recognition rule;

Modular converter, in described information there are during sensitive data, will be in described information according to predetermined encryption rule The sensitive data be converted into secure data;

Display module, for showing the described information with the secure data.

Optionally, the determining module includes:

First judging submodule, for judging to whether there is predetermined keyword in described information;

First implementation sub-module, for, there are during the predetermined keyword, being determined and the default pass in described information The corresponding recognition rule of keyword determines to whether there is sensitive data in described information using the recognition rule.

Optionally, the determining module includes:

Acquisition submodule, for obtaining a recognition rule in default recognition rule according to setting order;

Determination sub-module, for determining to whether there is sensitive data in described information using the recognition rule of acquisition;

Control submodule, for when sensitive data is not present during described information is determined using the recognition rule of acquisition, touching Sending out acquisition submodule described performs operation, until traversal completes all recognition rules in the default recognition rule.

Optionally, further include:

Receiving module, for receiving the password input by user for being used to check the sensitive data;

Second judgment module, for judging whether the password is correct;

Second execution module, for when the password is correct, according to the predetermined encryption rule by the secure data The sensitive data is reduced into, and shows the described information with the sensitive data.

Optionally, further include:

Logging modle, for recording the initial time of described information of the display with the sensitive data;

Whether the 3rd judgment module, the difference for judging current time and the initial time are more than threshold value;

3rd execution module, for when the difference of the current time and the initial time is more than threshold value, performing institute State modular converter;When the difference of the current time and the initial time is not more than threshold value, performs the described 3rd and judge mould Block.

According to the third aspect of the embodiment of the present disclosure, a kind of information encryption device is provided, including:

Processor;

For storing the memory of processor-executable instruction;

Wherein, the processor is configured as:

Obtain the information that terminal receives;

It determines to whether there is sensitive data in described information using default recognition rule;

When in described information there are during sensitive data, according to predetermined encryption rule by the sensitive data in described information It is converted into secure data;

Described information of the display with the secure data.

The technical scheme provided by this disclosed embodiment can include the following benefits:It can be with by default recognition rule Determine which data is sensitive data in the information that terminal receives, and after these sensitive datas are found, advises according to predetermined encryption These sensitive datas in information are then converted into secure data, last only information of the display with secure data adds above-mentioned During close, participate in, the sensitive data in information can be encrypted without user, therefore, the scheme that the disclosure provides In the case of can ensureing that the sensitive data in the information received to terminal is encrypted, mitigate the operating burden of user, from And improve the experience of user.

It should be appreciated that above general description and following detailed description are only exemplary and explanatory, not The disclosure can be limited.

Description of the drawings

Attached drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the present invention Example, and the principle for explaining the present invention together with specification.

Fig. 1 is the flow chart according to a kind of information ciphering method shown in an exemplary embodiment.

Fig. 2 is the flow chart according to another information ciphering method shown in an exemplary embodiment.

Fig. 3 is the flow chart according to another information ciphering method shown in an exemplary embodiment.

Fig. 4 is the schematic diagram according to a kind of information encryption device shown in an exemplary embodiment.

Fig. 5 is the schematic diagram according to another information encryption device shown in an exemplary embodiment.

Fig. 6 is the schematic diagram according to another information encryption device shown in an exemplary embodiment.

Fig. 7 is the block diagram according to a kind of information encryption device shown in an exemplary embodiment.

Specific embodiment

Here exemplary embodiment will be illustrated in detail, example is illustrated in the accompanying drawings.Following description is related to During attached drawing, unless otherwise indicated, the same numbers in different attached drawings represent the same or similar element.Following exemplary embodiment Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects being described in detail in claims, of the invention.

Embodiment one

Fig. 1 is according to a kind of flow chart of information ciphering method shown in an exemplary embodiment, as shown in Figure 1, the letter Encryption for information method can be used in terminal, and this method can ensure that the sensitive data in the information received to terminal is encrypted In the case of, mitigate the operating burden of user, so as to improve the experience of user, this method comprises the following steps.

In step S101, the information that terminal receives is obtained.

Wherein, information can be the information such as short message or mail.The short message or mail of other-end transmission are received in terminal When information, which is arrived, in case below the step of use.

In step s 102, determine to whether there is sensitive data in information using default recognition rule.

Wherein, sensitive data refers to very important information for a user, if these very important information It once is stolen or loses, then user, which may exist, to lose property or lose private information, so the sensitive number in information According to needing to be identified, in order to which sensitive data is encrypted in subsequent step.

Default recognition rule is sensitive data for which data in identification information, so default recognition rule can be determined Justice is to include the recognition rule of at least one identification sensitive data.

For example, bank card account on the market is usually 16 bit digitals, bank card password is usually 6 bit digitals, then pre- If recognition rule can be set to inquire about continuous 16 bit digital or continuous 6 bit digital of inquiry, once so terminal receives To information in include continuous 16 bit digital or continuous 6 bit digital, then using default recognition rule just can recognize that come, And using 16 bit digitals or continuous 6 bit digital as sensitive data.Here continuous 16 bit digital of inquiry may be considered one Kind recognition rule, and inquire about continuous 6 bit digital and may be considered another recognition rule, both recognition rules are included in In default recognition rule.

It refers to shown in table 1, is default recognition rule and the sensitive number inquired according to default recognition rule shown in table 1 According to relation table.Assuming that default recognition rule receives for 16 continuous numbers of inquiry or the continuous number of inquiry 6, terminal To the information content for " bank card account of XX banks is 1111222233334444, and bank card password is 555555 ", then The sensitive data that can be inquired using default recognition rule is " 1111222233334444 " and " 555555 ", in order to follow-up These sensitive datas can be encrypted in step, can be stolen to avoid by disabled user.

Default recognition rule Sensitive data The continuous number of inquiry 16 1111222233334444 The continuous number of inquiry 6 555555

Table 1

For another example, the account of certain chat software is continuous 10 bit digital, and the password of this chat software is to include English With the combining characters of number, and the digit of the combining characters is between 8 to 12, then default recognition rule can be set To inquire about continuous 10 bit digital or inquiry continuously between 8 to 12 and comprising English and digital combining characters, institute Once in the information received with terminal comprising continuous 10 bit digital or continuously between 8 to 12 and comprising English with The combining characters of number, then just can recognize that come and by continuous 10 bit digital or continuously 8 using default recognition rule Position is between 12 and the combining characters comprising English and number are as sensitive data.Here continuous 10 bit digital of inquiry can To be considered a kind of recognition rule, inquiry is continuously between 8 to 12, and the combining characters comprising English and number can be with It is considered another recognition rule, both recognition rules are included in default recognition rule.

It refers to shown in table 2, is default recognition rule and the sensitive number inquired according to default recognition rule shown in table 2 According to relation table.Assuming that default recognition rule for inquire about continuous 10 bit digital or inquiry continuously between 8 to 12 and Comprising English with number combining characters, the information content that terminal receives for " account of XX chat softwares is 1234567890, The password of chat software is ABCD1234 ", then the sensitive data that can be inquired using default recognition rule is " 1234567890 " and " ABCD1234 ", can be to avoid quilt in order to which these sensitive datas can be encrypted in subsequent step Disabled user steals.

Table 2

In an optional embodiment, the first recognition rule that can be included since default recognition rule, according to With the presence or absence of sensitive data in secondary judgement information, until determining that there are sensitive data or all identification rule of traversal completion in information Then.It is the operating procedure of the optional embodiment below:Step 1), obtain according to setting order one in default recognition rule Recognition rule;Step 2), using the recognition rule of acquisition determine in information whether there is sensitive data;Step 3), when using obtaining When the recognition rule taken determines that sensitive data is not present in information, step 1 is performed), until traversal is completed in default recognition rule All recognition rules.

In step s 103, when in information there are during sensitive data, according to predetermined encryption rule by the sensitive number in information According to being converted into secure data.

Wherein, predetermined encryption rule is used to that the sensitive data in information to be encrypted to obtain secure data, and setting is default There are many kinds of the modes of encryption rule, both the sensitive data of part in information can be converted into safety according to predetermined encryption rule The sensitive data of part in information can also be converted into secure data by data according to predetermined encryption rule.For example, pass through step S102 determines the sensitive data in information as " 1234567890 " and " ABCD1234 ", and encryption rule is by the sensitive number in information According to becoming symbol " * ", then after the conversion of step S103, sensitive data " 1234567890 " and " ABCD1234 " will become Into secure data " * * * * * * * * * * " and " * * * * * * * * ".For another example, determine that the sensitive data in information is by step S102 " 1234567890 " and " ABCD1234 ", encryption rule is that the center section of the sensitive data in information is become symbol " * ", quick Feel data head and the tail character it is constant, then after the conversion of step S103, sensitive data " 1234567890 " and " ABCD1234 " will become secure data " 1********0 " and " A******4 ".For another example, information is determined by step S102 In sensitive data for " 1234567890 " and " ABCD1234 ", encryption rule is by the odd bits change of the sensitive data in information Into symbol " * ", the even number invariant position of sensitive data, then after the conversion of step S103, sensitive data " 1234567890 " " ABCD1234 " will become secure data " * 2*4*6*8*0 " and " * B*D*2*4 ".

In step S104, information of the display with secure data.

Where it is assumed that the information content that terminal receives is " account of XX chat softwares is 1234567890, chat software Password be ABCD1234 ", " 1234567890 " and " ABCD1234 " are learnt by step S102 as sensitive data, by step Sensitive data " 1234567890 " and " ABCD1234 " are become secure data by S103 according to predetermined encryption rule " * * * * * * * * * * " and " * * * * * * * * ", this step S104 will show that the information content is the " account of XX chat softwares It is * * * * * * * * * *, the password of chat software is * * * * * * * * ", so even if the lost terminal or information of user are stolen by hacker It takes, then hacker can not also learn the important information of user.

In the embodiment shown in fig. 1, the scheme that the disclosure provides can determine that terminal receives by default recognition rule To information in which data be sensitive data, will be in information according to predetermined encryption rule after these sensitive datas are found These sensitive datas are converted into secure data, last only information of the display with secure data, in above-mentioned ciphering process, without User participates in, and the sensitive data in information can be encrypted, and therefore, the scheme that the disclosure provides can ensure to terminal In the case that sensitive data in the information received is encrypted, mitigate the operating burden of user, so as to improve user's Experience.

Embodiment two

Shown in Figure 2, Fig. 2 is the flow according to another information ciphering method shown in an exemplary embodiment Figure.Since the present embodiment is the improvement based on embodiment one, so referring to reality with one something in common of embodiment in the present embodiment The content of example one is applied, duplicate contents will not be described in great detail.The embodiment that the disclosure provides can be applied in the terminal.The present embodiment is public The predetermined keyword that each sensitive data often can be coordinated appearance by the method opened in advance is found out, by each sensitive data Recognition rule is contacted with predetermined keyword foundation, once find that there are predetermined keywords in information, then just according to the default pass The corresponding recognition rule of keyword goes to determine the sensitive data in information, and the sensitive data in location information is more in this way Fast.This method comprises the following steps.

In step s 201, the information that terminal receives is obtained.

In step S202, judge with the presence or absence of predetermined keyword in information, if it is, performing step S203.

Wherein, if the species of sensitive data reaches tens kinds, then just need to define sentencing for this tens kinds of sensitive datas Other method when receiving information, it is necessary to after being judged by the method for discrimination of tens kinds of sensitive datas, can be determined quick Feel data, so for the species of sensitive data it is more when, it may appear that the problem of recognition speed is slow.For the species of sensitive data More situation can pre-define the corresponding recognition rule of each sensitive data, and in advance pass through each sensitive data The predetermined keyword that often cooperation occurs is found out, and the recognition rule of each sensitive data and predetermined keyword foundation is contacted, one Denier finds that there are predetermined keywords in information, then just goes to determine in information according to the corresponding recognition rule of the predetermined keyword Sensitive data, the sensitive data in location information is more quick in this way.

For example, when sensitive data is bank card account number and bank card password, bank card account is 16 bit digitals, and bank card is close Code is 6 bit digitals.The corresponding recognition rule of such sensitive data is inquires about continuous 16 bit digital or inquiry continuous 6 Bit digital, such sensitive data often coordinate the predetermined keyword of appearance for " bank card account number ", " bank card password ", " money transfer amount " etc..If the information received is " bank card account of XX banks is 1111222233334444, and bank card is close Code is 555555 ", then first determines whether that judging result, which is to determine in the information, to be existed with the presence or absence of predetermined keyword in the information Predetermined keyword " bank card account number " and " bank card password ", then start the corresponding recognition rule of the keyword, i.e. inquiry connects Continuous 16 bit digitals or continuous 6 bit digital of inquiry, the sensitive data that can be inquired using recognition rule are " 1111222233334444 " and " 555555 ".

In step S203, determine recognition rule corresponding with predetermined keyword, determined using recognition rule be in information It is no that there are sensitive datas.

Wherein, the recognition rule mentioned in step S203 from the default recognition rule mentioned in step S204 be it is different, Recognition rule represents the recognition rule for corresponding to a certain sensitive data, and default recognition rule represents to correspond at least one sensitive The recognition rule of data.For example, recognition rule corresponds only to the recognition rule of bank card account number and bank card password, and preset and know Rule can both not correspond only to the recognition rule of bank card account number and bank card password, may correspond to a variety of sensitive datas Recognition rule.

In step S204, when in information there are during sensitive data, according to predetermined encryption rule by the sensitive number in information According to being converted into secure data.

In step S205, information of the display with secure data.

In the embodiment shown in Figure 2, the method that embodiment of the disclosure provides can in advance pass through each sensitive data The predetermined keyword that often cooperation occurs is found out, and the recognition rule of each sensitive data and predetermined keyword foundation is contacted, one Denier finds that there are predetermined keywords in information, then just goes to determine in information according to the corresponding recognition rule of the predetermined keyword Sensitive data, the sensitive data in location information is more quick in this way.

Embodiment three

Shown in Figure 3, Fig. 3 is the flow according to another information ciphering method shown in an exemplary embodiment Figure.Since the present embodiment is the improvement based on embodiment one, so referring to reality with one something in common of embodiment in the present embodiment The content of example one is applied, duplicate contents will not be described in great detail.The embodiment that the disclosure provides can be applied in the terminal.The present embodiment is public The method opened can not only receive password input by user, so that user checks the information with sensitive data, moreover, showing After the information reaches the predetermined time, can the sensitive data in information be automatically converted into secure data, so as to lasting Ensure the safety of sensitive data in information.This method comprises the following steps.

In step S301, the information that terminal receives is obtained.

In step s 302, determine to whether there is sensitive data in information using default recognition rule.

In step S303, when in information there are during sensitive data, according to predetermined encryption rule by the sensitive number in information According to being converted into secure data.

In step s 304, information of the display with secure data.

In step S305, the password input by user for being used to check sensitive data is received.

Wherein, preset to check that the password of sensitive data can be there are many mode, for example, password can be to fix Password, or dynamic password, or gesture password or any combination of these three passwords, certain password Species can also be other types, it is not limited to the species provided.

In step S306, judge whether password is correct, if correctly, performing step S307.

Wherein, if password input by user is correct, then secure data is reduced into sensitivity according to predetermined encryption rule Data, in order to which user checks the original contents of the information.

In step S307, when password is correct, secure data is reduced into sensitive data according to predetermined encryption rule, and Information of the display with sensitive data.

In step S308, the initial time of information of the record display with sensitive data.

Wherein, correct password is inputted in user, and after showing the original contents of information, watches believing for user at this time The original contents of breath.After user finishes watching the original contents of information, in order to continue to ensure the sensitive data in the information not by Leakage can record the initial time for showing the information, and judge whether the difference of current time and initial time is more than threshold value, If greater than threshold value, then illustrate that the sensitive data needs in the information continue encrypted, so step S305 is performed, if No more than threshold value, illustrate to reach not yet the predetermined time, and judge in real time current time and initial time difference whether More than threshold value.

Threshold value is for the preset period, for example, threshold value can be set as 30 minutes, can also be set as that 1 is small When etc..

In step S309, judge whether the difference of current time and initial time is more than threshold value, if it is, performing step Otherwise rapid S303, performs step S309.

In the embodiment shown in fig. 3, method disclosed in the present embodiment can not only receive password input by user, display Go out the original contents of information, so that user checks the information with sensitive data;It is moreover, quick in the information in order to continue to ensure Sense data are not leaked, and after showing that the information reaches the predetermined time, automatically can be converted into pacifying by the sensitive data in information Total evidence, so as to the safety of sensitive data in lasting guarantee information.

Example IV

It is shown in Figure 4, Fig. 4 be according to a kind of module map of information encryption device shown in an exemplary embodiment, In the case that device disclosed in the present embodiment can ensure that the sensitive data in the information received is encrypted, mitigate user's Operating burden, so as to improve the experience of user.The device includes:

Acquisition module 11, for obtaining the information that terminal receives;

Determining module 12, for determining to whether there is sensitive data in information using default recognition rule;

Modular converter 13, in the information there are during sensitive data, according to predetermined encryption rule by the sensitivity in information Data conversion is into secure data;

Display module 14, for showing the information with secure data.

In the embodiment shown in fig. 4, the function of information encryption device provided in this embodiment is realized with embodiment one Function is corresponding, so the function on the present embodiment modules can be found in the content in embodiment one, herein no longer one by one It repeats.

Embodiment five

Shown in Figure 5, Fig. 5 is the module according to another information encryption device shown in an exemplary embodiment Figure, the predetermined keyword that each sensitive data often can be coordinated appearance by device disclosed in the present embodiment in advance are found out, will The recognition rule of each sensitive data is contacted with predetermined keyword foundation, once find that there are predetermined keywords in information, then It is just gone to determine the sensitive data in information according to the corresponding recognition rule of the predetermined keyword, in this way in location information Sensitive data it is more quick.The device includes:

Acquisition module 21, for obtaining the information that terminal receives;

Determining module 24, for determining to whether there is sensitive data in information using default recognition rule;

Optionally, determining module 24 can include the first judging submodule 22 and the first implementation sub-module 23, wherein, first Judging submodule 22, for judging to whether there is predetermined keyword in information;First implementation sub-module 23, for depositing in the information In predetermined keyword, determine recognition rule corresponding with predetermined keyword, the sensitive number in information is determined using recognition rule According to.

Optionally, determining module 24 can also include acquisition submodule, determination sub-module and control submodule, wherein, it obtains Submodule is taken, for obtaining a recognition rule in default recognition rule according to setting order;Determination sub-module, for utilizing The recognition rule of acquisition determines to whether there is sensitive data in information;Control submodule, for utilizing the recognition rule obtained When determining that sensitive data is not present in information, triggering acquisition submodule performs operation, until traversal is completed in default recognition rule All recognition rules.It is not shown in Figure 5 on acquisition submodule, determination sub-module and control submodule.

Modular converter 25, in the information there are during sensitive data, according to predetermined encryption rule by the sensitivity in information Data conversion is into secure data;

Display module 26, for showing the information with secure data.

In the embodiment shown in fig. 4, the function of information encryption device provided in this embodiment is realized with embodiment two Function is corresponding, so the function on the present embodiment modules can be found in the content in embodiment two, herein no longer one by one It repeats.

Embodiment six

Shown in Figure 6, Fig. 6 is the module according to another information encryption device shown in an exemplary embodiment Figure, device can not only receive password input by user disclosed in the present embodiment, so that user checks the letter with sensitive data Sensitive data in information moreover, after showing that the information reaches the predetermined time, automatically can be converted into secure data by breath, So as to the safety of sensitive data in lasting guarantee information.The device includes:

Acquisition module 31, for obtaining the information that terminal receives;

Determining module 32, for determining to whether there is sensitive data in information using default recognition rule;

Modular converter 33, in the information there are during sensitive data, according to predetermined encryption rule by the sensitivity in information Data conversion is into secure data;

Display module 34, for showing the information with secure data.

Receiving module 35, for receiving the password input by user for being used to check sensitive data;

Second judgment module 36, for judging whether password is correct;

Second execution module 37, for when password is correct, secure data to be reduced into sensitivity according to predetermined encryption rule Data, and show the information with sensitive data.

Logging modle 38, for recording the initial time of information of the display with sensitive data;

3rd judgment module 39, for judging whether the difference of current time and initial time is more than threshold value;

3rd execution module 310, for when the difference of current time and initial time is more than threshold value, performing modular converter 33;When the difference of current time and initial time is not more than threshold value, the 3rd judgment module 39 is performed.

In the embodiment shown in fig. 6, the function of information encryption device provided in this embodiment is realized with embodiment three Function is corresponding, so the function on the present embodiment modules can be found in the content in embodiment three, herein no longer one by one It repeats.

Embodiment seven

Fig. 7 is the block diagram according to a kind of information encryption device 800 shown in an exemplary embodiment.For example, device 800 can To be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices are good for Body equipment, personal digital assistant etc..

With reference to Fig. 7, device 800 can include following one or more assemblies:Processing component 802, memory 804, power supply Component 806, multimedia component 808, audio component 810, input/output(I/O)Interface 812, sensor module 814 and Communication component 816.

The integrated operation of 802 usual control device 800 of processing component, such as with display, call, data communication, phase Machine operates and record operates associated operation.Processing component 802 can refer to including one or more processors 820 to perform Order, to perform all or part of the steps of the methods described above.In addition, processing component 802 can include one or more modules, just Interaction between processing component 802 and other assemblies.For example, processing component 802 can include multi-media module, it is more to facilitate Interaction between media component 808 and processing component 802.

Memory 804 is configured as storing various types of data to support the operation in device 800.These data are shown Example is included for the instruction of any application program or method that are operated on device 800, contact data, and telephone book data disappears Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group It closes and realizes, such as static RAM(SRAM), electrically erasable programmable read-only memory(EEPROM), it is erasable to compile Journey read-only memory(EPROM), programmable read only memory(PROM), read-only memory(ROM), magnetic memory, flash Device, disk or CD.

Power supply module 806 provides electric power for the various assemblies of device 800.Power supply module 806 can include power management system System, one or more power supplys and other generate, manage and distribute electric power associated component with for device 800.

Multimedia component 808 is included in the screen of one output interface of offer between described device 800 and user.One In a little embodiments, screen can include liquid crystal display(LCD)And touch panel(TP).If screen includes touch panel, screen Curtain may be implemented as touch-screen, to receive input signal from the user.Touch panel includes one or more touch sensings Device is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding action Border, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more matchmakers Body component 808 includes a front camera and/or rear camera.When device 800 is in operation mode, such as screening-mode or During video mode, front camera and/or rear camera can receive external multi-medium data.Each front camera and Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.

Audio component 810 is configured as output and/or input audio signal.For example, audio component 810 includes a Mike Wind(MIC), when device 800 is in operation mode, during such as call model, logging mode and speech recognition mode, microphone by with It is set to reception external audio signal.The received audio signal can be further stored in memory 804 or via communication set Part 816 is sent.In some embodiments, audio component 810 further includes a loud speaker, for exports audio signal.

I/O interfaces 812 provide interface between processing component 802 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.

Sensor module 814 includes one or more sensors, and the state for providing various aspects for device 800 is commented Estimate.For example, sensor module 814 can detect opening/closed state of device 800, and the relative positioning of component, for example, it is described Component is the display and keypad of device 800, and sensor module 814 can be with 800 1 components of detection device 800 or device Position change, the existence or non-existence that user contacts with device 800,800 orientation of device or acceleration/deceleration and device 800 Temperature change.Sensor module 814 can include proximity sensor, be configured to detect without any physical contact Presence of nearby objects.Sensor module 814 can also include optical sensor, such as CMOS or ccd image sensor, for into As being used in application.In some embodiments, which can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure sensor or temperature sensor.

Communication component 816 is configured to facilitate the communication of wired or wireless way between device 800 and other equipment.Device 800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or combination thereof.In an exemplary implementation In example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 816 further includes near-field communication(NFC)Module, to promote short range communication.Example Such as, radio frequency identification can be based in NFC module(RFID)Technology, Infrared Data Association(IrDA)Technology, ultra wide band(UWB)Technology, Bluetooth(BT)Technology and other technologies are realized.

In the exemplary embodiment, device 800 can be by one or more application application-specific integrated circuit(ASIC), number letter Number processor(DSP), digital signal processing appts(DSPD), programmable logic device(PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components realize, for performing the above method.

In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided Such as include the memory 804 of instruction, above-metioned instruction can be performed to complete the above method by the processor 820 of device 800.For example, The non-transitorycomputer readable storage medium can be ROM, random access memory(RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..

A kind of non-transitorycomputer readable storage medium, when the instruction in storage medium is held by the processor of mobile terminal During row so that mobile terminal is able to carry out a kind of information ciphering method, and method includes:Obtain the information that terminal receives;It utilizes Default recognition rule determines to whether there is sensitive data in information;When, there are during sensitive data, being advised in information according to predetermined encryption The sensitive data in information is then converted into secure data;Information of the display with secure data.

Those skilled in the art will readily occur to the present invention its after considering specification and putting into practice invention disclosed herein Its embodiment.This application is intended to cover the present invention any variations, uses, or adaptations, these modifications, purposes or Person's adaptive change follows the general principle of the present invention and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.Description and embodiments are considered only as illustratively, and true scope and spirit of the invention are by following Claim is pointed out.

It should be appreciated that the invention is not limited in the precision architecture for being described above and being shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is only limited by appended claim.

Claims (5)

1. a kind of information ciphering method, which is characterized in that including:
Obtain the information that terminal receives;
Judge to whether there is predetermined keyword in described information;
When there are during the predetermined keyword, determine recognition rule corresponding with the predetermined keyword, utilization in described information The recognition rule determines to whether there is sensitive data in described information;
When there are during sensitive data, the sensitive data in described information is converted according to predetermined encryption rule in described information Into secure data;
Described information of the display with the secure data;
Receive the password input by user for being used to check the sensitive data;
Judge whether the password is correct;
When the password is correct, the secure data is reduced into the sensitive data according to the predetermined encryption rule, and Described information of the display with the sensitive data;
The initial time of described information of the record display with the sensitive data;
Judge whether the difference of current time and the initial time is more than threshold value;
When the difference of the current time and the initial time is more than threshold value, perform it is described according to predetermined encryption rule by institute State the step of sensitive data in information is converted into secure data;
When the difference of the current time and the initial time is not more than threshold value, perform the judgement current time with it is described The step of whether difference of initial time is more than threshold value.
2. information ciphering method according to claim 1, which is characterized in that the password is fixed password, dynamic password Or one or more kinds of any combination in gesture password.
3. information ciphering method according to claim 1, which is characterized in that it is described according to predetermined encryption rule by the letter The sensitive data in breath, which is converted into secure data step, to be included:
The sensitive data of the sensitive data of part in described information or whole is converted into according to predetermined encryption rule Secure data.
4. a kind of information encryption device, which is characterized in that including:
Acquisition module, for obtaining the information that terminal receives;
First judging submodule, for judging to whether there is predetermined keyword in described information;
First implementation sub-module, for, there are during the predetermined keyword, being determined and the predetermined keyword in described information Corresponding recognition rule determines to whether there is sensitive data in described information using the recognition rule;
Modular converter, in described information there are during sensitive data, according to predetermined encryption rule by the institute in described information It states sensitive data and is converted into secure data;
Display module, for showing the described information with the secure data;
Receiving module, for receiving the password input by user for being used to check the sensitive data;
Second judgment module, for judging whether the password is correct;
Second execution module, for when the password is correct, reducing the secure data according to the predetermined encryption rule Into the sensitive data, and show the described information with the sensitive data;
Logging modle, for recording the initial time of described information of the display with the sensitive data;
Whether the 3rd judgment module, the difference for judging current time and the initial time are more than threshold value;
3rd execution module, for when the difference of the current time and the initial time is more than threshold value, performing described turn Change the mold block;When the difference of the current time and the initial time is not more than threshold value, the 3rd judgment module is performed.
5. a kind of information encryption device, which is characterized in that including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Obtain the information that terminal receives;
Judge to whether there is predetermined keyword in described information;
When there are during the predetermined keyword, determine recognition rule corresponding with the predetermined keyword, utilization in described information The recognition rule determines to whether there is sensitive data in described information;
When there are during sensitive data, the sensitive data in described information is converted according to predetermined encryption rule in described information Into secure data;
Described information of the display with the secure data;
Receive the password input by user for being used to check the sensitive data;
Judge whether the password is correct;
When the password is correct, the secure data is reduced into the sensitive data according to the predetermined encryption rule, and Described information of the display with the sensitive data;
The initial time of described information of the record display with the sensitive data;
Judge whether the difference of current time and the initial time is more than threshold value;
When the difference of the current time and the initial time is more than threshold value, perform it is described according to predetermined encryption rule by institute State the step of sensitive data in information is converted into secure data;
When the difference of the current time and the initial time is not more than threshold value, perform the judgement current time with it is described The step of whether difference of initial time is more than threshold value.
CN201410121024.2A 2014-03-28 2014-03-28 A kind of information ciphering method and device CN103916233B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410121024.2A CN103916233B (en) 2014-03-28 2014-03-28 A kind of information ciphering method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410121024.2A CN103916233B (en) 2014-03-28 2014-03-28 A kind of information ciphering method and device

Publications (2)

Publication Number Publication Date
CN103916233A CN103916233A (en) 2014-07-09
CN103916233B true CN103916233B (en) 2018-05-29

Family

ID=51041654

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410121024.2A CN103916233B (en) 2014-03-28 2014-03-28 A kind of information ciphering method and device

Country Status (1)

Country Link
CN (1) CN103916233B (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410486A (en) * 2014-11-27 2015-03-11 西安酷派软件科技有限公司 Automatic encryption method, device and terminal
CN104506545B (en) * 2014-12-30 2017-12-22 北京奇安信科技有限公司 Leakage prevention method and device
CN105426745B (en) * 2015-10-28 2019-08-06 小米科技有限责任公司 Information display method and device
CN105635131B (en) * 2015-12-25 2019-06-25 东软集团股份有限公司 Transmit data method, device and server
CN105554745A (en) * 2016-01-27 2016-05-04 广东欧珀移动通信有限公司 Information management method and system
CN106156642A (en) * 2016-07-28 2016-11-23 宇龙计算机通信科技(深圳)有限公司 Data ciphering method and device
CN106295367A (en) * 2016-08-15 2017-01-04 北京奇虎科技有限公司 Data ciphering method and device
CN108111667A (en) * 2016-11-25 2018-06-01 北京搜狗科技发展有限公司 A kind of communication information encryption method, device and electronic equipment
CN106506153A (en) * 2016-11-28 2017-03-15 浙江齐治科技股份有限公司 One kind changes decryption method, device and fort machine automatically
CN106791087A (en) * 2016-12-20 2017-05-31 北京小米移动软件有限公司 The storage method of information, device and equipment
CN106603568B (en) * 2016-12-30 2019-09-17 Oppo广东移动通信有限公司 Data ciphering method, device and access point apparatus
CN106921952A (en) * 2017-01-25 2017-07-04 宇龙计算机通信科技(深圳)有限公司 Communication data method for transformation and mobile terminal
CN107102831A (en) * 2017-04-14 2017-08-29 北京小度信息科技有限公司 Data-printing method and apparatus
CN107147636A (en) * 2017-05-03 2017-09-08 北京小米移动软件有限公司 E-mail transmission method and device
CN107332973A (en) * 2017-05-19 2017-11-07 北京安云世纪科技有限公司 A kind of processing method of text data, device and mobile terminal
CN107508799B (en) * 2017-07-31 2018-12-04 珠海格力电器股份有限公司 A kind of information demonstrating method and device based on instant messaging
CN107493393A (en) * 2017-09-25 2017-12-19 深圳辉烨通讯技术有限公司 A kind of short message encryption method, device and mobile terminal
CN107748848A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 A kind of information processing method and mobile terminal
CN107846351A (en) * 2017-10-23 2018-03-27 苏州亿科赛卓电子科技有限公司 A kind of chat messages sensitive information encryption method and device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638459B (en) * 2012-03-23 2018-01-26 腾讯科技(深圳)有限公司 Authentication information Transmission system, authentication information transmission service platform and transmission method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005533438A (en) * 2002-07-12 2005-11-04 イングリアン ネットワークス インコーポレーテッドIngrian Networks,Inc. Encryption associated with the network
CN101957894B (en) * 2009-07-17 2015-08-12 精品科技股份有限公司 Conditional e-file authority controlling and managing system and method
CN103677647A (en) * 2013-12-06 2014-03-26 上海众人网络安全技术有限公司 Electronic device power-on password input method and electronic device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638459B (en) * 2012-03-23 2018-01-26 腾讯科技(深圳)有限公司 Authentication information Transmission system, authentication information transmission service platform and transmission method

Also Published As

Publication number Publication date
CN103916233A (en) 2014-07-09

Similar Documents

Publication Publication Date Title
RU2637427C2 (en) Method and instrument for intelligent device control
CN104021350B (en) Privacy information hidden method and device
CN104866750B (en) Using startup method and apparatus
CN104657674B (en) The insulation blocking system and method for private data in a kind of mobile phone
CN104991789B (en) Application program open method and device
CN104008348B (en) application control method, device and terminal
EP3413549B1 (en) Method and device for displaying notification information
EP2960823B1 (en) Method, device and system for managing authority
EP3001640A1 (en) Secure information exchange method and wearable device
CN104202306B (en) Access authentication method, Apparatus and system
CN104008635B (en) Apparatus control method and device
CN104850769B (en) Operation executes method and device
CN105119812B (en) In the method, apparatus and terminal device of chat interface change emoticon
EP3089065B1 (en) Method and device for permission management
CN104780155B (en) Apparatus bound method and device
CN104219058B (en) Authentication, identification authorization method and device
CN104112091A (en) File locking method and device
EP3133528B1 (en) Method and apparatus for fingerprint identification
CN104615240B (en) The unlocking method and a device of terminal
CN105184561A (en) Safety payment method and device
CN105120122A (en) Alarm method and device
CN104778416B (en) A kind of information concealing method and terminal
US20170185988A1 (en) Mpayment method and apparatus
CN104283876A (en) Operation authorization method and device
CN104468329B (en) Member adding method and device based on instant messaging

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant