CN104333544B - Encryption method based on mobile terminal data file - Google Patents

Encryption method based on mobile terminal data file Download PDF

Info

Publication number
CN104333544B
CN104333544B CN201410576218.1A CN201410576218A CN104333544B CN 104333544 B CN104333544 B CN 104333544B CN 201410576218 A CN201410576218 A CN 201410576218A CN 104333544 B CN104333544 B CN 104333544B
Authority
CN
China
Prior art keywords
encryption
authorization code
mobile terminal
data file
dynamic authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410576218.1A
Other languages
Chinese (zh)
Other versions
CN104333544A (en
Inventor
任明和
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bozhi Xin'an (Nantong) Technology Co.,Ltd.
Original Assignee
CHONGQING ZHITAO INFORMATION TECHNOLOGY CENTER
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHONGQING ZHITAO INFORMATION TECHNOLOGY CENTER filed Critical CHONGQING ZHITAO INFORMATION TECHNOLOGY CENTER
Priority to CN201410576218.1A priority Critical patent/CN104333544B/en
Publication of CN104333544A publication Critical patent/CN104333544A/en
Application granted granted Critical
Publication of CN104333544B publication Critical patent/CN104333544B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The encryption method based on mobile terminal data file of the present invention, pass through the dynamic authorization code of third party's acquisition for mobile terminal, the dynamic authorization code management client of file data user terminal loading is submitted to, the encrypting and decrypting management of dynamic authorization code is carried out to the file data of the mobile terminal.The invention constructs one can not be by third party's physical isolation terminal that account system can be contacted directly or can directly be attacked, and the dynamic authorization code by being obtained from this third party's physical isolation terminal, to complete the encrypting and decrypting Certificate Authority of account.Thus user is facilitated independently, it is easy to the mobile terminal data file on one's own initiative to complete the decryption application of dynamic authorization code encryption, and establish application technology specification of the dynamic authorization code in information cloud storage of complete set, user is facilitated to spread to multi-field safety applications, greater security is provided the user, more convenient practicality, multi-field applicable safe encryption authorization technology.

Description

Encryption method based on mobile terminal data file
Technical field
The encryption method based on mobile terminal data file of the present invention, relates generally to computer information data encryption technology Field, synchronize the application of encryption safe management to file data in mobile terminal in particular with dynamic code encryption technology.
Background technology
Currently, when carrying out data storage, the method for generally use is clear-text way storage or used mobile terminal The secured fashion that system carries is stored.Usually, its AES arranged using the system of acquiescence and key are to storage Data on a storage medium carry out safe storage, or some concrete application uses its own defined algorithm and key to pin To being stored using the data of itself.
For security standpoint, the safety measure of data with existing storage can realize a certain degree of safeguard protection.But The degree that mobile terminal user participates in its data protection is inadequate.Due to existing methods popularity, the publicity of algorithm and latent Key knowability, the security mechanism that either system carries still for application safety precautions, be all likely to occur The risk that the data that user is stored in the case of unwitting are cracked, so as to cause secret or the privacy number on mobile terminal According to leakage.The characteristics of due to cloud mode, data owner no longer safeguard the carrier of data storage, and user is regardless of which cloud of selection Service provider must be to its complete trust.But in reality, the data of user, especially with the number of intelligent terminal collection According to(Such as:Personal photo, communications records etc.)Often related to privacy, user is not intended to its completely entrusting to storage Service provider.Lack effective data safety preventive means turns into one of most important reason for hindering cloud service to promote.
Existing such as 360 bodyguards, mobile phone house keeper etc., realize and prompt alarm to the intrusion detection of mobile terminal, but do not have To the protection of file data after preventing from invading and steal by a kind of encryption technology;Although it is provided with password mould in open state Formula, but further encipherment protection is not carried out to subscriber data;Although there is the encryption box mode to file data protection, do not have Have and file data in encryption case is encrypted, and the static encryption pattern that user actively realizes is easy to be cracked;Especially It is the file data that user uploads high in the clouds by mobile terminal, is yet not carried out encipherment protection.
Documents 1, mobile terminal and method, application number:201310692720.4, it is proposed that a kind of number of mobile terminal According to security access mechanism, encrypted ones are independently set by user user, self establishment and functional module recommend two ways to enter The selection of row encrypted ones, and write storage from the data of mobile terminal and read storage both direction and data are encrypted/decrypted Security control, it is achieved thereby that the secure access of data.The problem of invention is present is that the autonomous setting code of user is easily simple Easily crack, be not easy to remember if complicated, and be used as a kind of static encryption technology, the possibility cracked by people is bigger.
Documents 2, the encryption cloud storage method based on intelligent mobile terminal, application number:Although 201210098906.2 A set of credit mechanism is established, but it configures proprietary hardware encryption card and brought to user using inconvenience, and use quiet State encryption mode, still escape the quagmire only easily cracked.
The content of the invention
The problem of present invention exists for above-mentioned encryption technology, it is proposed that total solution, using safe and secret degree High dynamic code(That is dynamic authorization code of the invention)Convenience application of the technology in mobile terminal and cloud storage field.This hair The bright encryption method based on mobile terminal data file, it is three patents of invention based on me formerly, one is, the individual person The root service system of part certification, the patent No.:2011102160995, the second is, the side of dynamic authorization code is established in identity-based certification Method, the patent No.:2014103040797, the third is, establish the unified dynamic authorization code system of business entity's account, the patent No.: 2014103039893, the specific computerized information field application on this three patent of invention technical foundation.
The encryption method based on mobile terminal data file of the present invention, for dynamic code encryption technology in mobile terminal pair The application of file data encryption, has done brand-new Technology design, and its innovative technique realized value includes:First, establish unified Dynamic authorization code applications client, facilitate user independently, it is easy to the data file on one's own initiative to complete dynamic authorization code Encrypting and decrypting application;2nd, dynamic authorization code is realized to the mobile terminal Auto-matching that is encrypted in of data file, facilitates user one Key encipherment protection data file security;3rd, by authorizing acquisition for mobile terminal dynamic authorization code, dynamic authorization code key has been prevented The possibility being stolen;4th, dynamic authorization code is obtained by the certification of legal capacity Verification System, ensure that the method for dynamic authorization code It is qualitative, improve the ability that dynamic authorization code technology participates in higher cryptographic security environmental applications;5th, add whole to application memory Hold the authorization identifying requirement of special parameter, ensure that steal information can not cracking;6th, realized by multi-enciphering technology, Improve the multiple protective dynamics of information;7th, application skill of the dynamic authorization code in information storage terminal of complete set is established Art specification, facilitate user to spread to multi-field safety applications, provide the user greater security, more necks of more convenient practicality Domain is applicable safe encryption authorization technology.
Whole dynamic authorization code application technology patent, includes entire series application technology Patent exploitation, everybody can join According to other Patents of the series of the present inventor, it is explained herein.
The encryption method based on mobile terminal data file of the present invention, it is in dynamic authorization code client, increase encryption Management module, encryption handling of the dynamic authorization code to mobile terminal storing card data file is realized, realize dynamic authorization code to moving Dynamic terminal uploads the encryption handling of high in the clouds data file.
Relative to the other-end under the same dynamic authorization code account of user, including PC terminals, server terminal and movement Terminal, the mobile terminal described in the present invention is reading end based on dynamic authorization code and encryption handling module is in same movement In terminal, its encryption handling module binding configuration is in dynamic authorization code reading client.Because this application feature will be sent out Life, it is therefore necessary to carry out the planning and designing of tighter dynamic authorization code encryption technology, is given herein with each user With explanation.
Encryption handling of the present invention to mobile terminal storage card private data file, comprise the following steps:
S1, start dynamic authorization code client, click on dynamic authorization code encryption management module;
S2, selection need the file menu encrypted, or further the individual data file for needing to encrypt is pointed in selection;
S3, acknowledgement key completion encryption is clicked on, generate encryption folder or generation data file encryption;
The data file encryption is migrated or backed up the encryption case storage for moving to setting by S4;Here to encrypting case It is same to use dynamic authorization code encryption, it is necessary to read the decryption of dynamic authorization code or be set as that acquiescence is read when opening encryption case Dynamic authorization code is decrypted.
S5, when need decrypt read data file encryption when, click on data file encryption, or open encryption storage box click on The data file encryption;
S6, background system are compared by the way that to mobile terminal related authentication parameter, dialog box is decrypted by rear ejection;
S7, dynamic authorization code client is opened, read dynamic authorization code, submit to decryption dialog box;Or automatic activation is moved State authorization code client, acquiescence read dynamic authorization code and submit to decryption dialog box;
S8, background system compare dynamic authorization code, the successful decryption if after comparing successfully.
The encryption handling that high in the clouds private data file is uploaded to mobile terminal, comprises the following steps:
S9, selection is clicked on by data file submission high in the clouds storage, ejection encryption pop-up;
S10, when selection to encrypt when, then click on confirm start dynamic authorization code encryption;
Encryption folder or generation data file encryption are generated after the completion of S11, encryption;
S12, encrypted data file is uploaded to the storage of high in the clouds storage server;
S13, when need to decrypt read cloud storage data file encryption when, click on the backup encryption data in mobile terminal File;Or the data file encryption is first downloaded to mobile terminal, then click on the data file encryption;
S14, background system are compared by the way that to mobile terminal relevant parameter certification, dialog box is decrypted by rear ejection;
S15, dynamic authorization code client is opened, read dynamic authorization code, submit to decryption dialog box;Or automatic activation is moved State authorization code client, acquiescence read dynamic authorization code and submit to decryption dialog box;
S16, after dynamic authorization code account identity authorization system certification is first passed through, background system restart comparison dynamic awards Weighted code, the data file successful decryption if after comparing successfully.
The encryption method based on mobile terminal data file of the present invention, the encrypting and decrypting management to data file, It is directly to be configured control in dynamic authorization code client.
The dynamic authorization code client, refer to the dynamic authorization code that far end system generation is read on mobile terminal is authorized The client of value;The dynamic authorization code, refer to after authenticating user identification system carries out authorization identifying, in setting time week Dynamic password password value is generated in time value at random, reads this dynamic password password value generated at random, it becomes possible to is realized to text The decryption management of number of packages evidence.
Further, dynamic authorization code client, be by apply obtain dynamic authorization code account after, or application obtain After VIP level account, in the client of mobile terminal mandate installation.
Further, after mobile terminal installation dynamic authorization code client, then authorize acquisition or automatically obtain Configuration is realized to the file on mobile terminal to the encryption handling module of mobile terminal data file in dynamic authorization code client The dynamic authorization code encryption decryption management of data and the file data for passing through mobile terminal upload cloud storage service device.
The encryption method based on mobile terminal data file of the present invention, the encryption to mobile terminal data file, Be by dynamic authorization code client, starting encryption handling module, select the data file on mobile terminal click on confirm plus After close, key locks, or multi-enciphering are challenged to the single dynamic authorization code response of Generating Data File on mobile terminal automatically Key locks are challenged in response, and for user according to different safety class and using needs, selection sets different encryption modes to realize pair The graded encryption protection of data file.
Key locks, including dynamic authorization code response challenge key are challenged in the multi-enciphering response, encrypt dynamic authorization Code accounts information challenge key, mobile terminal only string of code parameter response challenge key, mobile terminal hardware configuration parameter response Challenge key.
Further, cipher key locker is challenged in the single dynamic authorization code response of Generating Data File on mobile terminal It is fixed, it is other-end of the license under same dynamic authorization code account, is can be achieved with by the decryption of dynamic authorization code to the data The shared reading of file, then during to its encrypting and decrypting, it need not just start background system and compare by mobile terminal Related authentication parameter.
Key locks are challenged in the encryption method based on mobile terminal data file of the present invention, the multi-enciphering response, Or it is also different including the importance according to data file, or to encrypted data file, then carry out packet file And/or the encryption of storage dish, key locks mode is challenged by this multi-enciphering response, data file or cloud deposited to improve Store up the safeguard protection of data file.
The encryption method based on mobile terminal data file of the present invention, the background system are compared by mobile terminal Relevant parameter certification, refer to that background system is read out to the only string of code parameter of the mobile terminal and/or configuration hardware parameter Comparison is authenticated, and mobile terminal belonging to guarantee is the dynamic authorization code encryption account authorization mobile terminal.
The encryption method based on mobile terminal data file of the present invention, the automatic activation dynamic authorization code client, Acquiescence reads dynamic authorization code, is formerly to be set by the function of encryption handling module to realize, its techniqueflow includes:
S17, encryption handling module submit reading dynamic authorization code request instruction to give dynamic authorization code client;
S18, dynamic authorization code client are activated after obtaining request instruction, and instant dynamic authorization code value is generated in client;
After S19, encryption handling module are by first function setting crawl dynamic authorization code value, corresponding dynamic is submitted to automatically In authorization code response challenge secret key decryption frame;
After S20, response challenge secret key decryption frame obtain dynamic authorization code value, encryption handling module activation ACK button, from The dynamic dynamic authorization code value that will obtain submits background system completion certification to compare;
S21, background system compare the acquiescence decryption for successfully, being automatically performed dynamic authorization code.
The encryption method based on mobile terminal data file of the present invention, when mobile terminal is in suspension state, Wu Fayu When authentication mandate and the reading of dynamic authorization code are completed in dynamic authorization code backstage, or it is set as automatic complete encrypted state, or It is set as automatic complete decrypted state, or is set as Partial encryption state.
It is described to be set as Partial encryption state, it is to be set according to formerly classification, the important private data file of user is carried out After first step dynamic authorization code encryption, then carry out multi-enciphering or key encryption, when mobile terminal is in suspension state, setting Other multiple later stages encryptions or after a key encryption function automatically terminates, its by first step dynamic authorization code encryption data text Part is also in encrypted state.
The encryption method based on mobile terminal data file of the present invention, the encryption of the key encryption function, refer to full The convenience of sufficient customer mobile terminal information security needs, and is set according to first function, passes through one to mobile terminal data file Key encryption function is come the encipherment protection completed.
The one key encryption function, refers to formerly set by function or user selects setting, the storage to mobile terminal Card or vital document clip module boot up automatic dynamic mandate code encryption.
Further, after starting key encryption function encryption, the encrypted data of the mobile terminal are read in mobile terminal File must all obtain the decryption and authorization of dynamic authorization code.
Further, encrypted data file is read outside the mobile terminal, it is necessary to obtain the solution of dynamic authorization code Close mandate.
Or further, the data file encryption of the mobile terminal is extracted in any modification, it is necessary to obtains dynamic authorization code Decryption and authorization.
The encryption method based on mobile terminal data file of the present invention, when stealing data file from cloud storage account Afterwards, mobile terminal is read because departing to authorize, dynamic authorization code key can not be obtained, or can not further reply other multinomial shiftings Move terminal parameter authentication challenge key and can not read.
Or the self-destruction of unauthorized reading file data can be further arranged to, the unauthorized reading self-destruction, refer to When unauthorized terminal reads data file encryption, file data will be set according to first, or warning prompt starts self-destruction program, or Directly initiate self-destruction program.
The encryption method based on mobile terminal data file of the present invention, permit a dynamic authorization code encryption account, it is right Other multiple storage terminals realize encryption handling, are by storing terminal loads dynamic authorization code pipe each respectively after mandate Manage client;Or the dynamic authorization code management client of each storage terminal loads in same account carries out mutual list Empowerment management.
Brief description of the drawings
Accompanying drawing is that the technology of the encryption method of the invention based on mobile terminal data file implements Organization Chart.
Embodiment
The specific embodiment of the present invention is illustrated below in conjunction with accompanying drawing.It should be appreciated that embodiment described herein It is merely to illustrate and explain the present invention, is not intended to limit the present invention.
The present embodiment includes following two parts:
First, dynamic authorization code comprises the following steps to the encryption handling of mobile terminal storing card data file:
S1, start dynamic authorization code client 102, click on dynamic authorization code encryption management module 101.
S2, selection need the file menu 104 encrypted, or further the individual data file for needing to encrypt is pointed in selection 104。
S3, acknowledgement key completion encryption is clicked on, generate encryption folder 104 or generation data file encryption 104.
The data file encryption 104 is migrated or backed up the encryption case for moving to and being set on mobile terminal 103 by S4 Storage 105.
S5, when need decrypt read data file encryption 104 when, click on data file encryption 104, or open encryption storage Case 105 clicks on the data file encryption 104.
S6, background system 107 are compared by the way that to the related authentication parameter of mobile terminal 103, dialog box is decrypted by rear ejection; If it by certification can not prompt that decryption can not be started.
S7, dynamic authorization code client 102 is opened, read dynamic authorization code, submit to decryption dialog box;Or automatic activation Dynamic authorization code client 102, acquiescence read dynamic authorization code and submit to decryption dialog box.
S8, the comparison dynamic authorization code of background system 107, the successful decryption if after comparing successfully, further, or by dynamic After the certification of state authorization code account identity authorization system 108, background system 107, which is restarted, compares dynamic authorization code, such as compares successfully Then successful decryption afterwards.
2nd, the encryption handling of cloud storage end data file is uploaded to mobile terminal, is comprised the following steps:
Data file 104 is submitted high in the clouds to store 106 by S9, click selection, and dynamic authorization code encryption management module 101 is automatic Activation starts ejection encryption pop-up.
S10, when selection to encrypt when, then click on confirm start dynamic authorization code encryption.
Encryption folder 104 or generation data file encryption 104 are generated after the completion of S11, encryption.
S12, encrypted data file 104 is uploaded into high in the clouds storage server 106 stored.
S13, when need decrypt read 106 data file encryption 104 of cloud storage when, clicked in mobile terminal 103 described standby Part data file encryption 104;Or first download the data file encryption 104 and arrive mobile terminal 103, then click on the encryption data File 104.
S14, background system 107 are compared by the related authentication parameter of mobile terminal 103, passing through rear ejection decryption dialogue Frame;If it by certification can not prompt that decryption can not be started.
S15, dynamic authorization code client 102 is opened, read dynamic authorization code, submit to decryption dialog box;It is or automatic sharp Mobile Forms authorization code client 102, acquiescence read dynamic authorization code and submit to decryption dialog box.
S16, by the certification of dynamic authorization code account identity authorization system 108 after, background system 107 restart comparison dynamic Authorization code, the successful decryption if after comparing successfully.
In summary, the encryption method of the invention based on mobile terminal data file, its innovative technique valency realized Value includes:First, unified dynamic authorization code applications client is established, facilitates user independently, on one's own initiative to the data file Simplicity completes the decryption application of dynamic authorization code encryption;2nd, by dynamic authorization code to data file to be encrypted in mobile terminal automatic Matching is realized, facilitates the key encipherment protection data file security of user one;3rd, by authorizing acquisition for mobile terminal dynamic authorization code, The possibility that dynamic authorization code key is stolen is prevented;4th, dynamic authorization code is obtained by the certification of legal capacity Verification System, The legal of dynamic authorization code is ensure that, improves the energy that dynamic authorization code technology participates in higher cryptographic security environmental applications Power;5th, add to the requirement of the authorization identifying of application memory terminal special parameter, ensure that steal information can not cracking;6th, Realized by multi-enciphering technology, improve the multiple protective dynamics of information;7th, the dynamic authorization code for establishing complete set exists Information stores the application technology specification of terminal, facilitates user to spread to multi-field safety applications, provides the user more high safety Property, the multi-field of more convenient practicality is applicable safe encryption authorization technology.

Claims (10)

1. based on the encryption method of mobile terminal data file, it is characterised as in dynamic authorization code client, increase encryption pipe Module is managed, the encryption handling to mobile terminal storing card data file using dynamic authorization code encryption technology is realized, realizes and utilize Dynamic authorization code encryption technology is to the encryption handling by mobile terminal upload high in the clouds data file;
The encryption handling to mobile terminal storing card data file, comprise the following steps:
S1, start dynamic authorization code client, click on dynamic authorization code encryption management module;
S2, selection need the file menu encrypted, or further the individual data file for needing to encrypt is pointed in selection;
S3, acknowledgement key completion encryption is clicked on, generate encryption folder or generation data file encryption;
The data file encryption is migrated or backed up the encryption storage box storage for moving to setting by S4;
S5, when need decrypt read data file encryption when, click on data file encryption, or open encryption storage box click on described in Data file encryption;
S6, background system compare mobile terminal relevant parameter, by ejecting decryption dialog box after certification;
S7, dynamic authorization code client is opened, read dynamic authorization code, submit to decryption dialog box;Or automatic activation dynamic is awarded Weighted code client, acquiescence read dynamic authorization code and submit to decryption dialog box;
S8, background system compare dynamic authorization code, the successful decryption if after comparing successfully;
The encryption handling that high in the clouds data file is uploaded to mobile terminal, comprises the following steps:
S9, selection is clicked on by data file submission high in the clouds storage, ejection encryption pop-up;
S10, when selection to encrypt when, then click on confirm start dynamic authorization code encryption;
Encryption folder or generation data file encryption are generated after the completion of S11, encryption;
S12, encrypted data file is uploaded to the storage of high in the clouds storage server;
S13, when need to decrypt read cloud storage data file encryption when, it is literary to click on the backup encryption data in mobile terminal Part;Or the data file encryption is first downloaded to mobile terminal, then click on the data file encryption;
S14, background system compare mobile terminal relevant parameter, by ejecting decryption dialog box after certification;
S15, dynamic authorization code client is opened, read dynamic authorization code, submit to decryption dialog box;Or automatic activation dynamic is awarded Weighted code client, acquiescence read dynamic authorization code and submit to decryption dialog box;
S16, after dynamic authorization code account identity authorization system certification is first passed through, background system restarts comparison dynamic authorization Code, the data file successful decryption if after comparing successfully.
2. the encryption method according to claim 1 based on mobile terminal data file, it is characterised by described to data file Encrypting and decrypting management, be directly to be configured control in dynamic authorization code client;
The dynamic authorization code client, refer to read the dynamic authorization code value that far end system generates on mobile terminal is authorized Client;The dynamic authorization code, refer to after authenticating user identification system carries out authorization identifying, in setting time periodic quantity Interior random generation dynamic password password value, reads this dynamic password password value generated at random, it becomes possible to realize to number of files According to decryption management;
Further, dynamic authorization code client, be by apply obtain dynamic authorization code account after, or application obtain VIP After rank account, in the client of mobile terminal mandate installation;
Further, after mobile terminal installation dynamic authorization code client, then authorize acquisition or automatically obtain in dynamic Configuration is realized to the file data on mobile terminal to the encryption handling module of mobile terminal data file in authorization code client Management is decrypted with the dynamic authorization code encryption for the file data that cloud storage service device is uploaded by mobile terminal.
3. the encryption method according to claim 1 based on mobile terminal data file, it is characterised by described to mobile terminal The encryption of data file, it is by dynamic authorization code client, starting encryption handling module, selecting the data on mobile terminal After file clicks on confirmation encryption, cipher key locker is challenged to the single dynamic authorization code response of Generating Data File on mobile terminal automatically It is fixed, or multi-enciphering response challenge key locks, for user according to different safety class needs, selection sets different encryption modes next Realize and the graded encryption of data file is protected;
Key locks, including dynamic authorization code response challenge key are challenged in the multi-enciphering response, encrypt dynamic authorization code account Family message challenge key, mobile terminal only string of code parameter response challenge key, mobile terminal hardware configuration parameter response challenge Key;
Further, key locks are challenged in the single dynamic authorization code response of Generating Data File on mobile terminal, are Permit the other-end under same dynamic authorization code account, be can be achieved with by the decryption of dynamic authorization code to the data file Shared to read, then during to its encrypting and decrypting, the relevant parameter that mobile terminal is just compared without startup background system is implemented Identifying procedure.
4. the encryption method according to claim 3 based on mobile terminal data file, it is characterised by that the multi-enciphering should Challenge key locks are answered, or also include the importance difference according to data file, or to encrypted data file, then enter Row data APMB package presss from both sides and/or the encryption of storage dish, key locks mode is challenged by this multi-enciphering response, to improve pair The safeguard protection of data file or cloud storage data file.
5. the encryption method according to claim 1 based on mobile terminal data file, it is characterised by backstage described in S6/S14 System compares mobile terminal relevant parameter and is authenticated, refer to background system to the only string of code parameter of the mobile terminal and/or Configuration hardware parameter is read out comparison and is authenticated, and mobile terminal belonging to guarantee is that the dynamic authorization code encryption account authorization is moved Dynamic terminal.
6. the encryption method according to claim 1 based on mobile terminal data file, it is characterised by that the automatic activation is dynamic State authorization code client, acquiescence read dynamic authorization code, are formerly to be set by the function of encryption handling module to realize, its Techniqueflow includes:
S17, encryption handling module submit reading dynamic authorization code request instruction to give dynamic authorization code client;
S18, dynamic authorization code client are activated after obtaining request instruction, and instant dynamic authorization code value is generated in client;
After S19, encryption handling module are by first function setting crawl dynamic authorization code value, corresponding dynamic authorization is submitted to automatically In code response challenge secret key decryption frame;
After S20, response challenge secret key decryption frame obtain dynamic authorization code value, encryption handling module activation ACK button, automatically will Obtaining dynamic authorization code value submits background system to complete certification comparison;
S21, background system compare the acquiescence decryption for successfully, being automatically performed dynamic authorization code.
7. the encryption method based on mobile terminal data file according to claim 1, it is characterised by mobile terminal In suspension state, when authentication mandate and the reading of dynamic authorization code can not be completed with dynamic authorization code backstage, or it is set as certainly Complete encrypted state is moved, or is set as automatic complete decrypted state, or is set as Partial encryption state;
It is described to be set as Partial encryption state, it is to be set according to formerly classification, first is carried out to the important private data file of user Walk dynamic authorization code encryption after, then carry out multi-enciphering or a key encryption, when mobile terminal is in suspension state, setting its After his multiple later stage encryption or a key encryption function automatically terminate, its by first step dynamic authorization code encryption data file also In encrypted state.
8. the encryption method based on mobile terminal data file according to claim 7, it is characterised by the key encryption The encryption of function, refer to the convenience needs for meeting customer mobile terminal information security, set according to first function, to mobile whole End data file is by a key encryption function come the encipherment protection completed;
The one key encryption function, refers to formerly set by function or user selects setting, storage card to mobile terminal or Vital document clip module boots up automatic dynamic mandate code encryption;Further, after starting key encryption function encryption, moving Dynamic terminal, which reads the encrypted data file of the mobile terminal, must all obtain the decryption and authorization of dynamic authorization code;
Further, encrypted data file is read outside the mobile terminal, it is necessary to which the decryption for obtaining dynamic authorization code is awarded Power;
Or further, the data file encryption of the mobile terminal is extracted in any modification, it is necessary to obtains the decryption of dynamic authorization code Authorize.
9. the encryption method according to claim 1 based on mobile terminal data file, it is characterised by working as from cloud storage account In steal data file after, because depart from authorize read mobile terminal, dynamic authorization code key can not be obtained, or further can not Other multinomial challenge keys of response and can not read;
Or the self-destruction of unauthorized reading file data can be further arranged to, the unauthorized reading self-destruction, refer to award non- When weighing terminal reading data file encryption, file data will be set according to first, or warning prompt starts self-destruction program, or directly Start self-destruction program.
10. the encryption method according to claim 1 based on mobile terminal data file, it is characterised by permitting a dynamic to award Weighted code encrypt account, to it is multiple other storage terminals realize encryption handling, be by after mandate respectively in each storage terminal Load dynamic authorization code management client;
Further, or to the dynamic authorization code management client of each storage terminal loads in same account row-column list pipe is entered Reason.
CN201410576218.1A 2014-10-26 2014-10-26 Encryption method based on mobile terminal data file Active CN104333544B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410576218.1A CN104333544B (en) 2014-10-26 2014-10-26 Encryption method based on mobile terminal data file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410576218.1A CN104333544B (en) 2014-10-26 2014-10-26 Encryption method based on mobile terminal data file

Publications (2)

Publication Number Publication Date
CN104333544A CN104333544A (en) 2015-02-04
CN104333544B true CN104333544B (en) 2017-11-10

Family

ID=52408196

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410576218.1A Active CN104333544B (en) 2014-10-26 2014-10-26 Encryption method based on mobile terminal data file

Country Status (1)

Country Link
CN (1) CN104333544B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106919850B (en) * 2015-12-25 2020-09-04 腾讯科技(深圳)有限公司 File encryption and decryption method and device
CN105740728B (en) * 2016-03-30 2020-09-29 洋浦盒子数码网络科技有限公司 Mobile terminal, data encryption or decryption method
CN105791306B (en) * 2016-03-31 2019-05-31 北京奇虎科技有限公司 By the method and image forming apparatus of image synchronization to cloud disk
CN106254425A (en) * 2016-07-22 2016-12-21 北京京东尚科信息技术有限公司 For mobile device to high in the clouds the transmission method and system of data, mobile terminal
CN108229203A (en) * 2017-12-29 2018-06-29 北京安云世纪科技有限公司 Document protection method and device in a kind of terminal
TWI684115B (en) * 2018-06-04 2020-02-01 南臺學校財團法人南臺科技大學 Data deletion method in peer-to-peer system, certificate authentication system, computer program product and computer-readable recording medium
CN113821805B (en) * 2020-06-19 2023-12-26 北京达佳互联信息技术有限公司 Data encryption method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1773994A (en) * 2005-10-28 2006-05-17 广东省电信有限公司研究院 Method for realizing data safety storing business
CN102957708A (en) * 2012-11-19 2013-03-06 中国联合网络通信集团有限公司 Application encrypting and decrypting method, server and terminal
CN104104672A (en) * 2014-06-30 2014-10-15 重庆智韬信息技术中心 Method for establishing dynamic authorization code based on identity authentication
CN104104671A (en) * 2014-06-30 2014-10-15 重庆智韬信息技术中心 System for establishing unified dynamic authorization code for enterprise legal person account

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7688975B2 (en) * 2001-10-26 2010-03-30 Authenex, Inc. Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1773994A (en) * 2005-10-28 2006-05-17 广东省电信有限公司研究院 Method for realizing data safety storing business
CN102957708A (en) * 2012-11-19 2013-03-06 中国联合网络通信集团有限公司 Application encrypting and decrypting method, server and terminal
CN104104672A (en) * 2014-06-30 2014-10-15 重庆智韬信息技术中心 Method for establishing dynamic authorization code based on identity authentication
CN104104671A (en) * 2014-06-30 2014-10-15 重庆智韬信息技术中心 System for establishing unified dynamic authorization code for enterprise legal person account

Also Published As

Publication number Publication date
CN104333544A (en) 2015-02-04

Similar Documents

Publication Publication Date Title
CN104333544B (en) Encryption method based on mobile terminal data file
KR102308846B1 (en) System for accessing data from multiple devices
JP6275653B2 (en) Data protection method and system
CN105103119B (en) Data security service system
US9448949B2 (en) Mobile data vault
US20140164777A1 (en) Remote device secure data file storage system and method
EP2113856A1 (en) Secure storage of user data in UICC and Smart Card enabled devices
CN103763355A (en) Cloud data uploading and access control method
CN110706379A (en) Access control method and device based on block chain
CN102638568A (en) Cloud storage system and data management method thereof
CN101999125A (en) System and method for improving restrictiveness on accessingsoftware applications
CN104333452B (en) A kind of method to the encryption of file data more accounts
CN104333545A (en) Method for encrypting cloud storage file data
CN104363093B (en) The method encrypted by dynamic authorization code to file data
US10148433B1 (en) Private key/public key resource protection scheme
CN109584421A (en) A kind of intelligent door lock authentication administrative system based on domestic safety chip
KR101133210B1 (en) Mobile Authentication System and Central Control System
WO2017091133A1 (en) Method and system for secure storage of information
US20240022403A1 (en) Delivering random number keys securely for one-time pad symmetric key encryption
JP6451947B2 (en) Remote authentication system
CN109547484A (en) Remote authentication method and device thereof, equipment and storage medium
JP7293491B2 (en) Method and system for secure transactions
EP2479696A1 (en) Data security
EP3673633A1 (en) Method for authenticating a user with an authentication server
US12081546B2 (en) System for accessing data from multiple devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20190109

Address after: 210000 5 floor, 3 software Avenue, Yuhuatai District, Nanjing, Jiangsu, 168

Patentee after: Jiangsu's software Polytron Technologies Inc

Address before: 400039 Stone Road No. 186, No. 186, Kowloon slope District, Chongqing City, 21-1

Patentee before: CHONGQING ZHITAO INFORMATION TECHNOLOGY CENTER

CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 3, building 168, 5, 210000 software Avenue, Yuhuatai District, Jiangsu, Nanjing

Patentee after: Bozhi Safety Technology Co.,Ltd.

Address before: 3, building 168, 5, 210000 software Avenue, Yuhuatai District, Jiangsu, Nanjing

Patentee before: JIANGSU ELEX SOFTWARE TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220413

Address after: 226000 room 1402, 14 / F, building 11B, Zilang science and Technology City, No. 60, Chongzhou Avenue, development zone, Nantong City, Jiangsu Province

Patentee after: Bozhi Xin'an (Nantong) Technology Co.,Ltd.

Address before: 210000 5 floor, 3 software Avenue, Yuhuatai District, Nanjing, Jiangsu, 168

Patentee before: Bozhi Safety Technology Co.,Ltd.