CN104580160A - Information interaction method and system - Google Patents
Information interaction method and system Download PDFInfo
- Publication number
- CN104580160A CN104580160A CN201410783543.5A CN201410783543A CN104580160A CN 104580160 A CN104580160 A CN 104580160A CN 201410783543 A CN201410783543 A CN 201410783543A CN 104580160 A CN104580160 A CN 104580160A
- Authority
- CN
- China
- Prior art keywords
- file
- cryptographic algorithm
- receiving terminal
- transmitting terminal
- sent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Abstract
The invention provides an information interaction method and system. The information interaction method comprises the following steps: establishing communication connection between a sending terminal and a receiving terminal; operating a soft keyboard of the sending terminal for inputting, and sending file operation information to an encryption algorithm controller; adopting the encryption algorithm controller to acquire the identification result of the content input into the file, and controlling encrypted file communication after determining the encryption grade and encryption algorithm of the file. The information interaction method and system solve the problem of communication security when a cellphone starts a soft keyboard for communication with a PC.
Description
Technical field
The invention belongs to the mutual field of the communication information, particularly relate to a kind of information interacting method and system.
Background technology
Prior art discloses a kind of Alphalbet soft keyboard for mobile phone, relate to cellphone inputting method software, is a kind of soft keyboard.Purposes is the function substituting mobile phone alphabet key in mobile phone input process.The present invention is by the soft keyboard of display graphics in mobile phone screen, with the function of the form simulation mobile phone alphabet key of button in cellphone inputting method software, thus (such as inputting English letter or the Chinese phonetic alphabet) substitutes alphabet key in input process.Due to soft keyboard by English alphabet centralized displaying in mobile phone screen, user can be accomplished in search procedure very clear.And the letter shown in screen is all outstanding than the letter in button with definition whether great or small, ensure that good visuality.Make user no matter rather dark or rock in violent environment and normally can search letter.Owing to only need use the operation keyss such as the directionkeys of mobile phone or rocking bar in the process of operation soft keyboard, number of keys is few and fixing, and user is operated without the need to look at button, thus realizes being similar to the effect of touch system input in computer.
Such scheme does not consider that mobile phone is when enabling soft keyboard and communicating with PC computer, the problem how communication security ensures.
Summary of the invention
The invention provides a kind of information interacting method and system, to solve the problem.
The invention provides a kind of information interacting method.Said method comprises the following steps:
Transmitting terminal and receiving terminal establish a communications link;
Transmitting terminal runs soft keyboard and inputs, and file operation information is sent to cryptographic algorithm controller;
Cryptographic algorithm controller obtains recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, controls encrypt file communication.
The present invention also provides a kind of information interaction system, comprises transmitting terminal, cryptographic algorithm controller, receiving terminal; Wherein, described transmitting terminal is connected with described receiving terminal by described cryptographic algorithm controller;
Described transmitting terminal, for establishing a communications link with receiving terminal; Also for running soft keyboard input, file operation information is sent to cryptographic algorithm controller;
Described cryptographic algorithm controller, for obtaining the recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, controls encrypt file communication;
Described receiving terminal, for receiving the encrypt file that described cryptographic algorithm controller sends.
Compared to technology before, a kind of information interacting method provided by the invention and system, solve mobile phone when enabling soft keyboard and communicating with PC computer, the problem of communication secure.
In addition, by following scheme: the mode that transmitting terminal and receiving terminal establish a communications link is: transmitting terminal installs APP as input interface, and establish a communications link with receiving terminal or directly on transmitting terminal, write a functional module of framework layer and run, establish a communications link with receiving terminal; Enormously simplify the operation of user, improve the experience of user further.
In addition, by following scheme: after cryptographic algorithm controller receives the file operation information of transmitting terminal transmission, content in input file is identified, in conjunction with recognition result, secret grade and the cryptographic algorithm table of comparisons, after the secret grade determining file and cryptographic algorithm, encrypt described file and the described file after encryption is sent to described receiving terminal; Achieve the scheme carrying out automatically identifying encryption according to the content of user's input, communication security is ensured further.
In addition, by following superencipher scheme: cryptographic algorithm controller is according to the danger classes of transmitting terminal network used, in conjunction with network type, danger classes and the superencipher algorithm table of comparisons, determine superencipher algorithm, then adopt file described in described superencipher algorithm for encryption, be sent to described receiving terminal; Telex network is promoted safely further.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, and form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Figure 1 shows that the information interacting method flow chart of the embodiment of the present invention 1;
Figure 2 shows that the information interaction system structure chart of the embodiment of the present invention 2.
Embodiment
Hereinafter also describe the present invention in detail with reference to accompanying drawing in conjunction with the embodiments.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combine mutually.
Figure 1 shows that the information interacting method flow chart of the embodiment of the present invention 1, comprise the following steps:
Step 101: transmitting terminal and receiving terminal establish a communications link;
Transmitting terminal is mobile phone; Receiving terminal is PC computer and PC.
The mode that transmitting terminal and receiving terminal establish a communications link is: transmitting terminal installs APP as input interface, and establishes a communications link with receiving terminal.
The mode that transmitting terminal and receiving terminal establish a communications link can also be: directly on transmitting terminal, write a functional module of framework layer and run, establishing a communications link with receiving terminal.
Transmitting terminal interface display is a soft keyboard.
Transmitting terminal connects receiving terminal by USB or wifi.
Step 102: transmitting terminal runs soft keyboard and inputs, and file operation information is sent to cryptographic algorithm controller;
File operation information comprises: the content in the type of operation file, input file.
Step 103: cryptographic algorithm controller obtains recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, controls encrypt file communication.
Cryptographic algorithm controller obtains recognition result to the content in input file, and after the secret grade determining file and cryptographic algorithm, the process controlling encrypt file communication is:
Cryptographic algorithm controller obtains recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, encrypts described file and the described file after encryption is sent to described receiving terminal.
Cryptographic algorithm controller obtains recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, encrypts described file and the process described file after encryption being sent to described receiving terminal is:
After cryptographic algorithm controller receives the file operation information of transmitting terminal transmission, content in input file is identified, in conjunction with recognition result, secret grade and the cryptographic algorithm table of comparisons, after the secret grade determining file and cryptographic algorithm, encrypt described file and the described file after encryption is sent to described receiving terminal.
Recognition result, secret grade and the cryptographic algorithm table of comparisons
Recognition result | Secret grade | Cryptographic algorithm |
There is " account ", " amount of money " | Second grade | Cryptographic algorithm A |
There is " cellphone code ", " ID card No. " | The first estate | Cryptographic algorithm B |
Other | Nothing | Nothing |
Table 1
Wherein, secret grade is higher, and corresponding cryptographic algorithm is more complicated; As shown in table 1, the complexity of the cryptographic algorithm that the second grade is corresponding and cryptographic algorithm A is greater than the complexity of cryptographic algorithm corresponding to the first estate and cryptographic algorithm B; Complexity is higher, and the file of encryption is safer.
As shown in table 1, when recognition result is " other ", file is not encrypted.
In addition, cryptographic algorithm controller according to the danger classes of transmitting terminal network used, after carrying out superencipher, then can also be sent to described receiving terminal to described file.
Cryptographic algorithm controller can also according to the danger classes of transmitting terminal network used, and after carrying out superencipher to described file, then the process being sent to described receiving terminal is:
Cryptographic algorithm controller, according to the danger classes of transmitting terminal network used, in conjunction with network type, danger classes and the superencipher algorithm table of comparisons, is determined superencipher algorithm, is then adopted file described in described superencipher algorithm for encryption, be sent to described receiving terminal.
Network type, danger classes and the superencipher algorithm table of comparisons
Network type | Danger classes | Superencipher algorithm |
Network type M | Three grades | Cryptographic algorithm C |
Network type N | Secondary | Cryptographic algorithm D |
Network type P | One-level | Encryption algorithm F |
Table 2
Wherein, danger classes is higher, and corresponding superencipher algorithm is more complicated; As shown in table 2, the complexity of three grades of corresponding superencipher algorithms and cryptographic algorithm C is greater than the complexity of superencipher algorithm corresponding to secondary and cryptographic algorithm D; Complexity is higher, and the file of encryption is safer.
The judgment mode of danger classes divides according to network type, such as: the danger classes of PAN (Personal Area Network) is three grades; The danger classes of corporate lan is secondary, the danger classes of carrier network is one-level.
Citing is below described in detail:
Mobile phone installation APP is as input interface or directly on mobile phone, write a functional module of framework layer and run, and sets up the communication connection with PC computer; Mobile phone runs soft keyboard input, the content in the type of operation file, input file is sent to cryptographic algorithm controller; After cryptographic algorithm controller receives the file operation information of mobile phone transmission, content in input file is identified, if identify the information such as " account ", " amount of money ", then associative list 1, determine that secret grade is the second grade, cryptographic algorithm is cryptographic algorithm A, adopt cryptographic algorithm A to encrypt described file, then send to PC computer.
In addition, if mobile phone network used is corporate lan, then associative list 2 is known: danger classes is secondary, superencipher algorithm is cryptographic algorithm D, adopts file described in cryptographic algorithm D superencipher, is sent to PC computer.
Figure 2 shows that the information interaction system structure chart of the embodiment of the present invention 2, comprise transmitting terminal, cryptographic algorithm controller, receiving terminal; Wherein, described transmitting terminal is connected with described receiving terminal by described cryptographic algorithm controller;
Described transmitting terminal, for establishing a communications link with receiving terminal; Also for running soft keyboard input, file operation information is sent to cryptographic algorithm controller;
Described cryptographic algorithm controller, for obtaining the recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, controls encrypt file communication;
Described receiving terminal, for receiving the encrypt file that described cryptographic algorithm controller sends.
Compared to technology before, a kind of information interacting method provided by the invention and system, solve mobile phone when enabling soft keyboard and communicating with PC computer, the problem of communication secure.
In addition, by following scheme: the mode that transmitting terminal and receiving terminal establish a communications link is: transmitting terminal installs APP as input interface, and establish a communications link with receiving terminal or directly on transmitting terminal, write a functional module of framework layer and run, establish a communications link with receiving terminal; Enormously simplify the operation of user, improve the experience of user further.
In addition, by following scheme: after cryptographic algorithm controller receives the file operation information of transmitting terminal transmission, content in input file is identified, in conjunction with recognition result, secret grade and the cryptographic algorithm table of comparisons, after the secret grade determining file and cryptographic algorithm, encrypt described file and the described file after encryption is sent to described receiving terminal; Achieve the scheme carrying out automatically identifying encryption according to the content of user's input, communication security is ensured further.
In addition, by following superencipher scheme: cryptographic algorithm controller is according to the danger classes of transmitting terminal network used, in conjunction with network type, danger classes and the superencipher algorithm table of comparisons, determine superencipher algorithm, then adopt file described in described superencipher algorithm for encryption, be sent to described receiving terminal; Telex network is promoted safely further.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (8)
1. an information interacting method, is characterized in that, comprises the following steps:
Transmitting terminal and receiving terminal establish a communications link;
Transmitting terminal runs soft keyboard and inputs, and file operation information is sent to cryptographic algorithm controller;
Cryptographic algorithm controller obtains recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, controls encrypt file communication.
2. method according to claim 1, it is characterized in that: the mode that transmitting terminal and receiving terminal establish a communications link is: transmitting terminal set up applications APP is as input interface, and establish a communications link with receiving terminal or directly on transmitting terminal, write a functional module of framework framework layer and run, establish a communications link with receiving terminal.
3. method according to claim 1, is characterized in that, described file operation information comprises: the content in the type of operation file, input file.
4. method according to claim 1, is characterized in that: cryptographic algorithm controller obtains recognition result to the content in input file, and after the secret grade determining file and cryptographic algorithm, the process controlling encrypt file communication is:
Cryptographic algorithm controller obtains recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, encrypts described file and the described file after encryption is sent to described receiving terminal.
5. method according to claim 4, it is characterized in that: cryptographic algorithm controller obtains the recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, encrypt described file and the process described file after encryption being sent to described receiving terminal is:
After cryptographic algorithm controller receives the file operation information of transmitting terminal transmission, content in input file is identified, in conjunction with recognition result, secret grade and the cryptographic algorithm table of comparisons, after the secret grade determining file and cryptographic algorithm, encrypt described file and the described file after encryption is sent to described receiving terminal.
6. method according to claim 1, is characterized in that: cryptographic algorithm controller, also according to the danger classes of transmitting terminal network used, after carrying out superencipher, then is sent to receiving terminal to described file.
7. method according to claim 6, is characterized in that: cryptographic algorithm controller is also according to the danger classes of transmitting terminal network used, and after carrying out superencipher to described file, then the process being sent to receiving terminal is:
Cryptographic algorithm controller, according to the danger classes of transmitting terminal network used, in conjunction with network type, danger classes and the superencipher algorithm table of comparisons, is determined superencipher algorithm, is then adopted file described in described superencipher algorithm for encryption, be sent to described receiving terminal.
8. an information interaction system, is characterized in that, comprises transmitting terminal, cryptographic algorithm controller, receiving terminal; Wherein, described transmitting terminal is connected with described receiving terminal by described cryptographic algorithm controller;
Described transmitting terminal, for establishing a communications link with receiving terminal; Also for running soft keyboard input, file operation information is sent to cryptographic algorithm controller;
Described cryptographic algorithm controller, for obtaining the recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, controls encrypt file communication;
Described receiving terminal, for receiving the encrypt file that described cryptographic algorithm controller sends.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410783543.5A CN104580160A (en) | 2014-12-16 | 2014-12-16 | Information interaction method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410783543.5A CN104580160A (en) | 2014-12-16 | 2014-12-16 | Information interaction method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104580160A true CN104580160A (en) | 2015-04-29 |
Family
ID=53095341
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410783543.5A Pending CN104580160A (en) | 2014-12-16 | 2014-12-16 | Information interaction method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104580160A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107592963A (en) * | 2015-05-19 | 2018-01-16 | 皇家飞利浦有限公司 | Calculated with secret value |
CN108989440A (en) * | 2018-07-27 | 2018-12-11 | 上海爱优威软件开发有限公司 | A kind of document transmission method and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201286106Y (en) * | 2008-07-03 | 2009-08-05 | 许剑卓 | Safety equipment |
CN101534311A (en) * | 2009-04-14 | 2009-09-16 | 杨筑平 | An information security method and procedure |
CN101794365A (en) * | 2010-03-23 | 2010-08-04 | 中兴通讯股份有限公司 | Method for safely inputting information on mobile terminal and mobile terminal |
CN101953112A (en) * | 2008-02-25 | 2011-01-19 | 松下电器产业株式会社 | Information security device and information security system |
CN102880305A (en) * | 2012-09-24 | 2013-01-16 | 广东欧珀移动通信有限公司 | Keyboard input encryption method and mobile terminal thereof |
CN103886263A (en) * | 2014-03-19 | 2014-06-25 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for protecting data in mobile terminal |
-
2014
- 2014-12-16 CN CN201410783543.5A patent/CN104580160A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101953112A (en) * | 2008-02-25 | 2011-01-19 | 松下电器产业株式会社 | Information security device and information security system |
CN201286106Y (en) * | 2008-07-03 | 2009-08-05 | 许剑卓 | Safety equipment |
CN101534311A (en) * | 2009-04-14 | 2009-09-16 | 杨筑平 | An information security method and procedure |
CN101794365A (en) * | 2010-03-23 | 2010-08-04 | 中兴通讯股份有限公司 | Method for safely inputting information on mobile terminal and mobile terminal |
CN102880305A (en) * | 2012-09-24 | 2013-01-16 | 广东欧珀移动通信有限公司 | Keyboard input encryption method and mobile terminal thereof |
CN103886263A (en) * | 2014-03-19 | 2014-06-25 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for protecting data in mobile terminal |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107592963A (en) * | 2015-05-19 | 2018-01-16 | 皇家飞利浦有限公司 | Calculated with secret value |
CN107592963B (en) * | 2015-05-19 | 2020-05-19 | 皇家飞利浦有限公司 | Method and computing device for performing secure computations |
CN108989440A (en) * | 2018-07-27 | 2018-12-11 | 上海爱优威软件开发有限公司 | A kind of document transmission method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102682506B (en) | Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique | |
CN108769027B (en) | Secure communication method, device, mobile terminal and storage medium | |
EP3086587A1 (en) | Method and apparatus for transmitting and receiving encrypted message between terminals | |
CN105631987A (en) | Bluetooth access control unlocking method, device and system | |
CN104994098B (en) | Document transmission method and relevant apparatus and Transmission system | |
CN103458400A (en) | Key management method for voice encryption communication system | |
CN108449114B (en) | Bluetooth connection method and mobile terminal | |
CN105634737A (en) | Data transmission method, terminals and system thereof | |
US20150106614A1 (en) | Systems and methods of safeguarding user information while interacting with online service providers | |
CN105227578A (en) | The encryption and decryption method of transfer files and encryption and decryption device | |
US11252145B2 (en) | Cross-device access to one-time passwords | |
CN112307454A (en) | Data encryption method and device, storage medium and electronic equipment | |
CN105743844A (en) | Information processing method and electronic device | |
CN106341815A (en) | Wireless connection method, terminal and AP | |
CN102932791A (en) | Method for collaboratively processing information through WIFI wireless network between smart phone and computer | |
CN105933503B (en) | Information processing method and electronic equipment | |
CN105224274A (en) | A kind of information processing method and electronic equipment | |
CN104580160A (en) | Information interaction method and system | |
CN104796262A (en) | Data encryption method and terminal system | |
CN103036897A (en) | Communication method based on long distance desktop connection between thin client-side and server-side | |
CN105429903A (en) | Switch and configuration method | |
CN103546287A (en) | Password verification method and electronic equipment | |
CN104052654A (en) | Method and system for achieving chatting online | |
CN104219300A (en) | Coordinate transformation parameter sharing method and system | |
CN106254226A (en) | A kind of information synchronization method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C53 | Correction of patent of invention or patent application | ||
CB02 | Change of applicant information |
Address after: 200233 Guiping Road, Xuhui District, No. 391, building 20, floor 3, Applicant after: Shanghai Zhuo Yi Science and Technology Co., Ltd. Address before: 200233 Guiping Road, Xuhui District, No. 391, building 20, floor 3, Applicant before: Shanghai TYD Electronic Technology Co., Ltd. |
|
COR | Change of bibliographic data |
Free format text: CORRECT: APPLICANT; FROM: SHANGHAI TYD ELECTRONIC TECHNOLOGY CO., LTD. TO: SHANGHAI ZHUOYI TECHNOLOGY CO., LTD. |
|
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150429 |
|
RJ01 | Rejection of invention patent application after publication |