CN104580160A - Information interaction method and system - Google Patents

Information interaction method and system Download PDF

Info

Publication number
CN104580160A
CN104580160A CN201410783543.5A CN201410783543A CN104580160A CN 104580160 A CN104580160 A CN 104580160A CN 201410783543 A CN201410783543 A CN 201410783543A CN 104580160 A CN104580160 A CN 104580160A
Authority
CN
China
Prior art keywords
file
cryptographic algorithm
receiving terminal
transmitting terminal
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410783543.5A
Other languages
Chinese (zh)
Inventor
王小勇
陈磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI TYD ELECTRONIC TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI TYD ELECTRONIC TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI TYD ELECTRONIC TECHNOLOGY Co Ltd filed Critical SHANGHAI TYD ELECTRONIC TECHNOLOGY Co Ltd
Priority to CN201410783543.5A priority Critical patent/CN104580160A/en
Publication of CN104580160A publication Critical patent/CN104580160A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Abstract

The invention provides an information interaction method and system. The information interaction method comprises the following steps: establishing communication connection between a sending terminal and a receiving terminal; operating a soft keyboard of the sending terminal for inputting, and sending file operation information to an encryption algorithm controller; adopting the encryption algorithm controller to acquire the identification result of the content input into the file, and controlling encrypted file communication after determining the encryption grade and encryption algorithm of the file. The information interaction method and system solve the problem of communication security when a cellphone starts a soft keyboard for communication with a PC.

Description

A kind of information interacting method and system
Technical field
The invention belongs to the mutual field of the communication information, particularly relate to a kind of information interacting method and system.
Background technology
Prior art discloses a kind of Alphalbet soft keyboard for mobile phone, relate to cellphone inputting method software, is a kind of soft keyboard.Purposes is the function substituting mobile phone alphabet key in mobile phone input process.The present invention is by the soft keyboard of display graphics in mobile phone screen, with the function of the form simulation mobile phone alphabet key of button in cellphone inputting method software, thus (such as inputting English letter or the Chinese phonetic alphabet) substitutes alphabet key in input process.Due to soft keyboard by English alphabet centralized displaying in mobile phone screen, user can be accomplished in search procedure very clear.And the letter shown in screen is all outstanding than the letter in button with definition whether great or small, ensure that good visuality.Make user no matter rather dark or rock in violent environment and normally can search letter.Owing to only need use the operation keyss such as the directionkeys of mobile phone or rocking bar in the process of operation soft keyboard, number of keys is few and fixing, and user is operated without the need to look at button, thus realizes being similar to the effect of touch system input in computer.
Such scheme does not consider that mobile phone is when enabling soft keyboard and communicating with PC computer, the problem how communication security ensures.
Summary of the invention
The invention provides a kind of information interacting method and system, to solve the problem.
The invention provides a kind of information interacting method.Said method comprises the following steps:
Transmitting terminal and receiving terminal establish a communications link;
Transmitting terminal runs soft keyboard and inputs, and file operation information is sent to cryptographic algorithm controller;
Cryptographic algorithm controller obtains recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, controls encrypt file communication.
The present invention also provides a kind of information interaction system, comprises transmitting terminal, cryptographic algorithm controller, receiving terminal; Wherein, described transmitting terminal is connected with described receiving terminal by described cryptographic algorithm controller;
Described transmitting terminal, for establishing a communications link with receiving terminal; Also for running soft keyboard input, file operation information is sent to cryptographic algorithm controller;
Described cryptographic algorithm controller, for obtaining the recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, controls encrypt file communication;
Described receiving terminal, for receiving the encrypt file that described cryptographic algorithm controller sends.
Compared to technology before, a kind of information interacting method provided by the invention and system, solve mobile phone when enabling soft keyboard and communicating with PC computer, the problem of communication secure.
In addition, by following scheme: the mode that transmitting terminal and receiving terminal establish a communications link is: transmitting terminal installs APP as input interface, and establish a communications link with receiving terminal or directly on transmitting terminal, write a functional module of framework layer and run, establish a communications link with receiving terminal; Enormously simplify the operation of user, improve the experience of user further.
In addition, by following scheme: after cryptographic algorithm controller receives the file operation information of transmitting terminal transmission, content in input file is identified, in conjunction with recognition result, secret grade and the cryptographic algorithm table of comparisons, after the secret grade determining file and cryptographic algorithm, encrypt described file and the described file after encryption is sent to described receiving terminal; Achieve the scheme carrying out automatically identifying encryption according to the content of user's input, communication security is ensured further.
In addition, by following superencipher scheme: cryptographic algorithm controller is according to the danger classes of transmitting terminal network used, in conjunction with network type, danger classes and the superencipher algorithm table of comparisons, determine superencipher algorithm, then adopt file described in described superencipher algorithm for encryption, be sent to described receiving terminal; Telex network is promoted safely further.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, and form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Figure 1 shows that the information interacting method flow chart of the embodiment of the present invention 1;
Figure 2 shows that the information interaction system structure chart of the embodiment of the present invention 2.
Embodiment
Hereinafter also describe the present invention in detail with reference to accompanying drawing in conjunction with the embodiments.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combine mutually.
Figure 1 shows that the information interacting method flow chart of the embodiment of the present invention 1, comprise the following steps:
Step 101: transmitting terminal and receiving terminal establish a communications link;
Transmitting terminal is mobile phone; Receiving terminal is PC computer and PC.
The mode that transmitting terminal and receiving terminal establish a communications link is: transmitting terminal installs APP as input interface, and establishes a communications link with receiving terminal.
The mode that transmitting terminal and receiving terminal establish a communications link can also be: directly on transmitting terminal, write a functional module of framework layer and run, establishing a communications link with receiving terminal.
Transmitting terminal interface display is a soft keyboard.
Transmitting terminal connects receiving terminal by USB or wifi.
Step 102: transmitting terminal runs soft keyboard and inputs, and file operation information is sent to cryptographic algorithm controller;
File operation information comprises: the content in the type of operation file, input file.
Step 103: cryptographic algorithm controller obtains recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, controls encrypt file communication.
Cryptographic algorithm controller obtains recognition result to the content in input file, and after the secret grade determining file and cryptographic algorithm, the process controlling encrypt file communication is:
Cryptographic algorithm controller obtains recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, encrypts described file and the described file after encryption is sent to described receiving terminal.
Cryptographic algorithm controller obtains recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, encrypts described file and the process described file after encryption being sent to described receiving terminal is:
After cryptographic algorithm controller receives the file operation information of transmitting terminal transmission, content in input file is identified, in conjunction with recognition result, secret grade and the cryptographic algorithm table of comparisons, after the secret grade determining file and cryptographic algorithm, encrypt described file and the described file after encryption is sent to described receiving terminal.
Recognition result, secret grade and the cryptographic algorithm table of comparisons
Recognition result Secret grade Cryptographic algorithm
There is " account ", " amount of money " Second grade Cryptographic algorithm A
There is " cellphone code ", " ID card No. " The first estate Cryptographic algorithm B
Other Nothing Nothing
Table 1
Wherein, secret grade is higher, and corresponding cryptographic algorithm is more complicated; As shown in table 1, the complexity of the cryptographic algorithm that the second grade is corresponding and cryptographic algorithm A is greater than the complexity of cryptographic algorithm corresponding to the first estate and cryptographic algorithm B; Complexity is higher, and the file of encryption is safer.
As shown in table 1, when recognition result is " other ", file is not encrypted.
In addition, cryptographic algorithm controller according to the danger classes of transmitting terminal network used, after carrying out superencipher, then can also be sent to described receiving terminal to described file.
Cryptographic algorithm controller can also according to the danger classes of transmitting terminal network used, and after carrying out superencipher to described file, then the process being sent to described receiving terminal is:
Cryptographic algorithm controller, according to the danger classes of transmitting terminal network used, in conjunction with network type, danger classes and the superencipher algorithm table of comparisons, is determined superencipher algorithm, is then adopted file described in described superencipher algorithm for encryption, be sent to described receiving terminal.
Network type, danger classes and the superencipher algorithm table of comparisons
Network type Danger classes Superencipher algorithm
Network type M Three grades Cryptographic algorithm C
Network type N Secondary Cryptographic algorithm D
Network type P One-level Encryption algorithm F
Table 2
Wherein, danger classes is higher, and corresponding superencipher algorithm is more complicated; As shown in table 2, the complexity of three grades of corresponding superencipher algorithms and cryptographic algorithm C is greater than the complexity of superencipher algorithm corresponding to secondary and cryptographic algorithm D; Complexity is higher, and the file of encryption is safer.
The judgment mode of danger classes divides according to network type, such as: the danger classes of PAN (Personal Area Network) is three grades; The danger classes of corporate lan is secondary, the danger classes of carrier network is one-level.
Citing is below described in detail:
Mobile phone installation APP is as input interface or directly on mobile phone, write a functional module of framework layer and run, and sets up the communication connection with PC computer; Mobile phone runs soft keyboard input, the content in the type of operation file, input file is sent to cryptographic algorithm controller; After cryptographic algorithm controller receives the file operation information of mobile phone transmission, content in input file is identified, if identify the information such as " account ", " amount of money ", then associative list 1, determine that secret grade is the second grade, cryptographic algorithm is cryptographic algorithm A, adopt cryptographic algorithm A to encrypt described file, then send to PC computer.
In addition, if mobile phone network used is corporate lan, then associative list 2 is known: danger classes is secondary, superencipher algorithm is cryptographic algorithm D, adopts file described in cryptographic algorithm D superencipher, is sent to PC computer.
Figure 2 shows that the information interaction system structure chart of the embodiment of the present invention 2, comprise transmitting terminal, cryptographic algorithm controller, receiving terminal; Wherein, described transmitting terminal is connected with described receiving terminal by described cryptographic algorithm controller;
Described transmitting terminal, for establishing a communications link with receiving terminal; Also for running soft keyboard input, file operation information is sent to cryptographic algorithm controller;
Described cryptographic algorithm controller, for obtaining the recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, controls encrypt file communication;
Described receiving terminal, for receiving the encrypt file that described cryptographic algorithm controller sends.
Compared to technology before, a kind of information interacting method provided by the invention and system, solve mobile phone when enabling soft keyboard and communicating with PC computer, the problem of communication secure.
In addition, by following scheme: the mode that transmitting terminal and receiving terminal establish a communications link is: transmitting terminal installs APP as input interface, and establish a communications link with receiving terminal or directly on transmitting terminal, write a functional module of framework layer and run, establish a communications link with receiving terminal; Enormously simplify the operation of user, improve the experience of user further.
In addition, by following scheme: after cryptographic algorithm controller receives the file operation information of transmitting terminal transmission, content in input file is identified, in conjunction with recognition result, secret grade and the cryptographic algorithm table of comparisons, after the secret grade determining file and cryptographic algorithm, encrypt described file and the described file after encryption is sent to described receiving terminal; Achieve the scheme carrying out automatically identifying encryption according to the content of user's input, communication security is ensured further.
In addition, by following superencipher scheme: cryptographic algorithm controller is according to the danger classes of transmitting terminal network used, in conjunction with network type, danger classes and the superencipher algorithm table of comparisons, determine superencipher algorithm, then adopt file described in described superencipher algorithm for encryption, be sent to described receiving terminal; Telex network is promoted safely further.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (8)

1. an information interacting method, is characterized in that, comprises the following steps:
Transmitting terminal and receiving terminal establish a communications link;
Transmitting terminal runs soft keyboard and inputs, and file operation information is sent to cryptographic algorithm controller;
Cryptographic algorithm controller obtains recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, controls encrypt file communication.
2. method according to claim 1, it is characterized in that: the mode that transmitting terminal and receiving terminal establish a communications link is: transmitting terminal set up applications APP is as input interface, and establish a communications link with receiving terminal or directly on transmitting terminal, write a functional module of framework framework layer and run, establish a communications link with receiving terminal.
3. method according to claim 1, is characterized in that, described file operation information comprises: the content in the type of operation file, input file.
4. method according to claim 1, is characterized in that: cryptographic algorithm controller obtains recognition result to the content in input file, and after the secret grade determining file and cryptographic algorithm, the process controlling encrypt file communication is:
Cryptographic algorithm controller obtains recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, encrypts described file and the described file after encryption is sent to described receiving terminal.
5. method according to claim 4, it is characterized in that: cryptographic algorithm controller obtains the recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, encrypt described file and the process described file after encryption being sent to described receiving terminal is:
After cryptographic algorithm controller receives the file operation information of transmitting terminal transmission, content in input file is identified, in conjunction with recognition result, secret grade and the cryptographic algorithm table of comparisons, after the secret grade determining file and cryptographic algorithm, encrypt described file and the described file after encryption is sent to described receiving terminal.
6. method according to claim 1, is characterized in that: cryptographic algorithm controller, also according to the danger classes of transmitting terminal network used, after carrying out superencipher, then is sent to receiving terminal to described file.
7. method according to claim 6, is characterized in that: cryptographic algorithm controller is also according to the danger classes of transmitting terminal network used, and after carrying out superencipher to described file, then the process being sent to receiving terminal is:
Cryptographic algorithm controller, according to the danger classes of transmitting terminal network used, in conjunction with network type, danger classes and the superencipher algorithm table of comparisons, is determined superencipher algorithm, is then adopted file described in described superencipher algorithm for encryption, be sent to described receiving terminal.
8. an information interaction system, is characterized in that, comprises transmitting terminal, cryptographic algorithm controller, receiving terminal; Wherein, described transmitting terminal is connected with described receiving terminal by described cryptographic algorithm controller;
Described transmitting terminal, for establishing a communications link with receiving terminal; Also for running soft keyboard input, file operation information is sent to cryptographic algorithm controller;
Described cryptographic algorithm controller, for obtaining the recognition result to the content in input file, after the secret grade determining file and cryptographic algorithm, controls encrypt file communication;
Described receiving terminal, for receiving the encrypt file that described cryptographic algorithm controller sends.
CN201410783543.5A 2014-12-16 2014-12-16 Information interaction method and system Pending CN104580160A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410783543.5A CN104580160A (en) 2014-12-16 2014-12-16 Information interaction method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410783543.5A CN104580160A (en) 2014-12-16 2014-12-16 Information interaction method and system

Publications (1)

Publication Number Publication Date
CN104580160A true CN104580160A (en) 2015-04-29

Family

ID=53095341

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410783543.5A Pending CN104580160A (en) 2014-12-16 2014-12-16 Information interaction method and system

Country Status (1)

Country Link
CN (1) CN104580160A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107592963A (en) * 2015-05-19 2018-01-16 皇家飞利浦有限公司 Calculated with secret value
CN108989440A (en) * 2018-07-27 2018-12-11 上海爱优威软件开发有限公司 A kind of document transmission method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201286106Y (en) * 2008-07-03 2009-08-05 许剑卓 Safety equipment
CN101534311A (en) * 2009-04-14 2009-09-16 杨筑平 An information security method and procedure
CN101794365A (en) * 2010-03-23 2010-08-04 中兴通讯股份有限公司 Method for safely inputting information on mobile terminal and mobile terminal
CN101953112A (en) * 2008-02-25 2011-01-19 松下电器产业株式会社 Information security device and information security system
CN102880305A (en) * 2012-09-24 2013-01-16 广东欧珀移动通信有限公司 Keyboard input encryption method and mobile terminal thereof
CN103886263A (en) * 2014-03-19 2014-06-25 宇龙计算机通信科技(深圳)有限公司 Method and system for protecting data in mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101953112A (en) * 2008-02-25 2011-01-19 松下电器产业株式会社 Information security device and information security system
CN201286106Y (en) * 2008-07-03 2009-08-05 许剑卓 Safety equipment
CN101534311A (en) * 2009-04-14 2009-09-16 杨筑平 An information security method and procedure
CN101794365A (en) * 2010-03-23 2010-08-04 中兴通讯股份有限公司 Method for safely inputting information on mobile terminal and mobile terminal
CN102880305A (en) * 2012-09-24 2013-01-16 广东欧珀移动通信有限公司 Keyboard input encryption method and mobile terminal thereof
CN103886263A (en) * 2014-03-19 2014-06-25 宇龙计算机通信科技(深圳)有限公司 Method and system for protecting data in mobile terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107592963A (en) * 2015-05-19 2018-01-16 皇家飞利浦有限公司 Calculated with secret value
CN107592963B (en) * 2015-05-19 2020-05-19 皇家飞利浦有限公司 Method and computing device for performing secure computations
CN108989440A (en) * 2018-07-27 2018-12-11 上海爱优威软件开发有限公司 A kind of document transmission method and system

Similar Documents

Publication Publication Date Title
CN102682506B (en) Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique
CN108769027B (en) Secure communication method, device, mobile terminal and storage medium
EP3086587A1 (en) Method and apparatus for transmitting and receiving encrypted message between terminals
CN105631987A (en) Bluetooth access control unlocking method, device and system
CN104994098B (en) Document transmission method and relevant apparatus and Transmission system
CN103458400A (en) Key management method for voice encryption communication system
CN108449114B (en) Bluetooth connection method and mobile terminal
CN105634737A (en) Data transmission method, terminals and system thereof
US20150106614A1 (en) Systems and methods of safeguarding user information while interacting with online service providers
CN105227578A (en) The encryption and decryption method of transfer files and encryption and decryption device
US11252145B2 (en) Cross-device access to one-time passwords
CN112307454A (en) Data encryption method and device, storage medium and electronic equipment
CN105743844A (en) Information processing method and electronic device
CN106341815A (en) Wireless connection method, terminal and AP
CN102932791A (en) Method for collaboratively processing information through WIFI wireless network between smart phone and computer
CN105933503B (en) Information processing method and electronic equipment
CN105224274A (en) A kind of information processing method and electronic equipment
CN104580160A (en) Information interaction method and system
CN104796262A (en) Data encryption method and terminal system
CN103036897A (en) Communication method based on long distance desktop connection between thin client-side and server-side
CN105429903A (en) Switch and configuration method
CN103546287A (en) Password verification method and electronic equipment
CN104052654A (en) Method and system for achieving chatting online
CN104219300A (en) Coordinate transformation parameter sharing method and system
CN106254226A (en) A kind of information synchronization method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 200233 Guiping Road, Xuhui District, No. 391, building 20, floor 3,

Applicant after: Shanghai Zhuo Yi Science and Technology Co., Ltd.

Address before: 200233 Guiping Road, Xuhui District, No. 391, building 20, floor 3,

Applicant before: Shanghai TYD Electronic Technology Co., Ltd.

COR Change of bibliographic data

Free format text: CORRECT: APPLICANT; FROM: SHANGHAI TYD ELECTRONIC TECHNOLOGY CO., LTD. TO: SHANGHAI ZHUOYI TECHNOLOGY CO., LTD.

RJ01 Rejection of invention patent application after publication

Application publication date: 20150429

RJ01 Rejection of invention patent application after publication