CN104660568B - A kind of guard method of address list information and device - Google Patents

A kind of guard method of address list information and device Download PDF

Info

Publication number
CN104660568B
CN104660568B CN201310597263.0A CN201310597263A CN104660568B CN 104660568 B CN104660568 B CN 104660568B CN 201310597263 A CN201310597263 A CN 201310597263A CN 104660568 B CN104660568 B CN 104660568B
Authority
CN
China
Prior art keywords
address list
information
list information
encrypted
public key
Prior art date
Application number
CN201310597263.0A
Other languages
Chinese (zh)
Other versions
CN104660568A (en
Inventor
李翔宇
张潇
Original Assignee
中国科学院深圳先进技术研究院
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国科学院深圳先进技术研究院 filed Critical 中国科学院深圳先进技术研究院
Priority to CN201310597263.0A priority Critical patent/CN104660568B/en
Publication of CN104660568A publication Critical patent/CN104660568A/en
Application granted granted Critical
Publication of CN104660568B publication Critical patent/CN104660568B/en

Links

Abstract

The present invention is suitable for field of information security technology, provides guard method and the device of a kind of address list information, the method includes:Terminal is encrypted address list information by public key, and encrypted address list information is uploaded to cloud server;After the terminal or another terminal download the encrypted address list information from the cloud server, the encrypted address list information is decrypted so that user where the terminal or another terminal checks by private key corresponding with the public key.It can effectively prevent the leakage of address list information through the invention, improve the safety of information.

Description

A kind of guard method of address list information and device

Technical field

The invention belongs to the guard method of field of information security technology more particularly to a kind of address list information and devices.

Background technology

Existing mobile phone is designed with address list, is used for storing contact information.With the development of information technology, in order to avoid When mobile phone occur and losing, the problem of can not obtaining associated person information, more and more mobile phone users back up its address list information To cloud server.However, since prior art address list information is to be transmitted with plaintext version and stored to cloud with plaintext version Server is held, be easy to cause information leakage, safety is not high.

Invention content

The embodiment of the present invention is to provide a kind of guard method of address list information, is believed address list with solving the prior art When breath backups to cloud server, it be easy to cause information leakage, the not high problem of safety.

The embodiment of the present invention in a first aspect, provide a kind of guard method of address list information, the method includes:

Terminal is encrypted address list information by public key, and encrypted address list information is uploaded to cloud service Device;

After the terminal or another terminal download the encrypted address list information from the cloud server, by with The corresponding private key of the public key is decrypted the encrypted address list information to use where the terminal or another terminal Family is checked.

The second aspect of the embodiment of the present invention, provides a kind of protective device of address list information, and described device includes:

Encryption unit is encrypted address list information for passing through public key, and encrypted address list information is uploaded To cloud server;

Decryption unit, after downloading the encrypted address list information from the cloud server, by with the public affairs The encrypted address list information is decrypted so that user where terminal checks in the corresponding private key of key.

Existing advantageous effect is the embodiment of the present invention compared with prior art:The embodiment of the present invention is by public key to communication Record information is encrypted, and encrypted address list information is uploaded to cloud server;When user needs the address list letter When breath, encrypted address list information is downloaded from cloud server, then by private key corresponding with the public key to the encryption Address list information be decrypted, obtain plaintext address list information.Address list information of the embodiment of the present invention is transmitted with ciphertext form And stored to cloud server with ciphertext form, it can be effectively prevent the leakage of address list information, improve the safety of information.And And user can download encrypted address list information by different terminals, and can guarantee the safety of information.

Description of the drawings

It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description be only the present invention some Embodiment for those of ordinary skill in the art without having to pay creative labor, can also be according to these Attached drawing obtains other attached drawings.

Fig. 1 is the application scenario diagram that the address list information guard method that first embodiment of the invention provides is applicable in;

Fig. 2 is the implementation flow chart for the address list information guard method that second embodiment of the invention provides;

Fig. 3 is the composite structural diagram for the address list information protective device that third embodiment of the invention provides.

Specific implementation mode

In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.

In order to illustrate technical solutions according to the invention, illustrated below by specific embodiment.

Embodiment one:

Fig. 1 shows the application scenarios that the address list information guard method that first embodiment of the invention provides is applicable in, and is Convenient for explanation, illustrate only and the relevant part of the embodiment of the present invention.

As shown in Figure 1, the application scenarios include first terminal 1, second terminal 2 and cloud service end 3.Described first eventually Pass through wired or wirelessly connection communication between end 1 and second terminal 2 and server-side 3.

Wherein, the first terminal 1 or second terminal 2 can be mobile phone, tablet computer, computer etc..

The server-side 3 can be single server, or the service collectively constituted by several function servers Device end.

Information leakage and raising information security in order to prevent, the present embodiment first terminal 1 is by public key to address list Information is encrypted, and encrypted address list information is uploaded to cloud server 3.When the first terminal 1 or the second end End 2 is after the cloud server 3 downloads the encrypted address list information, by private key corresponding with the public key to described Encrypted address list information is decrypted so that the first terminal 1 or 2 place user of second terminal are checked.

Further, before first terminal 1 is encrypted address list information by public key, further include:

First terminal 1 receives the information for starting address list information defencive function.

Wherein, the information for starting address list information defencive function includes the startup address list information protection that user sends out The instruction of function, or the triggering information for starting address list information defencive function according to the generation of preset time interval.

Further, before first terminal 1 is encrypted address list information by public key, further include:

First terminal 1 generates public key and private key corresponding with the public key.

It should be noted that the public key is a pair of with private key, if data are encrypted with public key, only with correspondence Private key could decrypt;If data are encrypted with private key, could only be decrypted with corresponding public key.

As another example of the present invention, the first terminal 1 is encrypted address list information by public key, and will add Address list information after close is uploaded to cloud server 3:

First terminal 1 is encrypted the information of one or more contact persons in address list information by public key, and will add The information of one or more of contact persons after close is uploaded to cloud server 3, the information of one or more of contact persons The connection being newly added to from the associated person information or user selected in the address list information for user in the address list information It is people's information;

When the first terminal 1 or second terminal 2 download the encrypted address list information from the cloud server 3 Afterwards, by private key corresponding with the public key the encrypted address list information is decrypted for the first terminal 1 or 2 place user of second terminal check including:

The first terminal 1 or second terminal 2 download encrypted one or more contacts from the cloud server 3 After the information of people, the information of encrypted one or more contact persons is decrypted by private key corresponding with the public key So that the first terminal or 2 place user of second terminal are checked.

First terminal of the embodiment of the present invention 1 is can be seen that from above application scene(Such as mobile phone)By address list information or After the information of one or more contact persons is uploaded to cloud server 3 by public key encryption in address list information, user can lead to Cross first terminal 1 or second terminal 2(Such as tablet computer)Download required information from the cloud server 3, and by with The public key corresponding private key is decrypted.The present embodiment can also facilitate user to pass through while ensureing user information safety Different terminals download information needed.

It should be noted that the present embodiment first terminal refers to a certain terminal, " first " is only to state and refer to herein It is convenient, it is not meant to centainly to have corresponding first terminal in the specific implementation of the present invention.Similarly, second " second " in terminal is also used for the purpose of statement and refers to conveniently to be not meant to one in the specific implementation of the present invention Surely corresponding second terminal is had.

In addition, application scenarios provided in this embodiment are served only for explaining the present invention, protection scope of the present invention is not limited.

Embodiment two:

Fig. 2 shows the implementation process for the address list information guard method that second embodiment of the invention provides, the present embodiment Flow executive agent can be first terminal 1 or second terminal 2 in application scenarios shown in Fig. 1, details are as follows for process:

In step s 201, terminal is encrypted address list information by public key, and by encrypted address list information It is uploaded to cloud server.

The present embodiment terminal generates public key and corresponding with the public key before the address list information is encrypted Private key, and address list information is encrypted by the public key, encrypted address list information is uploaded to cloud service Device.

It should be noted that the present embodiment passes through the corresponding private key solution of the public key by public key encryption address list information Confidential information since the private key terminal user oneself possesses, thus has very high safety.

Further, the present embodiment further includes before terminal is encrypted address list information by public key:

Terminal receives the information for starting address list information defencive function.

In the present embodiment, start the instruction of address list information defencive function or click terminal when terminal detects that user sends out The upper button for starting address list information defencive function(In practical applications, can one be arranged in terminal in advance and starts address list Information protection function button, or setting one start the instruction of address list information defencive function, such as described instruction can be up time Needle slides or sliding etc. counterclockwise)Or detect that terminal is in certain preset state(Such as idle state etc.) When, terminal device starts timer, when the timer reaches preset time interval, starts address list information and protects work( Energy.

In the present embodiment, since the address list information is to be uploaded to cloud server after public key encryption, because Address list information has high confidentiality in this upload procedure, is difficult to obtain address list stolen taker is intercepted and captured in plain text, can have The private data of effect protection user;The address list information for uploading to cloud server is preserved with ciphertext form, can effectively prevent leading to News record information leakage, improves the safety of information storage.

In step S202, when the terminal or another terminal download the encrypted address list from the cloud server After information, the encrypted address list information is decrypted for the terminal or another by private key corresponding with the public key User where one terminal checks.

Particularly, the terminal or another terminal are sent to the cloud server downloads the encrypted address list letter The solicited message of breath includes the unique identifier of the encrypted address list information in the solicited message.The high in the clouds clothes Device be engaged in after receiving the solicited message, according to the unique identifier in the solicited message, obtains the encrypted communication Information is recorded, and the encrypted address list information is sent to the terminal or another terminal.

It in the present embodiment, can be from described in cloud server download when user needs to regain address list information Encrypted address list information is transmitted in downloading process with ciphertext form, to prevent stealer from intercepting and capturing.After having downloaded, pass through The encrypted address list information is decrypted for where the terminal or another terminal in private key corresponding with the public key User checks.

Preferably, the terminal is encrypted address list information by public key, and by encrypted address list information Being uploaded to cloud server includes:

Terminal is encrypted the information of one or more contact persons in address list information by public key, and will be encrypted The information of one or more of contact persons is uploaded to cloud server, the information of one or more of contact persons be user from The associated person information selected in the address list information or user are newly added to the associated person information in the address list information;

After the terminal or another terminal download the encrypted address list information from the cloud server, by with The corresponding private key of the public key is decrypted the encrypted address list information to use where the terminal or another terminal Family check including:

The terminal or another terminal download the letter of encrypted one or more contact persons from the cloud server After breath, the information of encrypted one or more contact persons is decrypted for institute by private key corresponding with the public key User where stating terminal or another terminal checks.

Address list information of the embodiment of the present invention is transmitted with ciphertext form and is stored to cloud server with ciphertext form, can be had Effect prevents the leakage of address list information, improves the safety of information.Moreover, user can download encrypted lead to by different terminals News record information, and can guarantee the safety of information.In addition the embodiment of the present invention is realized simple, relatively low to hardware requirement, but is had Higher safety.And the embodiment of the present invention can according to the user's choice or other preset situations(Such as address list Update)Required information is uploaded to cloud server after public key encryption, since the present embodiment need not every time will be whole Address list information encryption and upload, so as to effectively improve the efficiency of encryption and upload, and can effectively avoid information It repeats to upload.

Embodiment three:

Fig. 3 shows the composed structure for the address list information protective device that third embodiment of the invention provides, for the ease of Illustrate, illustrates only and the relevant part of the embodiment of the present invention.

The address list information protective device can be applied to various terminal equipment, such as pocket computer(Pocket Personal Computer, PPC), palm PC, computer, laptop, personal digital assistant(Personal Digital Assistant, PDA)Deng software unit, hardware cell or the software and hardware that can be operate in these terminals The unit being combined can also be used as the application system that independent pendant was integrated into these terminals or ran on these terminals In.

The address list information protective device includes encryption unit 31 and decryption unit 32.Wherein, each unit concrete function It is as follows:

Encryption unit 31 is encrypted address list information for passing through public key, and will be on encrypted address list information Reach cloud server;

Decryption unit 32, after downloading the encrypted address list information from the cloud server, by with it is described The encrypted address list information is decrypted so that user where terminal checks in the corresponding private key of public key.

Further, described device further includes:

Function start unit 33, for before address list information is encrypted by public key, receiving and starting address list The information of information protection function.

Wherein, the information for starting address list information defencive function includes the startup address list information protection that user sends out The instruction of function, or the triggering information for starting address list information defencive function according to the generation of preset time interval.

Further, described device further includes:

Information generating unit 34, for before address list information is encrypted by public key, generate public key and with The corresponding private key of the public key.

Further, the encryption unit 31 is used for:

The information of one or more contact persons in address list information is encrypted by public key, and will be encrypted described The information of one or more contact persons is uploaded to cloud server, and the information of one or more of contact persons is user from described The associated person information selected in address list information or user are newly added to the associated person information in the address list information;

The decryption unit 32 is used for, and the letter of encrypted one or more contact persons is downloaded from the cloud server After breath, the information of encrypted one or more contact persons was decrypted for end by private key corresponding with the public key User where end checks.

It is apparent to those skilled in the art that for convenience and simplicity of description, only with above-mentioned each function The division progress of unit, module, can be as needed and by above-mentioned function distribution by different work(for example, in practical application Energy unit, module are completed, i.e. the internal structure of described device is divided into different functional units or module, to complete above description All or part of function.Each functional unit or module in embodiment can be integrated in a processing unit, can also It is that each unit physically exists alone, can also be during two or more units be integrated in one unit, above-mentioned integrated list The form that hardware had both may be used in member or module is realized, can also be realized in the form of SFU software functional unit.In addition, each function Unit, module specific name also only to facilitate mutually distinguish, the protection domain being not intended to limit this application.Above-mentioned dress Set middle unit, module specific work process, can refer to preceding method embodiment corresponding process, details are not described herein.

In conclusion the embodiment of the present invention is encrypted address list information by public key, and by encrypted address list Information is uploaded to cloud server;When user needs the address list information, encrypted communication is downloaded from cloud server Information is recorded, then the encrypted address list information is decrypted by private key corresponding with the public key, obtains and communicates in plain text Record information.Address list information of the embodiment of the present invention is transmitted with ciphertext form and is stored to cloud server with ciphertext form, can be had Effect prevents the leakage of address list information, improves the safety of information.Moreover, user can download encrypted lead to by different terminals News record information, and can guarantee the safety of information.The embodiment of the present invention is realized simply, relatively low to hardware requirement, but with higher Safety.Further, the embodiment of the present invention can also according to the user's choice or other preset situations(Such as it communicates Record update)Required information is uploaded to cloud server after public key encryption, since the present embodiment need not every time will be complete The address list information in portion is encrypted and is uploaded, and so as to effectively improve the efficiency of encryption and upload, and can effectively avoid information Repetition upload, have stronger usability and practicality.

Those of ordinary skill in the art be further appreciated that implement the method for the above embodiments be can It is completed with instructing relevant hardware by program, the program can be stored in a computer read/write memory medium In, described storage medium, including ROM/RAM, disk, CD etc..

The above content is a further detailed description of the present invention in conjunction with specific preferred embodiments, and it cannot be said that The specific implementation of the present invention is confined to these explanations.For those of ordinary skill in the art to which the present invention belongs, exist Several equivalent substitute or obvious modifications are made under the premise of not departing from present inventive concept, and performance or use is identical, all should It is considered as belonging to present invention scope of patent protection determined by the appended claims.

Claims (6)

1. a kind of guard method of address list information, which is characterized in that the method includes:
Terminal generates public key and private key corresponding with the public key;Wherein, the public key and private key are a pair of, if using public key Data are encrypted, can only could be decrypted with corresponding private key, can only use and correspond to if data are encrypted with private key Public key could decrypt;
The terminal is encrypted address list information by public key, and encrypted address list information is uploaded to cloud service Device, the address list information for uploading to cloud server are preserved with ciphertext form;
The solicited message of the encrypted address list is downloaded when the terminal or another terminal are sent to the cloud server Afterwards, the encrypted address list information is downloaded from the cloud server, by private key corresponding with the public key to download The encrypted address list information is decrypted so that user where the terminal or another terminal checks;Wherein,
The terminal is encrypted address list information by public key, and encrypted address list information is uploaded to cloud service Device, including:
Terminal is encrypted the information of one or more contact persons in address list information by public key, and will be encrypted described The information of one or more contact persons is uploaded to cloud server, and the information of one or more of contact persons is user from described The associated person information selected in address list information or user are newly added to the associated person information in the address list information;
After the terminal or another terminal download the encrypted address list information from the cloud server, by with it is described The encrypted address list information is decrypted so that user where the terminal or another terminal looks into the corresponding private key of public key It sees, including:
The terminal or another terminal after the information that the cloud server downloads encrypted one or more contact persons, The information of encrypted one or more contact persons was decrypted for the end by private key corresponding with the public key User where end or another terminal checks.
2. the method as described in claim 1, which is characterized in that before terminal is encrypted address list information by public key, Further include:
Terminal receives the information for starting address list information defencive function.
3. method as claimed in claim 2, which is characterized in that the information for starting address list information defencive function includes using The instruction for the startup address list information defencive function that family is sent out, or believed according to the startup address list that preset time interval generates Cease the triggering information of defencive function.
4. a kind of protective device of address list information, which is characterized in that described device includes:
Encryption unit is encrypted address list information for passing through public key, and encrypted address list information is uploaded to cloud Server, the address list information for uploading to cloud server is held to be preserved with ciphertext form;
Decryption unit, after downloading the encrypted address list information from the cloud server, by with the public key pair The encrypted address list information of download is decrypted so that user where terminal checks in the private key answered;Wherein, when described After terminal sends the solicited message for downloading the encrypted address list to the cloud server, under the cloud server Carry the encrypted address list information;
Information generating unit, for before address list information is encrypted by public key, generate public key and with the public affairs The corresponding private key of key;Wherein, the public key and private key are a pair of, can only be with corresponding if data are encrypted with public key Private key could be decrypted, and can only could be decrypted with public key if data are encrypted with private key;
The encryption unit is used for:
The information of one or more contact persons in address list information is encrypted by public key, and will be encrypted one Or the information of multiple contact persons is uploaded to cloud server, the information of one or more of contact persons is user from the communication The associated person information or user that are selected in record information are newly added to the associated person information in the address list information;
The decryption unit is used for, after the information that the cloud server downloads encrypted one or more contact persons, The information of encrypted one or more contact persons is decrypted for terminal institute by private key corresponding with the public key It is checked in user.
5. device as claimed in claim 4, which is characterized in that described device further includes:
Function start unit starts address list information guarantor for before address list information is encrypted by public key, receiving The information of protective function.
6. device as claimed in claim 5, which is characterized in that the information for starting address list information defencive function includes using The instruction for the startup address list information defencive function that family is sent out, or believed according to the startup address list that preset time interval generates Cease the triggering information of defencive function.
CN201310597263.0A 2013-11-22 2013-11-22 A kind of guard method of address list information and device CN104660568B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310597263.0A CN104660568B (en) 2013-11-22 2013-11-22 A kind of guard method of address list information and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310597263.0A CN104660568B (en) 2013-11-22 2013-11-22 A kind of guard method of address list information and device

Publications (2)

Publication Number Publication Date
CN104660568A CN104660568A (en) 2015-05-27
CN104660568B true CN104660568B (en) 2018-09-11

Family

ID=53251272

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310597263.0A CN104660568B (en) 2013-11-22 2013-11-22 A kind of guard method of address list information and device

Country Status (1)

Country Link
CN (1) CN104660568B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681558B (en) * 2016-01-19 2019-10-08 努比亚技术有限公司 A kind of contact information display methods and terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101218626A (en) * 2005-07-06 2008-07-09 微软公司 Capturing contacts via people near me
CN101711028A (en) * 2009-11-26 2010-05-19 南京烽火星空通信发展有限公司 Method for automatically protecting user data on mobile terminal
WO2010144735A2 (en) * 2009-06-12 2010-12-16 Microsoft Corporation Secure and private backup storage and processing for trusted computing and data services
CN102946603A (en) * 2012-10-31 2013-02-27 重庆市电力公司 Uniform identity authentication method based on social characteristics in power cloud system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101218626A (en) * 2005-07-06 2008-07-09 微软公司 Capturing contacts via people near me
WO2010144735A2 (en) * 2009-06-12 2010-12-16 Microsoft Corporation Secure and private backup storage and processing for trusted computing and data services
CN101711028A (en) * 2009-11-26 2010-05-19 南京烽火星空通信发展有限公司 Method for automatically protecting user data on mobile terminal
CN102946603A (en) * 2012-10-31 2013-02-27 重庆市电力公司 Uniform identity authentication method based on social characteristics in power cloud system

Also Published As

Publication number Publication date
CN104660568A (en) 2015-05-27

Similar Documents

Publication Publication Date Title
EP2856735B1 (en) Method and system for automatic generation of context-aware cover message
Mulliner et al. SMS-based one-time passwords: attacks and defense
JP6424295B1 (en) Shared secret repository for applications including single sign-on
Wang et al. Smartphone security challenges
Manweiler et al. SMILE: encounter-based trust for mobile social services
Stajano et al. The resurrecting duckling: security issues for ubiquitous computing
US6985719B2 (en) Secure wireless backup mechanism
Tootoonchian et al. Lockr: social access control for web 2.0
US20150256521A1 (en) Secure communication system for mobile devices
EP2834768B1 (en) Systems and methods for securing and restoring virtual machines
US9178699B2 (en) Public key encryption algorithms for hard lock file encryption
KR100902627B1 (en) System and method for protecting master encryption keys
EP3432546B1 (en) Secure messaging
EP2003842B1 (en) A method and devices for providing secure data backup from a mobile communication device to an external computing device
CN106686008B (en) Information storage means and device
US9767299B2 (en) Secure cloud data sharing
CN105027107A (en) Secure virtual machine migration
KR20130084604A (en) Method to control and limit readability of electronic documents
CN103686716B (en) Android access control system for enhancing confidentiality and integrality
KR20070063000A (en) Method for distributing content to a mobile device with digital rights and mobile device therefor
TWI642288B (en) Instant communication method and system
EP2743855B1 (en) Secure configuration of mobile application
KR20090081033A (en) Apparatus and methods for securing architectures in wireless networks
CN103259651B (en) A kind of method and system to terminal data encryption and decryption
US8719568B1 (en) Secure delivery of sensitive information from a non-communicative actor

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
GR01 Patent grant
GR01 Patent grant