CN104768148A - Message encryption method and device - Google Patents

Message encryption method and device Download PDF

Info

Publication number
CN104768148A
CN104768148A CN201510107122.5A CN201510107122A CN104768148A CN 104768148 A CN104768148 A CN 104768148A CN 201510107122 A CN201510107122 A CN 201510107122A CN 104768148 A CN104768148 A CN 104768148A
Authority
CN
China
Prior art keywords
cryptographic object
message
encryption
contacts
telephone number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510107122.5A
Other languages
Chinese (zh)
Other versions
CN104768148B (en
Inventor
王腾飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Yi Xin Science And Technology Ltd
Zhejiang Yixin Technology Co Ltd
Original Assignee
Zhejiang Yi Xin Science And Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Yi Xin Science And Technology Ltd filed Critical Zhejiang Yi Xin Science And Technology Ltd
Priority to CN201510107122.5A priority Critical patent/CN104768148B/en
Publication of CN104768148A publication Critical patent/CN104768148A/en
Application granted granted Critical
Publication of CN104768148B publication Critical patent/CN104768148B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)

Abstract

The embodiment of the invention provides a message encryption method. The method comprises the steps that the operation for determining an encrypted object and the operation for triggering encryption processing are received; by responding to the operation for determining an encrypted object and the operation for triggering encryption processing, the determined encrypted object is encrypted. By means of the method, a part of messages or all messages corresponding to a specific contact person or a specific telephone number are flexibly selected to be encrypted, or a part of content of specific messages corresponding to the specific contact person or the specific telephone number are encrypted, and therefore a user can flexibly set encryption objects. In addition, the invention provides a convenient encryption and decryption triggering method. The encryption and decryption operation is facilitated, and user experience is improved. In addition, the embodiment of the invention further provides a message encryption device.

Description

A kind of message encryption method and device
Technical field
Embodiments of the present invention relate to technical field of information processing, and more specifically, embodiments of the present invention relate to a kind of message encryption method and device.
Background technology
This part embodiments of the present invention be intended to for stating in claims provide background or context.Description is not herein because be included in just admit it is prior art in this part.
In technical field of information processing, it is more prevalent that user uses the short message communication function in electronic equipment and instant communication software to carry out interacting message.At present, also there is not the scheme that the message for instant communication software is encrypted in prior art.Existing in the encryption method of short message communication, generally be encrypted by the mode of preset password, accordingly, when user wants to browse the short message encrypted, need the short message icon of click client, call short message function and input corresponding short message password to browse the short message encrypted in inbox.
Summary of the invention
In the prior art, for the encryption of message function, be for the All Contacts's in address list.But in practical application, be not all need to be encrypted for the short message of All Contacts.The method that prior art provides is owing to being just encrypted for general message function, make user when checking the short message of any contact person, all need to input the password preset, causing user to need to carry out loaded down with trivial details operation and can check short message, there is complex operation, can not arrange the defect of cryptographic object flexibly in this mode.
In addition, the encryption and decryption Method compare of prior art is single, there is the defect using inconvenience, poor user experience.
For this reason, be starved of a kind of message encryption method and device of improvement, cryptographic object can be set flexibly, reduce the troublesome operation of user, promote Consumer's Experience.
In the present context, embodiments of the present invention are expected to provide a kind of message encryption method and device.
In the first aspect of embodiment of the present invention, provide a kind of method, comprising:
Receive the operation determining cryptographic object and the operation triggering encryption;
Determine the operation of cryptographic object and the operation of described triggering encryption in response to described, the described cryptographic object determined is encrypted.
In an embodiment of a first aspect of the present invention, described determine cryptographic object comprise following in any one:
Cryptographic object is defined as by identifying corresponding some or all of message with particular telephone number or particular contact; Or, be defined as cryptographic object by with the partial content that particular telephone number or particular contact identify corresponding particular message; Described identification of contacts comprise telephone communication record record identification of contacts or JICQ in identification of contacts.
In another embodiment of first aspect present invention, the identification of contacts in described JICQ comprises contact name, contact person ID, remarks title or head portrait in JICQ.
In another embodiment of first aspect present invention, the operation of described triggering encryption comprises:
For the predetermined encryption gesture operation of telephone number corresponding to described cryptographic object, identification of contacts or message content region.
In another embodiment of first aspect present invention, the predetermined encryption gesture operation of the described telephone number corresponding for described cryptographic object, identification of contacts or message content region comprise following in any one:
The operation of the telephone number that cryptographic object described in adopting consecutive click chemical reaction is corresponding or identification of contacts;
The telephone number corresponding for described cryptographic object or the touch operation of identification of contacts and the duration of described touch operation are greater than very first time threshold value;
The operation in the region at the message content place that cryptographic object described in adopting consecutive click chemical reaction is corresponding;
For the touch operation in region at message content place corresponding to described cryptographic object and the duration of described touch operation be greater than the second time threshold;
The operation of the Encryption Options in selection function menu.
In another embodiment of first aspect present invention, the described described cryptographic object to determining is encrypted and comprises:
Hide the message content that described cryptographic object is corresponding, and avoid display reminding message to encrypt described message content with prompting; Or,
Hide the message content that described cryptographic object is corresponding, and display reminding message is encrypted to described message content for prompting.
In another embodiment of first aspect present invention, described method also comprises:
In response to the operation described cryptographic object being decrypted to process, display is decrypted to described cryptographic object.
In another embodiment of first aspect present invention, described the operation that described cryptographic object is decrypted process to be comprised:
For the default deciphering gesture operation in region associated by telephone number, identification of contacts or message content that described cryptographic object is corresponding.
In another embodiment of the present invention, the default deciphering gesture operation in region associated by the described telephone number corresponding for described cryptographic object, identification of contacts or message content comprise following in any one:
The operation of the telephone number that cryptographic object described in adopting consecutive click chemical reaction is corresponding or identification of contacts;
The telephone number corresponding for described cryptographic object or the touch operation of identification of contacts and the duration of described touch operation are greater than the 3rd time threshold;
The operation in the region associated by the message content that cryptographic object described in adopting consecutive click chemical reaction is corresponding;
For the touch operation in the region associated by the message content that described cryptographic object is corresponding and the duration of described touch operation be greater than the 4th time threshold;
The operation of input clear crytpographic key.
In the second aspect of embodiment of the present invention, provide a kind of device, comprising:
Receiving element, is configured for the operation receiving and determine cryptographic object and the operation triggering encryption;
Ciphering unit, is configured for and determines the operation of cryptographic object and the operation of described triggering encryption in response to described, be encrypted the described cryptographic object determined.
In an execution mode of a second aspect of the present invention, described receiving element comprises reception and determines cryptographic object operating unit and receive to trigger encryption processing operation unit, wherein, described reception determine cryptographic object operating unit specifically comprise following in any one:
Cryptographic object operating unit is determined in first reception, is configured for receive to identify with particular telephone number or particular contact the operation that corresponding some or all of message is defined as cryptographic object;
Second receives and determines cryptographic object operating unit, is configured for receive to be defined as the operation of cryptographic object by with the partial content that particular telephone number or particular contact identify corresponding particular message; Described identification of contacts comprise telephone communication record record identification of contacts or JICQ in identification of contacts.
In another execution mode of a second aspect of the present invention, the identification of contacts in described JICQ comprises contact name, contact person ID, remarks title or head portrait in JICQ.
In another execution mode of a second aspect of the present invention, described receiving element comprises reception and determines cryptographic object operating unit and receive to trigger encryption processing operation unit, and wherein, described reception triggers encryption processing operation unit concrete configuration and is used for:
Receive predetermined encryption gesture operation for telephone number corresponding to described cryptographic object, identification of contacts or message content region to trigger encryption.
In the yet another embodiment of a second aspect of the present invention, described reception trigger encryption processing operation unit comprise following in any one or multiple subelement:
First receives and triggers encryption processing operation subelement, is configured for the operation receiving telephone number that described in adopting consecutive click chemical reaction, cryptographic object is corresponding or identification of contacts;
Second receives triggering encryption processing operation subelement, and be configured for the touch operation received for telephone number corresponding to described cryptographic object or identification of contacts, the duration of described touch operation is greater than very first time threshold value;
3rd receives triggering encryption processing operation subelement, is configured for the operation in the region receiving the message content place that cryptographic object is corresponding described in adopting consecutive click chemical reaction;
4th receives triggering encryption processing operation subelement, and be configured for the touch operation in the region received for message content place corresponding to described cryptographic object, the duration of described touch operation is greater than the second time threshold;
5th receives triggering encryption processing operation subelement, is configured for the operation of the Encryption Options received in selection function menu.
In another execution mode of a second aspect of the present invention, described ciphering unit comprises:
First ciphering unit, is configured for the message content that hiding described cryptographic object is corresponding, and avoids display reminding message to encrypt described message content with prompting;
Second ciphering unit, is configured for the message content that hiding described cryptographic object is corresponding, and display reminding message is encrypted described message content for prompting.
In the yet another embodiment of a second aspect of the present invention, described device also comprises:
Decryption unit, is configured for the operation in response to being decrypted process to described cryptographic object, is decrypted display to described cryptographic object.
In another execution mode of a second aspect of the present invention, described decryption unit concrete configuration is used for:
In response to the default deciphering gesture operation in region associated by corresponding telephone number, identification of contacts or the message content of described cryptographic object, display is decrypted to described cryptographic object.
In another execution mode of a second aspect of the present invention, described decryption unit specifically comprises following any one or more subelement:
First deciphering subelement, is configured for the operation in response to telephone number corresponding to cryptographic object described in adopting consecutive click chemical reaction or identification of contacts, is decrypted display to described cryptographic object.
Second deciphering subelement, is configured in response to the touch operation for telephone number corresponding to described cryptographic object or identification of contacts, is decrypted display to described cryptographic object; Wherein, the duration of described touch operation is greater than the 3rd time threshold.
3rd deciphering subelement, is configured for the operation in response to the region associated by message content corresponding to cryptographic object described in adopting consecutive click chemical reaction, is decrypted display to described cryptographic object.
4th deciphering subelement, is configured in response to the touch operation for the region associated by message content corresponding to described cryptographic object, is decrypted display to described cryptographic object; Wherein, the duration of described touch operation is greater than the 4th time threshold.
5th deciphering subelement, is configured for the operation in response to input clear crytpographic key, is decrypted display to described cryptographic object.
According to message encryption method and the device of embodiment of the present invention, by user flexibility Choice encryption object, and in response to the encryption trigger action of user, the cryptographic object determined can be encrypted.Because user can select the part or all of message corresponding with particular contact or particular telephone number to be encrypted, or select to be encrypted with the partial content of the corresponding particular message of particular contact or particular telephone number, thus make user cryptographic object can be set flexibly, all password is inputted when receiving the message of All Contacts thus without the need to user, significantly reduce the operation of user, improve the flexibility of operation, improve the experience of user.
In addition, according to message encryption method and the device of embodiment of the present invention, the triggering mode of encryption and decryption is easily provided, facilitate the operation of encryption and decryption, the encryption and decryption mode single relative to prior art, convenient user operation, improves the experience of user.
Accompanying drawing explanation
By reference to accompanying drawing reading detailed description hereafter, above-mentioned and other objects of exemplary embodiment of the invention, feature and advantage will become easy to understand.In the accompanying drawings, show some execution modes of the present invention by way of example, and not by way of limitation, wherein:
Fig. 1 schematically shows the application scenarios that can realize according to embodiment of the present invention wherein;
Fig. 2 schematically shows message encryption method flow chart according to an embodiment of the invention;
Fig. 3 schematically shows message encryption device schematic diagram according to an embodiment of the invention.
In the accompanying drawings, identical or corresponding label represents identical or corresponding part.
Embodiment
Below with reference to some illustrative embodiments, principle of the present invention and spirit are described.Should be appreciated that providing these execution modes is only used to enable those skilled in the art understand better and then realize the present invention, and not limit the scope of the invention by any way.On the contrary, provide these execution modes to be to make the disclosure more thorough and complete, and the scope of the present disclosure intactly can be conveyed to those skilled in the art.
Art technology technical staff know, embodiments of the present invention can be implemented as a kind of system, device, equipment, method or computer program.Therefore, the disclosure can be implemented as following form, that is: hardware, completely software (comprising firmware, resident software, microcode etc.) completely, or the form that hardware and software combines.
According to the embodiment of the present invention, a kind of message encryption method and device is proposed.
In this article, it is to be appreciated that any number of elements in accompanying drawing is all unrestricted for example, and any name is all only for distinguishing, and does not have any limitation.
Below with reference to some representative embodiments of the present invention, explaination principle of the present invention and spirit in detail.
summary of the invention
The present inventor finds, in the prior art, it is more prevalent that user uses the short message communication function in electronic equipment and instant communication software to carry out interacting message.User for privacy and protection business secret need often wish to maintain secrecy to mutual message; but; unsound for the Privacy Protection function of message communicating both sides in prior art; the message of communicating pair is often caused to be seen by the 3rd people; thus cause the leakage of individual privacy or confidential information, cannot ensure communication safety.In prior art; although there is the encryption method for short message communication function, protect the personal secrets of message communicating both sides to a certain extent, inventor finds; for the encryption of message function in prior art, be for the All Contacts's in address list.But in practical application, be not all need to be encrypted for the short message of All Contacts.The method that prior art provides is owing to being just encrypted for general message function, make user when checking the short message of any contact person, all need to input the password preset, causing user to need to carry out loaded down with trivial details operation and can check short message, there is complex operation, can not arrange the defect of cryptographic object flexibly in this mode.In addition, the encryption and decryption Method compare of prior art is single, there is the defect using inconvenience, poor user experience.
Therefore cryptographic object cannot be set flexibly for prior art, user operation is loaded down with trivial details, use is inconvenient, the shortcoming of poor user experience, the invention provides a kind of message encryption method and device, by user flexibility Choice encryption object, and in response to the encryption trigger action of user, the cryptographic object determined can be encrypted.Because user can select the part or all of message corresponding with particular contact or particular telephone number to be encrypted, or select particular contact or particular telephone number corresponding the partial content of particular message be encrypted, thus make user cryptographic object can be set flexibly, all password is inputted when receiving the message of All Contacts thus without the need to user, significantly reduce the operation of user, improve the flexibility of operation, improve the experience of user.In addition, according to message encryption method and the device of embodiment of the present invention, the triggering mode of encryption and decryption is easily provided, facilitate the operation of encryption and decryption, the encryption and decryption mode single relative to prior art, convenient user operation, improves the experience of user.
After describing general principle of the present invention, lower mask body introduces various non-limiting embodiment of the present invention.
application scenarios overview
First with reference to figure 1, the application scenarios that embodiment of the present invention can realize is schematically shown wherein.Described message encryption device 300 can be independent equipment, also can be applied in any client or electronic equipment 400.Such as, this message encryption device 300 can be an application A PP being specifically designed to message encryption process installing in the electronic device.More generally, this message encryption device 300 can be included in and to install in the application A PP of non-expert for message encryption process in the electronic device (APP that namely this non-expert is used for message encryption process has message encryption processing capacity).Described application A PP can be such as the short message communication module of electronic equipment, also can be mounted in the JICQ in electronic equipment.Shown in electronic equipment 400 can be existing, research and develop or any electronic equipment of in the future research and development, include but not limited to: existing, research and develop or the desktop computer, laptop computer, mobile terminal (comprising smart mobile phone, non intelligent mobile phone, various panel computer) etc. of research and development in the future.It will be understood by those skilled in the art that the schematic diagram shown in Fig. 1 is only the example that embodiments of the present invention can be achieved wherein.The scope of application of embodiment of the present invention is not subject to the restriction of any aspect of this framework.
illustrative methods
Below in conjunction with the application scenarios of Fig. 1, be described with reference to Figure 2 the method for message encryption according to exemplary embodiment of the invention.It should be noted that above-mentioned application scenarios is only that embodiments of the present invention are unrestricted in this regard for the ease of understanding spirit of the present invention and principle and illustrating.On the contrary, embodiments of the present invention can be applied to applicable any scene.
See Fig. 2, schematically show message encryption method flow chart according to an embodiment of the invention, the method concrete example is as comprised:
S201, receives the operation determining cryptographic object and the operation triggering encryption.
Wherein, described determine cryptographic object can comprise following in any one:
Cryptographic object is defined as by identifying corresponding some or all of message with particular telephone number or particular contact; Or,
Cryptographic object is defined as by with the partial content that particular telephone number or particular contact identify corresponding particular message.
Wherein, described identification of contacts comprise telephone communication record record identification of contacts or JICQ in identification of contacts.The identification of contacts of described telephonic communication record record can comprise telephonic communication and record the contact name, contact head image or the remarks title that record.Identification of contacts in described JICQ comprises contact name, contact person ID, remarks title or head portrait in JICQ.
In a kind of possible implementation, the cryptographic object determined can be the entire message of particular telephone number or particular contact mark correspondence.At this moment, selection to cryptographic object can have been carried out by selecting particular telephone number or particular contact mark.In this case, describedly determine that the operation of cryptographic object can comprise: the operation clicking particular telephone number or particular contact mark; Or, for described particular telephone number or particular contact mark touch operation and the duration of described touch operation be greater than preset time threshold.Described preset time threshold can as required by user or default.Describedly determine that the operation of cryptographic object can once be determined to identify corresponding message as cryptographic object with a particular telephone number or particular contact, also once can determine to identify corresponding message as cryptographic object with multiple particular telephone number or particular contact, not limit at this.Because the present invention can be selected voluntarily by user, determine that the message corresponding with one or more particular telephone number or identification of contacts is as cryptographic object flexibly, refinement can distinguish cryptographic object and non-encrypted object, therefore relative to the method that prior art can only be encrypted for All Contacts, improve the flexibility ratio of operation, so decrease user troublesome operation, add user use convenience.
In the implementation of another possibility, the cryptographic object determined can also be identify corresponding part messages with particular telephone number or particular contact.Such as, described cryptographic object can be identify with particular telephone number or particular contact corresponding to message in specific one or specific several message.At this moment, can by the selection selecting these specific or specific several message to come cryptographic object.In this case, describedly determine that the operation of cryptographic object can comprise: the operation clicking particular message region; Or, for the touch operation of described particular message region and the duration of described touch operation be greater than preset time threshold.Described preset time threshold can as required by user or default.Describedly determine that the operation of cryptographic object once can determine that a piece of news is as cryptographic object, also once can determine that multiple messages is as cryptographic object, does not limit at this.Due to the present invention can be selected voluntarily by user, determine flexibly using with the corresponding part messages of particular telephone number or particular contact as cryptographic object; the message of carrying out secret protection can be needed by an encryption section; then normally show for most of message; meet the different secret protection demands of user to different messages; improve the flexibility ratio of operation, so decrease user troublesome operation, add user use convenience.
In a kind of possible implementation, the cryptographic object determined can be the partial content identifying corresponding particular message with particular telephone number or particular contact.Such as, described cryptographic object can be the partial content in the specific a piece of news in the message corresponding to particular telephone number or particular contact identify, and described partial content can text or picture.Such as, under some application scenarios, user only wishes to be encrypted the part sensitive information in a certain bar message content, at this moment, and the selection that can come cryptographic object by the region at the partial content place selecting the needs in this message to encrypt.Then describedly determine that the operation of cryptographic object can comprise: the operation clicking the specific part content region of particular message; Or, for the touch operation of specific part content region of described particular message and the duration of described touch operation be greater than preset time threshold.Described preset time threshold can as required by user or default.Because the present invention can be selected voluntarily by user, determine a part of content of the particular message of particular telephone number or particular contact flexibly as cryptographic object; can part sensitive information in an encrypting messages; then normally show for most of message content; meet the different secret protection demands of user to different piece in same message, add the convenience that user uses.
It should be noted that, determine that the operation of cryptographic object to have different implementations, can these are only exemplary illustration, be not considered as limitation of the present invention.Those skilled in the art all belong to protection scope of the present invention not paying other implementations obtained under creative work.
Wherein, the operation of described triggering encryption comprises: for the predetermined encryption gesture operation of telephone number corresponding to described cryptographic object, identification of contacts or message content region.Certainly, it will be understood by those skilled in the art that, for the electronic equipment without touch-screen, the operation of triggering encryption gathered also can be: for the non-gesture input operation of telephone number corresponding to described cryptographic object, identification of contacts or message content region, such as mouse input, input through keyboard etc., do not limit at this.
When the predetermined encryption gesture operation be operating as telephone number corresponding to described cryptographic object, identification of contacts or message content region of described triggering encryption, its can comprise following in any one operation:
(1) telephone number that cryptographic object described in adopting consecutive click chemical reaction is corresponding or the operation of identification of contacts.Such as, contact twice click or click the operation of telephone number corresponding to described cryptographic object or identification of contacts for three times.
(2) for telephone number corresponding to described cryptographic object or the touch operation of identification of contacts and the duration of described touch operation be greater than very first time threshold value.Such as, long operation of pressing telephone number corresponding to cryptographic object or identification of contacts, and described operation is continued above certain hour.
(3) operation in the region at the message content place that cryptographic object described in adopting consecutive click chemical reaction is corresponding.When described cryptographic object is identify corresponding part messages with particular telephone number or particular contact, or when identifying the partial content of corresponding particular message with particular telephone number or particular contact, can trigger encryption by the message content region of this cryptographic object of adopting consecutive click chemical reaction, such as double or three clicks need the region at the message content text place of encryption.
(4) for the touch operation in region at message content place corresponding to described cryptographic object and the duration of described touch operation be greater than the second time threshold.When described cryptographic object is that particular telephone number or particular contact identify corresponding part messages, or when identifying the partial content of corresponding particular message with particular telephone number or particular contact, can trigger encryption by long by the message content region of this cryptographic object, the region such as pinning text corresponding to message content or picture place exceedes Preset Time.Wherein, described very first time threshold value and the second time threshold all can be preset by user or system.
(5) operation of the Encryption Options in selection function menu.In this implementation, can function menu in user interface, described function menu has Encryption Options, and user can trigger encryption processing operation to cryptographic object by clicking or touch described Encryption Options.
(6) other default gesture operations.Such as, at identification of contacts corresponding to cryptographic object or telephone number place, or slide in the text of the message content that cryptographic object is corresponding or picture region, input " L " type gesture operation, wherein " L " representative " Lock (locking, encryption) ".Certainly, the input of other gestures can also be preset as the operation triggering encryption.
It will be appreciated by persons skilled in the art that the described priority execution sequence that the operation of cryptographic object and the operation of described triggering encryption do not have certainty of determining.Usually, first can determine cryptographic object by operation, the operation then by presetting triggers the encryption to described cryptographic object.Certainly, also in response to the operation triggering cryptographic object, then cryptographic object can be determined by user, then perform the encryption to the cryptographic object determined.The two also can perform simultaneously.Under application scenes, the operation determining cryptographic object and the operation triggering encryption also can be same operations, such as, in a continuous print gesture input, complete the determination of cryptographic object and the triggering of encryption simultaneously.
S202, determines the operation of cryptographic object and the operation of described triggering encryption in response to described, is encrypted the described cryptographic object determined.
Wherein, the described described cryptographic object to determining is encrypted and comprises:
Hide the message content that described cryptographic object is corresponding, and avoid display reminding message to encrypt described message content with prompting; Or,
Hide the message content that described cryptographic object is corresponding, and display reminding message is encrypted to described message content for prompting.
In one implementation, encryption can be realized by the message content that concealed encrypted object is corresponding, and can not show any prompting message.In another implementation, after the message content of concealed encrypted correspondence, also can display reminding message further, prompting user respective encrypted object is encrypted.More specifically, user interface can provide options for user to select whether want display reminding message.
Further, in some embodiments, method provided by the invention can also comprise (being not necessary):
S203, in response to the operation described cryptographic object being decrypted to process, is decrypted display to described cryptographic object.Wherein, the dashed-line outer box in Fig. 2 represents that shown step is not the step that must exist, and those skilled in the art can implement as required.
Wherein, described the operation that described cryptographic object is decrypted process to be comprised: for the default deciphering gesture operation in the region associated by telephone number, identification of contacts or message content that described cryptographic object is corresponding.Certainly, it will be understood by those skilled in the art that, for the electronic equipment without touch-screen, the operation of the triggering decryption processing gathered also can be: for the non-gesture input operation in the region associated by telephone number, identification of contacts or message content that described cryptographic object is corresponding, such as mouse input, input through keyboard etc., do not limit at this.
When the predetermined encryption gesture operation be operating as region associated by corresponding telephone number, identification of contacts or the message content of described cryptographic object of described triggering decryption processing, can comprise following in any one operation:
(1) telephone number that cryptographic object described in adopting consecutive click chemical reaction is corresponding or the operation of identification of contacts.Such as, contact twice click or click the operation of telephone number corresponding to described cryptographic object or identification of contacts for three times, to trigger the decryption processing to described cryptographic object.
(2) for telephone number corresponding to described cryptographic object or the touch operation of identification of contacts and the duration of described touch operation be greater than the 3rd time threshold.Such as, long operation of pressing telephone number corresponding to cryptographic object or identification of contacts, and described operation is continued above certain hour.
(3) operation in the region associated by message content that cryptographic object described in adopting consecutive click chemical reaction is corresponding.When described cryptographic object is identify corresponding part messages with particular telephone number or particular contact, or when identifying the partial content of corresponding particular message with particular telephone number or particular contact, encryption can be triggered by the region associated by message content corresponding to cryptographic object described in adopting consecutive click chemical reaction, wherein, the region associated by this message content can be encrypted message content region or region adjacent thereto.When specific implementation of the present invention, even if by encryption by message content enciphering hiding corresponding for cryptographic object, the display of this message content region can also be had in Message Record or chat record, although or there is no the display of region, user can according to not having the partial content not having encryption in the position of the message of encrypting or message, judge the region at the place of the partial content encrypted in the position at the message place of having encrypted or message, thus complete the decryption oprerations of the message content region after to encryption.Certainly, when the region that the message content region that user clicks or touch is corresponding with cryptographic object is adjoining, also decryption oprerations can be triggered.Such as, user clicks or touches the front a piece of news of encrypting messages or the region at rear a piece of news place, or, user clicks or touches content contiguous with the partial content item encrypted in specific message, such as, in message during unencrypted part content, also decryption oprerations can be triggered.
(4) for the touch operation in region associated by message content corresponding to described cryptographic object and the duration of described touch operation be greater than the 4th time threshold.When described cryptographic object is identify corresponding part messages with particular telephone number or particular contact, or when identifying the partial content of corresponding particular message with particular telephone number or particular contact, can trigger decryption processing by long by region associated by the corresponding message content of this cryptographic object, the region such as pinning text corresponding to message content or picture place exceedes Preset Time.Wherein, described 3rd time threshold and the 4th time threshold all can be preset by user or system.It should be noted that, the region associated by message content can be encrypted message content region or region adjacent thereto.Region associated by message content specifically determine that mode can be identical or similar with the implementation in front portion mode (3), do not repeat them here.
(5) operation of clear crytpographic key is inputted.Accordingly, when the encryption that user can come cryptographic object by input Crypted password when triggering encryption, when user is decrypted cryptographic object, similarly, the decryption processing to cryptographic object has been carried out by input clear crytpographic key.Described clear crytpographic key and described Crypted password have corresponding relation.
(6) other default gesture operations.Such as, at identification of contacts corresponding to cryptographic object or telephone number place, or slide in the message content text that cryptographic object is corresponding or the region associated by picture, input " U " type gesture operation, wherein " U " representative " Unlock (unlock, decipher) ".Certainly, also can preset the input of other gestures as the operation triggering decryption processing, such as, the gesture identical with encryption gesture triggers decryption processing.
After receiving the operation of process is decrypted to described cryptographic object, namely respond described operation and process is decrypted to cryptographic object.Particularly, be that hiding cryptographic object is normally shown.
In message encryption method provided by the invention, by user flexibility Choice encryption object, and in response to the encryption trigger action of user, the cryptographic object determined can be encrypted.Described cryptographic object can be and all message corresponding to particular contact or particular telephone number; Or be particular contact or particular telephone number conversation message content in specific one or specific several message, or the specific part content in specific bar message, accurately can locate the specifying information needing encryption like this, avoid also being encrypted unnecessary secret information, user-friendly.
On the other hand, the present invention can provide multiple flexile cipher mode, the single mode that corresponding prior art is encrypted by preset password, and cipher mode is more diversified, and is convenient to user operation, improves Consumer's Experience.
Again on the one hand, the mode of display can only be decrypted by input password relative to prior art, the invention provides and multiple the mode of display is decrypted to encrypting messages, all inputting password without the need to user when receiving the message of All Contacts, to be more convenient for user operation, to improve Consumer's Experience.
Especially, method provided by the invention can be applied to the message encryption to JICQ, sound and enrich the encryption function of i.e. means of communication constantly, significantly reduces the operation of user, improves the flexibility of operation, improve the experience of user.
example devices
After the method describing exemplary embodiment of the invention, next, with reference to figure 3 pairs of exemplary embodiment of the invention, be introduced for the device of message encryption, described message encryption device 300 such as can comprise:
Receiving element 301, is configured for the operation receiving and determine cryptographic object and the operation triggering encryption.
Ciphering unit 302, is configured for and determines the operation of cryptographic object and the operation of described triggering encryption in response to described, be encrypted the described cryptographic object determined.
Wherein, described receiving element comprises reception and determines cryptographic object operating unit and receive to trigger encryption processing operation unit, wherein, described reception determine cryptographic object operating unit specifically comprise following in any one:
Cryptographic object operating unit is determined in first reception, is configured for receive to identify with particular telephone number or particular contact the operation that corresponding some or all of message is defined as cryptographic object;
Second receives and determines cryptographic object operating unit, is configured for receive to be defined as the operation of cryptographic object by with the partial content that particular telephone number or particular contact identify corresponding particular message; Described identification of contacts comprise telephone communication record record identification of contacts or JICQ in identification of contacts.
Wherein, the identification of contacts in described JICQ comprises contact name, contact person ID, remarks title or head portrait in JICQ.
Wherein, described receiving element comprises reception and determines cryptographic object operating unit and receive to trigger encryption processing operation unit, and wherein, described reception triggers encryption processing operation unit concrete configuration and is used for:
Receive predetermined encryption gesture operation for telephone number corresponding to described cryptographic object, identification of contacts or message content region to trigger encryption.
Wherein, described reception trigger encryption processing operation unit comprise following in any one or multiple subelement:
First receives and triggers encryption processing operation subelement, is configured for the operation receiving telephone number that described in adopting consecutive click chemical reaction, cryptographic object is corresponding or identification of contacts;
Second receives triggering encryption processing operation subelement, and be configured for the touch operation received for telephone number corresponding to described cryptographic object or identification of contacts, the duration of described touch operation is greater than very first time threshold value;
3rd receives triggering encryption processing operation subelement, is configured for the operation in the region receiving the message content place that cryptographic object is corresponding described in adopting consecutive click chemical reaction;
4th receives triggering encryption processing operation subelement, and be configured for the touch operation in the region received for message content place corresponding to described cryptographic object, the duration of described touch operation is greater than the second time threshold;
5th receives triggering encryption processing operation subelement, is configured for the operation of the Encryption Options received in selection function menu.
Wherein, described ciphering unit comprises:
First ciphering unit, is configured for the message content that hiding described cryptographic object is corresponding, and avoids display reminding message to encrypt described message content with prompting;
Second ciphering unit, is configured for the message content that hiding described cryptographic object is corresponding, and display reminding message is encrypted described message content for prompting.
Further, described device also comprises:
Decryption unit 303, is configured for the operation in response to being decrypted process to described cryptographic object, is decrypted display to described cryptographic object.Wherein, the unit shown in Fig. 3 dotted line frame is not the unit that must exist.
Wherein, described decryption unit concrete configuration is used for:
In response to the default deciphering gesture operation in region associated by corresponding telephone number, identification of contacts or the message content of described cryptographic object, display is decrypted to described cryptographic object.
Wherein, described decryption unit specifically comprises following any one or more subelement:
First deciphering subelement, is configured for the operation in response to telephone number corresponding to cryptographic object described in adopting consecutive click chemical reaction or identification of contacts, is decrypted display to described cryptographic object.
Second deciphering subelement, is configured in response to the touch operation for telephone number corresponding to described cryptographic object or identification of contacts, is decrypted display to described cryptographic object; Wherein, the duration of described touch operation is greater than the 3rd time threshold.
3rd deciphering subelement, is configured for the operation in response to the region associated by message content corresponding to cryptographic object described in adopting consecutive click chemical reaction, is decrypted display to described cryptographic object.
4th deciphering subelement, is configured in response to the touch operation for the region associated by message content corresponding to described cryptographic object, is decrypted display to described cryptographic object; Wherein, the duration of described touch operation is greater than the 4th time threshold.
5th deciphering subelement, is configured for the operation in response to input clear crytpographic key, is decrypted display to described cryptographic object.
Although it should be noted that the some devices or sub-device that are referred to message encryption device in above-detailed, this division is only not enforceable.In fact, according to the embodiment of the present invention, the Characteristic and function of two or more devices above-described can be specialized in one apparatus.Otherwise, the Characteristic and function of an above-described device can Further Division for be specialized by multiple device.
In addition, although describe the operation of the inventive method in the accompanying drawings with particular order, this is not that requirement or hint must perform these operations according to this particular order, or must perform the result that all shown operation could realize expectation.Additionally or alternatively, some step can be omitted, multiple step be merged into a step and perform, and/or a step is decomposed into multiple step and perform.
Although describe spirit of the present invention and principle with reference to some embodiments, but should be appreciated that, the present invention is not limited to disclosed embodiment, can not combine to be benefited to the feature that the division of each side does not mean that in these aspects yet, this division is only the convenience in order to state.The present invention is intended to contain the interior included various amendment of spirit and scope and the equivalent arrangements of claims.

Claims (10)

1. a method, comprising:
Receive the operation determining cryptographic object and the operation triggering encryption;
Determine the operation of cryptographic object and the operation of described triggering encryption in response to described, the described cryptographic object determined is encrypted.
2. method according to claim 1, wherein, described determine cryptographic object comprise following in any one:
Cryptographic object is defined as by identifying corresponding some or all of message with particular telephone number or particular contact; Or, be defined as cryptographic object by with the partial content that particular telephone number or particular contact identify corresponding particular message; Described identification of contacts comprise telephone communication record record identification of contacts or JICQ in identification of contacts.
3. method according to claim 2, wherein, the identification of contacts in described JICQ comprises contact name, contact person ID, remarks title or head portrait in JICQ.
4. method according to claim 1, wherein, the operation of described triggering encryption comprises:
For the predetermined encryption gesture operation of telephone number corresponding to described cryptographic object, identification of contacts or message content region.
5. method according to claim 4, wherein, the predetermined encryption gesture operation of the described telephone number corresponding for described cryptographic object, identification of contacts or message content region comprise following in any one:
The operation of the telephone number that cryptographic object described in adopting consecutive click chemical reaction is corresponding or identification of contacts;
The telephone number corresponding for described cryptographic object or the touch operation of identification of contacts and the duration of described touch operation are greater than very first time threshold value;
The operation in the region at the message content place that cryptographic object described in adopting consecutive click chemical reaction is corresponding;
For the touch operation in region at message content place corresponding to described cryptographic object and the duration of described touch operation be greater than the second time threshold;
The operation of the Encryption Options in selection function menu.
6. method according to claim 1, wherein, the described described cryptographic object to determining is encrypted and comprises:
Hide the message content that described cryptographic object is corresponding, and avoid display reminding message to encrypt described message content with prompting; Or,
Hide the message content that described cryptographic object is corresponding, and display reminding message is encrypted to described message content for prompting.
7. method according to claim 1, also comprises:
In response to the operation described cryptographic object being decrypted to process, display is decrypted to described cryptographic object.
8. method according to claim 7, wherein, describedly to comprise the operation that described cryptographic object is decrypted process:
For the default deciphering gesture operation in region associated by telephone number, identification of contacts or message content that described cryptographic object is corresponding.
9. method according to claim 8, wherein, the default deciphering gesture operation in region associated by the described telephone number corresponding for described cryptographic object, identification of contacts or message content comprise following in any one:
The operation of the telephone number that cryptographic object described in adopting consecutive click chemical reaction is corresponding or identification of contacts;
The telephone number corresponding for described cryptographic object or the touch operation of identification of contacts and the duration of described touch operation are greater than the 3rd time threshold;
The operation in the region associated by the message content that cryptographic object described in adopting consecutive click chemical reaction is corresponding;
For the touch operation in the region associated by the message content that described cryptographic object is corresponding and the duration of described touch operation be greater than the 4th time threshold;
The operation of input clear crytpographic key.
10. a device, comprising:
Receiving element, is configured for the operation receiving and determine cryptographic object and the operation triggering encryption;
Ciphering unit, is configured for and determines the operation of cryptographic object and the operation of described triggering encryption in response to described, be encrypted the described cryptographic object determined.
CN201510107122.5A 2015-03-11 2015-03-11 A kind of message encryption method and device Active CN104768148B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510107122.5A CN104768148B (en) 2015-03-11 2015-03-11 A kind of message encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510107122.5A CN104768148B (en) 2015-03-11 2015-03-11 A kind of message encryption method and device

Publications (2)

Publication Number Publication Date
CN104768148A true CN104768148A (en) 2015-07-08
CN104768148B CN104768148B (en) 2019-01-18

Family

ID=53649679

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510107122.5A Active CN104768148B (en) 2015-03-11 2015-03-11 A kind of message encryption method and device

Country Status (1)

Country Link
CN (1) CN104768148B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104954237A (en) * 2015-07-15 2015-09-30 山西佰纳得科技有限公司 Instant massaging method
CN105120074A (en) * 2015-07-20 2015-12-02 陈包容 Information burn-after-reading method and information burn-after-reading device
CN105184183A (en) * 2015-07-30 2015-12-23 努比亚技术有限公司 Chatting record encryption method and mobile terminal
CN105426745A (en) * 2015-10-28 2016-03-23 小米科技有限责任公司 Information display method and apparatus
CN106502502A (en) * 2016-10-31 2017-03-15 深圳市金立通信设备有限公司 A kind of method of locking applications and terminal
CN106650374A (en) * 2016-12-21 2017-05-10 努比亚技术有限公司 Mobile terminal and message check method
CN106685791A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Confidential Information transmitting method and confidential information transmitting device
CN108540645A (en) * 2018-03-12 2018-09-14 维沃移动通信有限公司 A kind of operating method and mobile terminal of mobile terminal
CN112416210A (en) * 2020-11-11 2021-02-26 珠海格力电器股份有限公司 Information encryption and decryption method, system, storage medium and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102497633A (en) * 2011-12-14 2012-06-13 华中科技大学 Protection method for private information in cellphones
CN102624683A (en) * 2011-06-30 2012-08-01 北京小米科技有限责任公司 Method for adding contact person
CN102769699A (en) * 2012-07-05 2012-11-07 天翼电信终端有限公司 Method and system for encrypting cell phone information
CN103095890A (en) * 2012-12-31 2013-05-08 东莞宇龙通信科技有限公司 Contact person information encryption method and communication terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624683A (en) * 2011-06-30 2012-08-01 北京小米科技有限责任公司 Method for adding contact person
CN102497633A (en) * 2011-12-14 2012-06-13 华中科技大学 Protection method for private information in cellphones
CN102769699A (en) * 2012-07-05 2012-11-07 天翼电信终端有限公司 Method and system for encrypting cell phone information
CN103095890A (en) * 2012-12-31 2013-05-08 东莞宇龙通信科技有限公司 Contact person information encryption method and communication terminal

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104954237A (en) * 2015-07-15 2015-09-30 山西佰纳得科技有限公司 Instant massaging method
CN105120074A (en) * 2015-07-20 2015-12-02 陈包容 Information burn-after-reading method and information burn-after-reading device
CN105184183A (en) * 2015-07-30 2015-12-23 努比亚技术有限公司 Chatting record encryption method and mobile terminal
CN105426745A (en) * 2015-10-28 2016-03-23 小米科技有限责任公司 Information display method and apparatus
CN106685791A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Confidential Information transmitting method and confidential information transmitting device
CN106502502A (en) * 2016-10-31 2017-03-15 深圳市金立通信设备有限公司 A kind of method of locking applications and terminal
CN106650374A (en) * 2016-12-21 2017-05-10 努比亚技术有限公司 Mobile terminal and message check method
CN108540645A (en) * 2018-03-12 2018-09-14 维沃移动通信有限公司 A kind of operating method and mobile terminal of mobile terminal
CN112416210A (en) * 2020-11-11 2021-02-26 珠海格力电器股份有限公司 Information encryption and decryption method, system, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN104768148B (en) 2019-01-18

Similar Documents

Publication Publication Date Title
CN104768148A (en) Message encryption method and device
CN103458382B (en) Hardware encryption transmission and storage method and system for mobile phone private short message
JP6046829B2 (en) Screen unlocking method, apparatus, terminal, program, and recording medium
CN104732121A (en) Encryption setting method, decryption setting method and corresponding device of application program
CN104657674A (en) Isolation protection system and isolation protection method of private data in mobile phone
US10846412B2 (en) Electronic device including display and method of encrypting and decrypting information
CN105005731A (en) Data encryption and decryption methods and mobile terminal
CN105574418A (en) Data encryption method and apparatus
CN104270353B (en) information security transmission method and system, receiving terminal and sending terminal
CN104933343A (en) Secrecy method and apparatus of application program, and electronic device
CN104318177A (en) Protection method and protection device for data of terminal equipment
CN103488918A (en) Application encrypting method and device for intelligent terminal
CN107798231A (en) Display methods, device, terminal and the storage medium of operation interface
CN105243331A (en) Encryption device and encryption method, and decryption device and decryption method
CN104751028B (en) The method and device of application program encryption, decryption
CN105681365B (en) Method and apparatus for file transmission
CN106709362A (en) File encryption method and device and file decryption method and device
CN106789070A (en) The decryption method of data, device and terminal
CN103780756B (en) The method of client identification card data secrecy and mobile terminal thereof
CN105046127A (en) Encryption and decryption method and apparatus
US20090268056A1 (en) Digital camera with portrait image protecting function and portrait image protecting method thereof
CN108696355B (en) Method and system for preventing head portrait of user from being embezzled
CN106845255A (en) Prevent information processing method, device and the mobile terminal divulged a secret
CN113407959B (en) Operation execution method and device and electronic equipment
CN114297715B (en) File encryption method, file processing method, file encryption device, file processing device and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant