CN104794408A - File encryption method and terminal system - Google Patents

File encryption method and terminal system Download PDF

Info

Publication number
CN104794408A
CN104794408A CN201510208298.XA CN201510208298A CN104794408A CN 104794408 A CN104794408 A CN 104794408A CN 201510208298 A CN201510208298 A CN 201510208298A CN 104794408 A CN104794408 A CN 104794408A
Authority
CN
China
Prior art keywords
target data
authority
terminal
module
cryptographic algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510208298.XA
Other languages
Chinese (zh)
Other versions
CN104794408B (en
Inventor
戴佑俊
李辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Green Orange Industry Co Ltd
Original Assignee
Shanghai Green Orange Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Green Orange Industry Co Ltd filed Critical Shanghai Green Orange Industry Co Ltd
Priority to CN201510208298.XA priority Critical patent/CN104794408B/en
Publication of CN104794408A publication Critical patent/CN104794408A/en
Application granted granted Critical
Publication of CN104794408B publication Critical patent/CN104794408B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Abstract

The invention discloses a file encryption method and a terminal system. The terminal system comprises a plurality of terminal devices. Each terminal device comprises at least two encryption algorithms, and each encryption algorithm corresponds to one authority. The file encryption method includes the steps that firstly, the current terminal device uses one encryption algorithm to encrypt target data; secondly, the current terminal transmits the encrypted target data to another terminal device; thirdly, the terminal device receiving the encrypted target data judges whether the authority of decrypting the target data is available or not, if yes, the fourth step is executed, and if not, the procedure is ended; fourthly, the target data are decrypted. According to the file encryption method, a user does not need to input ciphers for encryption or decryption, convenience is provided for the user, in addition, the user can set and select encryption as needed, and more functions are provided for the user.

Description

File encrypting method and terminal system
Technical field
The present invention relates to a kind of file encrypting method and terminal system.
Background technology
Along with becoming stronger day by day of terminal device (as mobile phone, panel computer etc.) function, the file stored also gets more and more, comprising the file of comparatively privacy or need to be keep secret, therefore need to take certain encryption restriction to these files, to prevent when owner's unauthorized or the unknown, the file in terminal device is stolen by other people and is applied.
At present, the guard method for file is that this mode operates comparatively loaded down with trivial details by input cryptoguard mostly, and user, when sending, receiving the file needing encryption, needs setting code or input password, makes the operation of user convenient not.In addition, if the security algorithm intrinsic by terminal device chips encrypts and decrypts, user experiences the process less than terminal device encryption and decryption, for user brings conveniently, but this mode function is comparatively single, user cannot arrange encryption and decryption mode according to the demand of oneself.
Summary of the invention
The technical problem to be solved in the present invention cannot take into account and to provide convenience for user in order to overcome prior art file encryption method and can realize the defect of several functions, provides a kind of simple operation and can provide file encrypting method and the terminal system of multiple cipher mode according to the demand of user.
The present invention solves above-mentioned technical matters by following technical proposals:
A kind of file encrypting method, for terminal system, described terminal system comprises some terminal devices, and its feature is, each terminal device includes at least two kinds of cryptographic algorithm, all corresponding authority of each cryptographic algorithm, and described file encrypting method comprises:
S 1, a kind of described cryptographic algorithm of present terminal equipment utilization encrypts a target data;
S 2, described present terminal equipment by encryption after target data be sent to an other-end equipment;
S 3, described other-end equipment judges whether to have the authority of deciphering described target data, if then perform step S 4, then process ends if not;
S 4, described target data is decrypted.
The terminal device of the application comprises multiple encryption algorithms, each terminal device can pre-set authority, target data can be sent to the terminal device of specifying according to different authorities by terminal system, only has the terminal device of permission match to read target data.Encryption is divided into multiple rank by the present invention, user can according to oneself need Choice encryption algorithm thus realize encrypt file only can be designated terminal device deciphering read, for user provides more function.And user does not need setting and the input of carrying out password, simplify the operation of user.Described target data can be file or information.
Preferably, step S 1comprise:
S 11, described present terminal equipment receives one to the instruction of described other-end device transmission one target data;
S 12, the authority that has of other-end equipment described in described present terminal equipment query according to the authority Choice encryption algorithm of described other-end equipment;
S 13, the cryptographic algorithm selected of described present terminal equipment utilization encrypts described target data.
The terminal device of the application can get the authority that target terminal equipment has before sending target data, and sent target data according to this authority.Further, authority can be divided into some ranks, the cryptographic algorithm corresponding to highest-ranking authority that present terminal equipment can be able to receive with target terminal equipment after the authority inquiring target terminal equipment is encrypted target data, make target data can by authority more than " the highest-ranking authority that can receive " all terminal devices receive and decipher, and cannot the receiving of Insufficient privilege, even if or receive and also cannot decipher.
Preferably, described authority is divided into some ranks, and for any two authorities, cryptographic algorithm complexity corresponding to the authority that rank is higher is higher, and the terminal device with the authority of higher level can decipher the cryptographic algorithm corresponding to more low-level authority.
Preferably, described authority is divided into some ranks, described cryptographic algorithm comprises target data is divided into several son files, target data after division is only deposited readable in case in all son files, the quantity of the son file of the corresponding receiving target data of authority of each rank, for any two authorities, the quantity that terminal device corresponding to the authority that rank is higher receives the son file of described target data is more, step S 1comprise:
S 11, described present terminal equipment receives one to the instruction of described other-end device transmission one target data;
S 12, the authority that has of other-end equipment described in described present terminal equipment query son file target data being divided into the quantity corresponding to authority of described other-end equipment to be to encrypt described target data;
Wherein, described deciphering is for merge all son files.
Above-mentionedly be a kind of cryptographic algorithm to the division of target data each time, e.g., target data being divided into 4 one's share of expenses for a joint undertaking files is a kind of cryptographic algorithm, and target data being divided into 5 one's share of expenses for a joint undertaking files is then the cryptographic algorithm that another kind of authority is higher.Terminal device can receive the quantity of the son file of same target data according to the authority setting of self, the quantity of the higher reception of authority is more, present terminal equipment is according to the quantity of the delineation of power target data of target terminal equipment, when target data needs the terminal device sending to high-level authority, target data is divided into a fairly large number of part, the son file limited amount received due to the terminal device of low level authority and whole son files cannot be received, thus make son file cannot decipher to obtain target data.
Preferably, described terminal device is mobile phone, computer or panel computer.
The application also provides a kind of terminal system, described terminal system comprises some terminal devices, its feature is, each terminal device includes at least two kinds of cryptographic algorithm, the all corresponding authority of each cryptographic algorithm, each terminal device also comprises an encrypting module, a transport module, a judge module and a deciphering module
The encrypting module of present terminal equipment is encrypted a target data for utilizing a kind of described cryptographic algorithm;
The transport module of described present terminal equipment is used for the target data after by encryption and is sent to an other-end equipment;
The judge module of described other-end equipment has the authority of deciphering described target data for judging whether, if then call described deciphering module;
The deciphering module of described other-end equipment is used for being decrypted described target data.
Preferably, each terminal device also comprises a receiver module and an enquiry module,
The receiver module of described present terminal equipment is for receiving one to the instruction of described other-end device transmission one target data;
The enquiry module of described present terminal equipment is for the authority of inquiring about described other-end equipment and having and according to the authority Choice encryption algorithm of described other-end equipment;
The encrypting module of described present terminal equipment is encrypted described target data for utilizing the cryptographic algorithm selected.
Preferably, described authority is divided into some ranks, and for any two authorities, cryptographic algorithm complexity corresponding to the authority that rank is higher is higher, and the terminal device with the authority of higher level can decipher the cryptographic algorithm corresponding to more low-level authority.
Preferably, described authority is divided into some ranks, described cryptographic algorithm comprises target data is divided into several son files, target data after division is only deposited readable in case in all son files, the quantity of the son file of the corresponding receiving target data of the authority of each rank, for any two authorities, the quantity that terminal device corresponding to the authority that rank is higher receives the son file of described target data is more, each terminal device also comprises a receiver module and an enquiry module
The receiver module of described present terminal equipment is for receiving one to the instruction of described other-end device transmission one target data;
The authority that the enquiry module of described present terminal equipment has for inquiring about described other-end equipment;
The encrypting module of described present terminal equipment is used for the son file of the quantity corresponding to authority target data being divided into described other-end equipment to encrypt described target data.
Preferably, described terminal device is mobile phone, computer or panel computer.
On the basis meeting this area general knowledge, above-mentioned each optimum condition, can combination in any, obtains the preferred embodiments of the invention.
Positive progressive effect of the present invention is: file encrypting method of the present invention does not need user to input password to be encrypted or to decipher, for user provides convenience, user can arrange encryption, select according to the needs of oneself in addition, for user provides more function.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the file encrypting method of the embodiment of the present invention 1.
Fig. 2 is the structural representation of the mobile phone of the embodiment of the present invention 1.
Fig. 3 is the process flow diagram of the file encrypting method of the embodiment of the present invention 2.
Embodiment
Mode below by embodiment further illustrates the present invention, but does not therefore limit the present invention among described scope of embodiments.
Embodiment 1
See Fig. 2, the present embodiment provides a kind of terminal system, and described terminal system comprises 5 mobile terminals (i.e. terminal device), and described mobile terminal is respectively mobile phone 1, mobile phone 2, mobile phone 3, notebook computer 4, panel computer 5.
For each mobile terminal, described mobile terminal includes four kinds of cryptographic algorithm, and all corresponding authority of each cryptographic algorithm, described authority is divided into four ranks.In the present embodiment, the corresponding one-level authority of algorithm A; The corresponding secondary authority of algorithm B; The corresponding three grades of authorities of algorithm C; The corresponding level Four authority of algorithm D.The authority of each rank is separate, and mobile phone 1 has one to level Four authority, and mobile phone 2 has two to level Four authority, and mobile phone 3, notebook computer 4, panel computer 5 all only have level Four authority.Described mobile terminal also comprises encrypting module 11, transport module 12, judge module 13, receiver module 14, enquiry module 15 and a deciphering module 16.
The present embodiment to other mobile terminal transmission objectives data instances with mobile phone 1, but does not represent and only has mobile phone 1 can as current mobile device.
The receiver module 14 of mobile phone 1 is for receiving one to transmit instruction from a target data to other four mobile terminals.
The enquiry module 15 of described mobile phone 1 is for the authority of inquiring about other mobile terminals described and having and according to the authority Choice encryption algorithm of other mobile terminals described, in the present embodiment, mobile phone 1 inquires other four mobile terminals and all has level Four authority, and target data is encrypted by the algorithm D that mobile phone 1 is corresponding according to level Four authority.The authority of each mobile terminal can be arranged when Initialize installation, also authority can be changed in the process used, mobile phone 1 can prestore when initial setting up the authority of each mobile terminal, also can send the authority that Query Information has to other mobile terminal enquiries before encryption target data.
The encrypting module 11 of described mobile phone 1 is encrypted described target data for utilizing the cryptographic algorithm selected.Because other four mobile terminals all have level Four authority, so utilize algorithm D other four mobile terminals can be allowed to decipher to target data encryption obtain target data content.
The transport module 12 of described mobile phone 1 is for being sent to other four mobile terminals beyond mobile phone 1 by the target data after encryption.
The judge module 13 of other four mobile terminals described has the authority of deciphering described target data for judging whether, if then call described deciphering module 16.In the present embodiment, other four mobile terminals all have level Four authority, can be decrypted target data.
The deciphering module of other four mobile terminals described is used for being decrypted described target data.
In above process, each mobile terminal does not all carry out setting or the input password to decipher of password, and encryption/decryption processes can complete when the non-perception of user.Can not only provide convenience to user, user can also be allowed to have multiple mode of operation, as mobile phone 1 can also utilize algorithm B to be encrypted target data, target data after such encryption can only be deciphered by mobile phone 2, so can play the privacy functions of target data to mobile phone 3, notebook computer 4, panel computer 5.
In addition, the mobile terminal of the present embodiment can also send target data according to authority, such as, mobile phone 1 utilizes algorithm B to be encrypted target data, because other mobile terminals except mobile phone 2 all cannot be decrypted target data, therefore can arrange other mobile terminals cannot receiving target data, and but the terminal system of the present embodiment can also be set to other mobile terminals can receiving target the data pattern that cannot be decrypted.
See Fig. 1, the present embodiment also provides a kind of file encrypting method utilizing above-mentioned terminal system to realize, and described file encrypting method comprises:
Step 100, described mobile phone 1 receive one to transmit instruction from a target data to described mobile phone 2.
In the present embodiment, the instruction that mobile phone 1 receives is: only send target data to mobile phone 2.
Step 101, described mobile phone 1 inquire about authority that described mobile phone 2 has and cryptographic algorithm corresponding to the highest-ranking authority selecting mobile phone 2 to receive according to the authority of described mobile phone 2.
Here, mobile phone 2 have two to level Four authority, if only send to mobile phone 2 the highest-ranking authority that target data needs to utilize mobile phone 2 to receive, the cryptographic algorithm that namely secondary authority is corresponding is encrypted target data.
Step 102, described mobile phone 1 utilize the cryptographic algorithm selected to encrypt described target data.
Target data after encryption is sent to mobile phone 2 by step 103, described mobile phone 1.
Step 104, described mobile phone 2 judge whether to have the authority of deciphering described target data, if then perform step 105, and then process ends if not.
Step 105, described target data to be decrypted.
In the file encrypting method of the present embodiment, mobile phone 1 and mobile phone 2 all do not carry out setting or the input password to decipher of password, and encryption/decryption processes can complete when the non-perception of user.Can not only provide convenience to user, user can also be allowed to have multiple mode of operation.
Embodiment 2
The terminal system of the present embodiment is substantially identical with the terminal system of embodiment 1, and difference is only:
For any two authorities, cryptographic algorithm complexity corresponding to the authority that rank is higher is higher, and the mobile terminal with the authority of higher level can decipher the cryptographic algorithm corresponding to more low-level authority.
In the present embodiment, mobile terminal no longer needs to arrange multiple authority, and as mobile phone 1 has one to level Four authority, in the present embodiment, but mobile phone 1 only has one-level authority covers the repertoire of other rudimentary authorities.
Described cryptographic algorithm is for be divided into several son files by target data, target data after division is only deposited readable in case in all son files, the quantity of the son file of the corresponding receiving target data of authority of each rank, for any two authorities, the quantity of the son file of the mobile terminal receiving target data that the authority that rank is higher is corresponding is more.
In the present embodiment, target data is divided into 5 son files by algorithm A; Target data is divided into 4 son files by algorithm B; Target data is divided into 3 son files by algorithm C; Target data is divided into 2 son files by algorithm D.Mobile phone 1 has one-level authority, can receive 5 son files of same target data; Mobile phone 2 has secondary authority, can receive 4 son files of same target data; Mobile phone 3, notebook computer 4, panel computer 5 all only have level Four authority, can receive 2 son files of same target data.
The present embodiment to other mobile terminal transmission objectives data instances with mobile phone 1, but does not represent and only has mobile phone 1 can as current mobile device.
The receiver module of described mobile phone 1 is for receiving one to transmit instruction from a target data to other mobile terminals.
The authority that the enquiry module of described mobile phone 1 has for inquiring about other mobile terminals described.
The encrypting module of described mobile phone 1 is used for the son file of the quantity corresponding to authority target data being divided into other mobile terminals described to encrypt described target data.
Here, transmitting terminal divides target data according to the authority of receiving end mobile terminal, the son file quantity of the higher reception of authority is more, the low mobile terminal of authority due to the son file quantity received few, when receiving the son file being transferred to high authority, because the son file received quantity for same target data is restricted, so complete target data cannot be obtained, therefore can not read target data, thus realize file encryption.
In the present embodiment, utilize mobile phone 1 as follows to the process of mobile phone 2 transmission objectives data:
Mobile phone 1 judges that mobile phone 2 has secondary authority, that is mobile phone 2 can receive the son file of same target data is 4, target data is divided into 4 son files and issues by mobile phone 1, if the mobile phone of Insufficient privilege 3 have received son file, the quantity can collecting the son file of same target data due to mobile phone 3 is 2, even if therefore mobile phone 3 have received son file and also cannot merge into target data and read information, the mobile terminal of Insufficient privilege is (as mobile phone 3, notebook computer 4, panel computer 5) son file that can receive can be the header of target data, thus the effect of notice can be played.
Wherein, described deciphering is for merge all son files.
The file encrypting method of the present embodiment coordinates with cryptographic algorithm and can realize several functions, for user provides more convenience, and can with the function of keeping secret of easy algorithm realization complexity.
See Fig. 3, the file encrypting method of the present embodiment is substantially the same manner as Example 1, and difference is only:
Step 201, described mobile phone 1 receive one to transmit instruction from a target data to mobile phone 2.
The authority that step 202, described mobile phone 1 inquiry mobile phone 2 have son file target data being divided into the quantity corresponding to authority of described mobile phone 2, to encrypt described target data, then perform step 103.
Wherein, described deciphering is for merge all son files.
Utilize the file encrypting method of the present embodiment, mobile phone 1 can also realize: mobile phone 3 is to mobile phone 2 transmission objectives data, mobile phone 2 can receive at most 4 son files, therefore target data is divided into 4 son files by mobile phone 3, although mobile phone 3 only can receive 2 son files, but quantity mobile phone 3 can being arranged to divide target data is greater than 2, such mobile phone 3 just can give the mobile phone 2 encrypted transmission file of high authority, simultaneously, the quantity of the son file that can receive due to mobile phone 1 is 5, therefore mobile phone 1 can be set to the file of the mobile terminal that can receive all low rights as supervisory terminal.
Although the foregoing describe the specific embodiment of the present invention, it will be understood by those of skill in the art that these only illustrate, protection scope of the present invention is defined by the appended claims.Those skilled in the art, under the prerequisite not deviating from principle of the present invention and essence, can make various changes or modifications to these embodiments, but these change and amendment all falls into protection scope of the present invention.

Claims (10)

1. a file encrypting method, for terminal system, described terminal system comprises some terminal devices, it is characterized in that, each terminal device includes at least two kinds of cryptographic algorithm, all corresponding authority of each cryptographic algorithm, and described file encrypting method comprises:
S 1, a kind of described cryptographic algorithm of present terminal equipment utilization encrypts a target data;
S 2, described present terminal equipment by encryption after target data be sent to an other-end equipment;
S 3, described other-end equipment judges whether to have the authority of deciphering described target data, if then perform step S 4, then process ends if not;
S 4, described target data is decrypted.
2. file encrypting method as claimed in claim 1, is characterized in that, step S 1comprise:
S 11, described present terminal equipment receives one to the instruction of described other-end device transmission one target data;
S 12, the authority that has of other-end equipment described in described present terminal equipment query according to the authority Choice encryption algorithm of described other-end equipment;
S 13, the cryptographic algorithm selected of described present terminal equipment utilization encrypts described target data.
3. file encrypting method as claimed in claim 1, it is characterized in that, described authority is divided into some ranks, for any two authorities, cryptographic algorithm complexity corresponding to the authority that rank is higher is higher, and the terminal device with the authority of higher level can decipher the cryptographic algorithm corresponding to more low-level authority.
4. file encrypting method as claimed in claim 1, it is characterized in that, described authority is divided into some ranks, described cryptographic algorithm comprises target data is divided into several son files, target data after division is only deposited readable in case in all son files, the quantity of the son file of the corresponding receiving target data of authority of each rank, for any two authorities, the quantity that terminal device corresponding to the authority that rank is higher receives the son file of described target data is more, step S 1comprise:
S 11, described present terminal equipment receives one to the instruction of described other-end device transmission one target data;
S 12, the authority that has of other-end equipment described in described present terminal equipment query son file target data being divided into the quantity corresponding to authority of described other-end equipment to be to encrypt described target data;
Wherein, described deciphering is for merge all son files.
5. as the file encrypting method in Claims 1-4 as described in any one, it is characterized in that, described terminal device is mobile phone, computer or panel computer.
6. a terminal system, described terminal system comprises some terminal devices, it is characterized in that, each terminal device includes at least two kinds of cryptographic algorithm, the all corresponding authority of each cryptographic algorithm, each terminal device also comprises an encrypting module, a transport module, a judge module and a deciphering module
The encrypting module of present terminal equipment is encrypted a target data for utilizing a kind of described cryptographic algorithm;
The transport module of described present terminal equipment is used for the target data after by encryption and is sent to an other-end equipment;
The judge module of described other-end equipment has the authority of deciphering described target data for judging whether, if then call described deciphering module;
The deciphering module of described other-end equipment is used for being decrypted described target data.
7. terminal system as claimed in claim 6, it is characterized in that, each terminal device also comprises a receiver module and an enquiry module,
The receiver module of described present terminal equipment is for receiving one to the instruction of described other-end device transmission one target data;
The enquiry module of described present terminal equipment is for the authority of inquiring about described other-end equipment and having and according to the authority Choice encryption algorithm of described other-end equipment;
The encrypting module of described present terminal equipment is encrypted described target data for utilizing the cryptographic algorithm selected.
8. terminal system as claimed in claim 6, it is characterized in that, described authority is divided into some ranks, for any two authorities, cryptographic algorithm complexity corresponding to the authority that rank is higher is higher, and the terminal device with the authority of higher level can decipher the cryptographic algorithm corresponding to more low-level authority.
9. terminal system as claimed in claim 6, it is characterized in that, described authority is divided into some ranks, described cryptographic algorithm comprises target data is divided into several son files, target data after division is only deposited readable in case in all son files, the quantity of the son file of the corresponding receiving target data of authority of each rank, for any two authorities, the quantity that terminal device corresponding to the authority that rank is higher receives the son file of described target data is more, each terminal device also comprises a receiver module and an enquiry module
The receiver module of described present terminal equipment is for receiving one to the instruction of described other-end device transmission one target data;
The authority that the enquiry module of described present terminal equipment has for inquiring about described other-end equipment;
The encrypting module of described present terminal equipment is used for the son file of the quantity corresponding to authority target data being divided into described other-end equipment to encrypt described target data;
Wherein, described deciphering is for merge all son files.
10. as the terminal system in claim 6 to 9 as described in any one, it is characterized in that, described terminal device is mobile phone, computer or panel computer.
CN201510208298.XA 2015-04-27 2015-04-27 File encrypting method and terminal system Active CN104794408B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510208298.XA CN104794408B (en) 2015-04-27 2015-04-27 File encrypting method and terminal system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510208298.XA CN104794408B (en) 2015-04-27 2015-04-27 File encrypting method and terminal system

Publications (2)

Publication Number Publication Date
CN104794408A true CN104794408A (en) 2015-07-22
CN104794408B CN104794408B (en) 2017-12-08

Family

ID=53559197

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510208298.XA Active CN104794408B (en) 2015-04-27 2015-04-27 File encrypting method and terminal system

Country Status (1)

Country Link
CN (1) CN104794408B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022147A (en) * 2016-05-26 2016-10-12 珠海市魅族科技有限公司 Method and device for file encryption and decryption

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859086A (en) * 2005-12-31 2006-11-08 华为技术有限公司 Content grading access control system and method
CN103427998A (en) * 2013-08-20 2013-12-04 航天恒星科技有限公司 Internet data distribution oriented identity authentication and data encryption method
CN103455764A (en) * 2013-08-27 2013-12-18 无锡华御信息技术有限公司 File segmentation and merging technology-based file encryption and decryption systems
CN104184740A (en) * 2014-09-04 2014-12-03 中电长城网际系统应用有限公司 Credible transmission method, credible third party and credible transmission system
CN104270350A (en) * 2014-09-19 2015-01-07 杭州华三通信技术有限公司 Key information transmission method and equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859086A (en) * 2005-12-31 2006-11-08 华为技术有限公司 Content grading access control system and method
CN103427998A (en) * 2013-08-20 2013-12-04 航天恒星科技有限公司 Internet data distribution oriented identity authentication and data encryption method
CN103455764A (en) * 2013-08-27 2013-12-18 无锡华御信息技术有限公司 File segmentation and merging technology-based file encryption and decryption systems
CN104184740A (en) * 2014-09-04 2014-12-03 中电长城网际系统应用有限公司 Credible transmission method, credible third party and credible transmission system
CN104270350A (en) * 2014-09-19 2015-01-07 杭州华三通信技术有限公司 Key information transmission method and equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022147A (en) * 2016-05-26 2016-10-12 珠海市魅族科技有限公司 Method and device for file encryption and decryption

Also Published As

Publication number Publication date
CN104794408B (en) 2017-12-08

Similar Documents

Publication Publication Date Title
US7817802B2 (en) Cryptographic key management in a communication network
CN102412967B (en) Data transmission system and method
US8923514B2 (en) Apparatus and method for authentication for motor vehicles
CN104731612B (en) Mobile equipment safety component software is tied to SIM
CN108632250B (en) Method and equipment for generating command control session master key and transmitting operation command
CN105812332A (en) Data protection method
CN105205898A (en) Electronic code permission management system for intelligent lock
CN108881195A (en) Data safety sharing method and device based on cloud environment
CN103067158A (en) Encryption and decryption method, terminal device, gateway device and key management system
JP2017514421A (en) Authentication apparatus and method
CN204360381U (en) mobile device
CN105162772A (en) IoT equipment authentication and key agreement method and device
CN106452770A (en) Data encryption method and apparatus, data decryption method and apparatus, and system
CN107454590A (en) A kind of data ciphering method, decryption method and wireless router
CN105959648B (en) A kind of encryption method, device and video monitoring system
CN107707562B (en) Method and device for encrypting and decrypting algorithm of asymmetric dynamic token
CN106685981B (en) Multi-system data encryption transmission method and device
CN106549939A (en) Intelligent access control system data processing method and device
CN101711028B (en) Method for automatically protecting user data on mobile terminal
CN101883102A (en) Link generation method
CN102833077A (en) Encryption and decryption methods of remote card-issuing data transmission of financial IC (Integrated Circuit) card and financial social security IC card
CN104796262A (en) Data encryption method and terminal system
CN102938762A (en) File safety management system based on mobile terminal
CN103577763A (en) Mobile terminal device with data protection function and data protection method
CN104683358A (en) Anti-repudiation dynamic password generating method and dynamic password verification system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant