CN104794408B - File encrypting method and terminal system - Google Patents

File encrypting method and terminal system Download PDF

Info

Publication number
CN104794408B
CN104794408B CN201510208298.XA CN201510208298A CN104794408B CN 104794408 B CN104794408 B CN 104794408B CN 201510208298 A CN201510208298 A CN 201510208298A CN 104794408 B CN104794408 B CN 104794408B
Authority
CN
China
Prior art keywords
authority
target data
terminal
aes
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510208298.XA
Other languages
Chinese (zh)
Other versions
CN104794408A (en
Inventor
戴佑俊
李辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Green Orange Industry Co Ltd
Original Assignee
Shanghai Green Orange Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Green Orange Industry Co Ltd filed Critical Shanghai Green Orange Industry Co Ltd
Priority to CN201510208298.XA priority Critical patent/CN104794408B/en
Publication of CN104794408A publication Critical patent/CN104794408A/en
Application granted granted Critical
Publication of CN104794408B publication Critical patent/CN104794408B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of file encrypting method and terminal system, the terminal system includes some terminal devices, and each terminal device includes at least two AESs, the corresponding authority of each AES, and the file encrypting method includes:S1, a kind of AES of present terminal equipment utilization encrypts to a target data;S2, the present terminal equipment target data after encryption is sent to an other-end equipment;S3, the other-end equipment judge whether with the authority for decrypting the target data, if then performing step S4If otherwise terminate flow;S4, the target data is decrypted.The file encrypting method of the present invention does not need user to input password and is encrypted or decrypts, and provides the user conveniently, and user can be configured to encryption according to the needs of oneself, select in addition, provide the user more functions.

Description

File encrypting method and terminal system
Technical field
The present invention relates to a kind of file encrypting method and terminal system.
Background technology
As terminal device (such as mobile phone, tablet personal computer) function is become stronger day by day, the file of storage is also more and more, its Include the file of more privacy or need for confidentiality, it is therefore desirable to take certain encryption to limit these files, to prevent Owner's unauthorized or it is unknown in the case of, the file in terminal device is stolen and applied by other people.
At present, the guard method for file is by inputting cryptoguard mostly, and this mode operates relatively complicated, use Family is when sending, receiving the file for needing to encrypt, it is necessary to which setting code or input password, make the operation of user not convenient enough.Separately Outside, if be encrypted and decrypted by the intrinsic security algorithm of terminal device chips, user is not felt by terminal device and added Close and decryption process, brings conveniently for user, but this mode function is more single, and user can not be according to the need of oneself Ask setting encryption and manner of decryption.
The content of the invention
The technical problem to be solved in the present invention be in order to overcome in the prior art file encrypting method can not take into account as user It is convenient and the defects of can realize multiple functions to provide, there is provided a kind of simple operation and can be provided according to the demand of user a variety of The file encrypting method and terminal system of cipher mode.
The present invention is that solve above-mentioned technical problem by following technical proposals:
A kind of file encrypting method, for terminal system, the terminal system includes some terminal devices, and its feature exists In each terminal device includes at least two AESs, the corresponding authority of each AES, the file encryption side Method includes:
S1, a kind of AES of present terminal equipment utilization encrypts to a target data;
S2, the present terminal equipment target data after encryption is sent to an other-end equipment;
S3, the other-end equipment judges whether with the authority for decrypting the target data, if then performing step S4If otherwise terminate flow;
S4, the target data is decrypted.
The terminal device of the application includes multiple encryption algorithms, and each terminal device can pre-set authority, eventually Target data can be sent to the terminal device of the terminal device, only permission match specified by end system according to different authorities Target data can be read.Encryption is divided into multiple ranks by the present invention, and user can need selection AES according to oneself So as to realize that encryption file is only capable of being designated terminal device decryption reading, more functions have been provided the user.And user is not The setting and input of progress password are needed, simplifies the operation of user.The target data can be file or information.
It is preferred that step S1Including:
S11, the present terminal equipment receive an instruction that a target data is transmitted to the other-end equipment;
S12, the authority that has of other-end equipment described in the present terminal equipment query and set according to the other-end Standby authority selection AES;
S13, the AES selected of the present terminal equipment utilization encrypts to the target data.
The terminal device of the application can get authority possessed by target terminal equipment before target data is sent, And send target data according to this authority.It is possible to further which authority is divided into some ranks, present terminal equipment is inquiring Can be with the AES corresponding to highest-ranking authority that target terminal equipment can receive after the authority of target terminal equipment Target data is encrypted so that target data can be by authority at " the highest-ranking authority that can be received " all of above end End equipment receives and decrypts, and Insufficient privilege can not receive, or can not also be decrypted even if receiving.
It is preferred that the authority is divided into some ranks, for any two authority, encrypted corresponding to the higher authority of rank Algorithm complex is higher, and the terminal device of the authority with higher level can decrypt adding corresponding to the other authority of lower level Close algorithm.
It is preferred that the authority is divided into some ranks, the AES includes target data being divided into some height File, the target data after division is only readable in the presence of all subfiles, and the authority corresponding one of each rank receives The quantity of the subfile of target data, for any two authority, described in terminal device reception corresponding to the higher authority of rank The quantity of the subfile of target data is more, step S1Including:
S11, the present terminal equipment receive an instruction that a target data is transmitted to the other-end equipment;
S12, the authority that has of other-end equipment described in the present terminal equipment query and target data is divided into institute The subfile of the quantity corresponding to the authority of other-end equipment is stated with to target data encryption;
Wherein, the decryption is to merge all subfiles.
The above-mentioned division each time to target data is a kind of AES, e.g., target data is divided into 4 one's shares of expenses for a joint undertaking text Part is a kind of AES, and it is then the higher AES of another authority that target data is divided into 5 one's share of expenses for a joint undertaking files.Terminal Equipment can receive the quantity of the subfile of same target data according to the authority setting of itself, and the quantity of the higher reception of authority is more More, present terminal equipment is according to the quantity of the delineation of power target data of target terminal equipment, when target data needs to be sent to During the terminal device of high-level authority, target data is divided into a fairly large number of part, due to the terminal device of low level authority The subfile limited amount of reception and whole subfiles can not be received so that subfile can not be decrypted to obtain number of targets According to.
It is preferred that the terminal device is mobile phone, computer or tablet personal computer.
The application also provides a kind of terminal system, and the terminal system includes some terminal devices, and its feature is, each Terminal device includes at least two AESs, the corresponding authority of each AES, and each terminal device also includes one Encrypting module, a transport module, a judge module and a deciphering module,
The encrypting module of present terminal equipment is used to encrypt a target data using a kind of AES;
The transport module of the present terminal equipment is used to the target data after encryption being sent to an other-end equipment;
The judge module of the other-end equipment is used to judge whether the authority with the target data is decrypted, if Then call the deciphering module;
The deciphering module of the other-end equipment is used to the target data be decrypted.
It is preferred that each terminal device also includes a receiving module and an enquiry module,
The receiving module of the present terminal equipment is used to receive one to the other-end equipment one target data of transmission Instruction;
The enquiry module of the present terminal equipment is used to inquire about the authority that the other-end equipment has and according to institute State the authority selection AES of other-end equipment;
The encrypting module of the present terminal equipment is used to encrypt the target data using the AES selected.
It is preferred that the authority is divided into some ranks, for any two authority, encrypted corresponding to the higher authority of rank Algorithm complex is higher, and the terminal device of the authority with higher level can decrypt adding corresponding to the other authority of lower level Close algorithm.
It is preferred that the authority is divided into some ranks, the AES includes target data being divided into some height File, the target data after division is only readable in the presence of all subfiles, and the authority corresponding one of each rank receives The quantity of the subfile of target data, for any two authority, described in terminal device reception corresponding to the higher authority of rank The quantity of the subfile of target data is more, and each terminal device also includes a receiving module and an enquiry module,
The receiving module of the present terminal equipment is used to receive one to the other-end equipment one target data of transmission Instruction;
The enquiry module of the present terminal equipment is used to inquire about the authority that the other-end equipment has;
The encrypting module of the present terminal equipment is used for the authority that target data is divided into the other-end equipment The subfile of corresponding quantity is with to target data encryption.
It is preferred that the terminal device is mobile phone, computer or tablet personal computer.
It on the basis of common sense in the field is met, above-mentioned each optimum condition, can be combined, it is each preferably real to produce the present invention Example.
The positive effect of the present invention is:The file encrypting method of the present invention does not need user's input password to be added Close or decryption, provide the user conveniently, user can be configured to encryption according to the needs of oneself, select in addition, be user More functions are provided.
Brief description of the drawings
Fig. 1 is the flow chart of the file encrypting method of the embodiment of the present invention 1.
Fig. 2 is the structural representation of the mobile phone of the embodiment of the present invention 1.
Fig. 3 is the flow chart of the file encrypting method of the embodiment of the present invention 2.
Embodiment
The present invention is further illustrated below by the mode of embodiment, but does not therefore limit the present invention to described reality Apply among a scope.
Embodiment 1
Referring to Fig. 2, the present embodiment provides a kind of terminal system, and the terminal system includes 5 mobile terminals, and (i.e. terminal is set It is standby), the mobile terminal is respectively mobile phone 1, mobile phone 2, mobile phone 3, notebook computer 4, tablet personal computer 5.
For each mobile terminal, the mobile terminal includes four kinds of AESs, each AES corresponding one Authority, the authority are divided into four ranks.In the present embodiment, algorithm A corresponds to one-level authority;Algorithm B corresponds to two level authority;Calculate Method C corresponds to three-level authority;Algorithm D corresponds to level Four authority.The authority of each rank is separate, and mobile phone 1 has one to be weighed to level Four Limit, mobile phone 2 have two to arrive level Four authority, and mobile phone 3, notebook computer 4, tablet personal computer 5 only have level Four authority.The movement Terminal also include an encrypting module 11, a transport module 12, a judge module 13, a receiving module 14, an enquiry module 15 with An and deciphering module 16.
The present embodiment with mobile phone 1 to other mobile terminal transmission objectives data instances, but represent only have the ability of mobile phone 1 Enough it is used as current mobile device.
The receiving module 14 of mobile phone 1 is used to receive an instruction for transmitting a target data to other four mobile terminals.
The enquiry module 15 of the mobile phone 1 be used to inquiring about the authority that other described mobile terminals have and according to it is described other The authority selection AES of mobile terminal, mobile phone 1 inquires other four mobile terminals and is respectively provided with level Four power in the present embodiment Limit, the algorithm D according to corresponding to level Four authority of mobile phone 1 encrypt target data.The authority of each mobile terminal can initialize It is configured during setting, can also changes authority during use, mobile phone 1 can prestores each movement in initial setting up The authority of terminal, power possessed by Query Information to other mobile terminal enquiries can also be sent before target data is encrypted Limit.
The encrypting module 11 of the mobile phone 1 is used to encrypt the target data using the AES selected.Due to Other four mobile terminals all have level Four authority, so can allow other four movements to target data encryption using algorithm D Terminal, which can decrypt, obtains target data content.
The transport module 12 of the mobile phone 1 is used to for the target data after encryption to be sent to other four beyond mobile phone 1 Mobile terminal.
The judge module 13 of other four mobile terminals is used to judge whether the power with the target data is decrypted Limit, if then calling the deciphering module 16.In the present embodiment, other four mobile terminals are respectively provided with level Four authority, can be right Target data is decrypted.
The deciphering module of other four mobile terminals is used to the target data be decrypted.
In above process, each mobile terminal does not carry out the setting or input password decryption of password, encryption/decryption Process can be completed in the case where user does not perceive.It can not only provide the user with conveniently, additionally it is possible to allow user to have a variety of behaviour Make mode, as mobile phone 1 target data can also be encrypted using algorithm B, the target data after so encrypting can only be by hand Machine 2 is decrypted, it is possible to play target data to mobile phone 3, notebook computer 4, tablet personal computer 5 privacy functions.
In addition, the mobile terminal of the present embodiment can also send target data according to authority, such as, mobile phone 1 utilizes calculation Target data is encrypted method B, because target data can not be decrypted for other mobile terminals in addition to mobile phone 2, Therefore other mobile terminals can be set can not to receive target data, the terminal system of the present embodiment can also be arranged to other shiftings The pattern that dynamic terminal can receive target data but can not be decrypted.
Referring to Fig. 1, the present embodiment also provides a kind of file encrypting method realized using above-mentioned terminal system, the file Encryption method includes:
Step 100, the mobile phone 1 receive an instruction that a target data is transmitted to the mobile phone 2.
In the present embodiment, the instruction that mobile phone 1 receives is:Only target data is sent to mobile phone 2.
Step 101, the mobile phone 1 inquire about the authority that the mobile phone 2 has and select mobile phone according to the authority of the mobile phone 2 AES corresponding to the 2 highest-ranking authorities that can be received.
Here, mobile phone 2 has two to arrive level Four authority, needs to utilize hand if only sending target data to mobile phone 2 Target data is encrypted for the highest-ranking authority that machine 2 can receive, i.e. AES corresponding to two level authority.
Step 102, the mobile phone 1 are encrypted using the AES selected to the target data.
Target data after encryption is sent to mobile phone 2 by step 103, the mobile phone 1.
Step 104, the mobile phone 2 judge whether with the authority for decrypting the target data, if then performing step 105, if otherwise terminating flow.
Step 105, the target data is decrypted.
In the file encrypting method of the present embodiment, mobile phone 1 and mobile phone 2 do not carry out the setting of password or input password solution Close, encryption/decryption processes can be completed in the case where user does not perceive.It can not only provide the user with conveniently, additionally it is possible to allow User has a variety of modes of operation.
Embodiment 2
The terminal system of the terminal system of the present embodiment and embodiment 1 is essentially identical, the difference is that only:
For any two authority, AES complexity corresponding to the higher authority of rank is higher, and with more advanced The mobile terminal of other authority can decrypt the AES corresponding to the other authority of lower level.
In the present embodiment, mobile terminal no longer needs to set multiple authorities, as mobile phone 1 has one to level Four authority, this reality Apply in example, mobile phone 1 only has one-level authority but covers the repertoire of other rudimentary authorities.
The AES is that target data is divided into several subfiles, and the target data after division is only in all sons Readable in the presence of file, the authority corresponding one of each rank receives the quantity of the subfile of target data, for any Two authorities, the quantity that mobile terminal corresponding to the higher authority of rank receives the subfile of target data are more.
In the present embodiment, algorithm A is that target data is divided into 5 subfiles;Algorithm B is that target data is divided into 4 Individual subfile;Algorithm C is that target data is divided into 3 subfiles;Algorithm D is that target data is divided into 2 subfiles.Hand Machine 1 has one-level authority, can receive 5 subfiles of same target data;Mobile phone 2 has two level authority, can receive same 4 subfiles of one target data;Mobile phone 3, notebook computer 4, tablet personal computer 5 only have level Four authority, can receive same 2 subfiles of one target data.
The present embodiment with mobile phone 1 to other mobile terminal transmission objectives data instances, but represent only have the ability of mobile phone 1 Enough it is used as current mobile device.
The receiving module of the mobile phone 1 is used to receive an instruction for transmitting a target data to other mobile terminals.
The enquiry module of the mobile phone 1 is used to inquire about the authority that other described mobile terminals have.
The encrypting module of the mobile phone 1 is used to target data being divided into corresponding to the authority of other mobile terminals The subfile of quantity is with to target data encryption.
Here, transmitting terminal divides target data, the Ziwen of the higher reception of authority according to the authority of receiving terminal mobile terminal Number of packages amount is more, and the low mobile terminal of authority is receiving the Ziwen that is transferred to high authority because the subfile quantity of reception is few During part, because the subfile received quantity for same target data is restricted, so complete target data can not be obtained, because This can not be read out to target data, so as to realize file encryption.
In the present embodiment, it is as follows to the process of the transmission objectives data of mobile phone 2 using mobile phone 1:
Mobile phone 1 judges that mobile phone 2 has two level authority, that is to say, that mobile phone 2 can receive the subfile of same target data For 4, target data is divided into 4 subfiles and issued by mobile phone 1, if the mobile phone 3 of Insufficient privilege have received subfile, by Can be collected in mobile phone 3 subfile of same target data quantity be 2, therefore even if mobile phone 3 have received subfile also without Method merges into target data and reads information, the mobile terminal (such as mobile phone 3, notebook computer 4, tablet personal computer 5) of Insufficient privilege The subfile that can be received can be the header of target data, so as to play a part of notice.
Wherein, the decryption is to merge all subfiles.
The file encrypting method of the present embodiment coordinates with AES can realize multiple functions, provide the user more It is convenient, and complicated function of keeping secret can be realized with easy algorithm.
Referring to Fig. 3, the file encrypting method of the present embodiment is substantially the same manner as Example 1, the difference is that only:
Step 201, the mobile phone 1 receive an instruction that a target data is transmitted to mobile phone 2.
Target data is simultaneously divided into the authority of the mobile phone 2 by authority that step 202, the inquiry mobile phone 2 of the mobile phone 1 have Then the subfile of corresponding quantity performs step 103 to be encrypted to the target data.
Wherein, the decryption is to merge all subfiles.
Using the file encrypting method of the present embodiment, mobile phone 1 can also be realized:Mobile phone 3 to the transmission objectives data of mobile phone 2, Mobile phone 2 can at most receive 4 subfiles, therefore target data is divided into 4 subfiles by mobile phone 3, although mobile phone 3 is only capable of 2 subfiles are enough received, but the quantity that mobile phone 3 can be arranged to to divide target data is more than 2, and such mobile phone 3 is with regard to energy Enough encrypted transmission files of mobile phone 2 to high authority, simultaneously as the quantity for the subfile that mobile phone 1 can receive is 5, therefore Mobile phone 1 can be configured to receive to the file of the mobile terminal of all low rights as supervisory terminal.
Although the foregoing describing the embodiment of the present invention, it will be appreciated by those of skill in the art that these It is merely illustrative of, protection scope of the present invention is defined by the appended claims.Those skilled in the art is not carrying on the back On the premise of principle and essence from the present invention, various changes or modifications can be made to these embodiments, but these are changed Protection scope of the present invention is each fallen within modification.

Claims (8)

1. a kind of file encrypting method, for terminal system, the terminal system includes some terminal devices, it is characterised in that Each terminal device includes at least two AESs, and the corresponding authority of each AES, the authority is divided into some Rank, the AES include target data being divided into several subfiles, and the target data after division is only in all sons Readable in the presence of file, the authority corresponding one of each rank receives the quantity of the subfile of target data, for any Two authorities, the quantity that terminal device corresponding to the higher authority of rank receives the subfile of the target data is more, described File encrypting method includes:
S1, present terminal equipment receive one to other-end equipment transmit a target data instruction;
S2, the authority that has of other-end equipment described in the present terminal equipment query and by target data be divided into it is described its The subfile of quantity corresponding to the authority of his terminal device is with to target data encryption;
S3, the present terminal equipment target data after encryption is sent to other-end equipment;
S4, the other-end equipment judge whether with the authority for decrypting the target data, if then performing step S5If Otherwise flow is terminated;
S5, the target data is decrypted, wherein, the decryption is merges all subfiles.
2. file encrypting method as claimed in claim 1, it is characterised in that step S1Including:
S11, the present terminal equipment receive an instruction that a target data is transmitted to the other-end equipment;
S12, the authority that has of other-end equipment described in the present terminal equipment query and according to the other-end equipment Authority selects AES;
S13, the AES selected of the present terminal equipment utilization encrypts to the target data.
3. file encrypting method as claimed in claim 1, it is characterised in that the authority is divided into some ranks, for any Two authorities, AES complexity corresponding to the higher authority of rank is higher, and the terminal of the authority with higher level is set The standby AES that can be decrypted corresponding to the other authority of lower level.
4. the file encrypting method as described in any one in claims 1 to 3, it is characterised in that the terminal device is hand Mechanical, electrical brain or tablet personal computer.
5. a kind of terminal system, the terminal system includes some terminal devices, it is characterised in that each terminal device includes At least two AESs, the corresponding authority of each AES, the authority are divided into some ranks, the AES bag Include and target data is divided into several subfiles, the target data after division only can in the presence of all subfiles Read, the authority corresponding one of each rank receives the quantity of the subfile of target data, higher for any two authority, rank The quantity that terminal device corresponding to authority receives the subfile of the target data is more, and each terminal device also includes an encryption Module, a transport module, a judge module, a receiving module, an enquiry module and a deciphering module,
The receiving module of present terminal equipment is used to receive an instruction for transmitting a target data to other-end equipment;
The enquiry module of the present terminal equipment is used to inquire about the authority that the other-end equipment has;
The authority institute that the encrypting module of the present terminal equipment is used to target data being divided into the other-end equipment is right The subfile for the quantity answered is with to target data encryption;
The encrypting module of present terminal equipment is used to encrypt a target data using a kind of AES;
The transport module of the present terminal equipment is used to the target data after encryption being sent to other-end equipment;
The judge module of the other-end equipment is used to judge whether the authority with the target data is decrypted, if then adjusting With the deciphering module;
The deciphering module of the other-end equipment is used to the target data be decrypted, wherein, the decryption is by institute There is subfile merging.
6. terminal system as claimed in claim 5, it is characterised in that each terminal device also includes a receiving module and one Enquiry module,
The receiving module of the present terminal equipment is used to receive a finger for transmitting a target data to the other-end equipment Order;
The enquiry module of the present terminal equipment be used for inquire about the authority that the other-end equipment has and according to it is described its The authority selection AES of his terminal device;
The encrypting module of the present terminal equipment is used to encrypt the target data using the AES selected.
7. terminal system as claimed in claim 5, it is characterised in that the authority is divided into some ranks, for any two Authority, AES complexity corresponding to the higher authority of rank is higher, and the terminal device energy of the authority with higher level Enough decrypt the AES corresponding to the other authority of lower level.
8. the terminal system as described in any one in claim 5 to 7, it is characterised in that the terminal device is that hand is mechanical, electrical Brain or tablet personal computer.
CN201510208298.XA 2015-04-27 2015-04-27 File encrypting method and terminal system Active CN104794408B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510208298.XA CN104794408B (en) 2015-04-27 2015-04-27 File encrypting method and terminal system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510208298.XA CN104794408B (en) 2015-04-27 2015-04-27 File encrypting method and terminal system

Publications (2)

Publication Number Publication Date
CN104794408A CN104794408A (en) 2015-07-22
CN104794408B true CN104794408B (en) 2017-12-08

Family

ID=53559197

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510208298.XA Active CN104794408B (en) 2015-04-27 2015-04-27 File encrypting method and terminal system

Country Status (1)

Country Link
CN (1) CN104794408B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022147A (en) * 2016-05-26 2016-10-12 珠海市魅族科技有限公司 Method and device for file encryption and decryption

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859086A (en) * 2005-12-31 2006-11-08 华为技术有限公司 Content grading access control system and method
CN103427998A (en) * 2013-08-20 2013-12-04 航天恒星科技有限公司 Internet data distribution oriented identity authentication and data encryption method
CN103455764A (en) * 2013-08-27 2013-12-18 无锡华御信息技术有限公司 File segmentation and merging technology-based file encryption and decryption systems
CN104184740A (en) * 2014-09-04 2014-12-03 中电长城网际系统应用有限公司 Credible transmission method, credible third party and credible transmission system
CN104270350A (en) * 2014-09-19 2015-01-07 杭州华三通信技术有限公司 Key information transmission method and equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859086A (en) * 2005-12-31 2006-11-08 华为技术有限公司 Content grading access control system and method
CN103427998A (en) * 2013-08-20 2013-12-04 航天恒星科技有限公司 Internet data distribution oriented identity authentication and data encryption method
CN103455764A (en) * 2013-08-27 2013-12-18 无锡华御信息技术有限公司 File segmentation and merging technology-based file encryption and decryption systems
CN104184740A (en) * 2014-09-04 2014-12-03 中电长城网际系统应用有限公司 Credible transmission method, credible third party and credible transmission system
CN104270350A (en) * 2014-09-19 2015-01-07 杭州华三通信技术有限公司 Key information transmission method and equipment

Also Published As

Publication number Publication date
CN104794408A (en) 2015-07-22

Similar Documents

Publication Publication Date Title
US7817802B2 (en) Cryptographic key management in a communication network
KR102614209B1 (en) Method and device for safe communication between devices
CN105812332A (en) Data protection method
CN204360381U (en) mobile device
CN103763091B (en) A kind of application program encryption and decryption method and encryption, decryption device
CN106330442A (en) Identity authentication method, device and system
CN106452770A (en) Data encryption method and apparatus, data decryption method and apparatus, and system
CN109981275A (en) Data transmission method, device, system, equipment and storage medium
CN106897631A (en) Data processing method, apparatus and system
CN103236934A (en) Method for cloud storage security control
CN104796262B (en) Data ciphering method and terminal system
CN102833077A (en) Encryption and decryption methods of remote card-issuing data transmission of financial IC (Integrated Circuit) card and financial social security IC card
CN101281498A (en) Ciphering type mobile storage apparatus
CN104410602A (en) Method for realizing random password keyboard based on secure element
CN102332077A (en) Hand-held equipment data encryption and decryption method and hand-held equipment peripheral equipment thereof
KR102625879B1 (en) Method for generating key in crypto system using biometric information
CN104794408B (en) File encrypting method and terminal system
JP4028849B2 (en) Communication system, portable terminal, and program
CN103384233B (en) A kind of methods, devices and systems for acting on behalf of conversion
CN104683355A (en) Anti-repudiation dynamic password generating method and dynamic password verification system
JP5675979B2 (en) Simplified method for personalizing smart cards and related devices
CN104683358A (en) Anti-repudiation dynamic password generating method and dynamic password verification system
US20150200918A1 (en) Multi Layered Secure Data Storage and Transfer Process
CN110198320B (en) Encrypted information transmission method and system
CN107229874A (en) A kind of method for realizing VR Key, device and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant