CN104794408B - File encrypting method and terminal system - Google Patents
File encrypting method and terminal system Download PDFInfo
- Publication number
- CN104794408B CN104794408B CN201510208298.XA CN201510208298A CN104794408B CN 104794408 B CN104794408 B CN 104794408B CN 201510208298 A CN201510208298 A CN 201510208298A CN 104794408 B CN104794408 B CN 104794408B
- Authority
- CN
- China
- Prior art keywords
- authority
- target data
- terminal
- aes
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of file encrypting method and terminal system, the terminal system includes some terminal devices, and each terminal device includes at least two AESs, the corresponding authority of each AES, and the file encrypting method includes:S1, a kind of AES of present terminal equipment utilization encrypts to a target data;S2, the present terminal equipment target data after encryption is sent to an other-end equipment;S3, the other-end equipment judge whether with the authority for decrypting the target data, if then performing step S4If otherwise terminate flow;S4, the target data is decrypted.The file encrypting method of the present invention does not need user to input password and is encrypted or decrypts, and provides the user conveniently, and user can be configured to encryption according to the needs of oneself, select in addition, provide the user more functions.
Description
Technical field
The present invention relates to a kind of file encrypting method and terminal system.
Background technology
As terminal device (such as mobile phone, tablet personal computer) function is become stronger day by day, the file of storage is also more and more, its
Include the file of more privacy or need for confidentiality, it is therefore desirable to take certain encryption to limit these files, to prevent
Owner's unauthorized or it is unknown in the case of, the file in terminal device is stolen and applied by other people.
At present, the guard method for file is by inputting cryptoguard mostly, and this mode operates relatively complicated, use
Family is when sending, receiving the file for needing to encrypt, it is necessary to which setting code or input password, make the operation of user not convenient enough.Separately
Outside, if be encrypted and decrypted by the intrinsic security algorithm of terminal device chips, user is not felt by terminal device and added
Close and decryption process, brings conveniently for user, but this mode function is more single, and user can not be according to the need of oneself
Ask setting encryption and manner of decryption.
The content of the invention
The technical problem to be solved in the present invention be in order to overcome in the prior art file encrypting method can not take into account as user
It is convenient and the defects of can realize multiple functions to provide, there is provided a kind of simple operation and can be provided according to the demand of user a variety of
The file encrypting method and terminal system of cipher mode.
The present invention is that solve above-mentioned technical problem by following technical proposals:
A kind of file encrypting method, for terminal system, the terminal system includes some terminal devices, and its feature exists
In each terminal device includes at least two AESs, the corresponding authority of each AES, the file encryption side
Method includes:
S1, a kind of AES of present terminal equipment utilization encrypts to a target data;
S2, the present terminal equipment target data after encryption is sent to an other-end equipment;
S3, the other-end equipment judges whether with the authority for decrypting the target data, if then performing step
S4If otherwise terminate flow;
S4, the target data is decrypted.
The terminal device of the application includes multiple encryption algorithms, and each terminal device can pre-set authority, eventually
Target data can be sent to the terminal device of the terminal device, only permission match specified by end system according to different authorities
Target data can be read.Encryption is divided into multiple ranks by the present invention, and user can need selection AES according to oneself
So as to realize that encryption file is only capable of being designated terminal device decryption reading, more functions have been provided the user.And user is not
The setting and input of progress password are needed, simplifies the operation of user.The target data can be file or information.
It is preferred that step S1Including:
S11, the present terminal equipment receive an instruction that a target data is transmitted to the other-end equipment;
S12, the authority that has of other-end equipment described in the present terminal equipment query and set according to the other-end
Standby authority selection AES;
S13, the AES selected of the present terminal equipment utilization encrypts to the target data.
The terminal device of the application can get authority possessed by target terminal equipment before target data is sent,
And send target data according to this authority.It is possible to further which authority is divided into some ranks, present terminal equipment is inquiring
Can be with the AES corresponding to highest-ranking authority that target terminal equipment can receive after the authority of target terminal equipment
Target data is encrypted so that target data can be by authority at " the highest-ranking authority that can be received " all of above end
End equipment receives and decrypts, and Insufficient privilege can not receive, or can not also be decrypted even if receiving.
It is preferred that the authority is divided into some ranks, for any two authority, encrypted corresponding to the higher authority of rank
Algorithm complex is higher, and the terminal device of the authority with higher level can decrypt adding corresponding to the other authority of lower level
Close algorithm.
It is preferred that the authority is divided into some ranks, the AES includes target data being divided into some height
File, the target data after division is only readable in the presence of all subfiles, and the authority corresponding one of each rank receives
The quantity of the subfile of target data, for any two authority, described in terminal device reception corresponding to the higher authority of rank
The quantity of the subfile of target data is more, step S1Including:
S11, the present terminal equipment receive an instruction that a target data is transmitted to the other-end equipment;
S12, the authority that has of other-end equipment described in the present terminal equipment query and target data is divided into institute
The subfile of the quantity corresponding to the authority of other-end equipment is stated with to target data encryption;
Wherein, the decryption is to merge all subfiles.
The above-mentioned division each time to target data is a kind of AES, e.g., target data is divided into 4 one's shares of expenses for a joint undertaking text
Part is a kind of AES, and it is then the higher AES of another authority that target data is divided into 5 one's share of expenses for a joint undertaking files.Terminal
Equipment can receive the quantity of the subfile of same target data according to the authority setting of itself, and the quantity of the higher reception of authority is more
More, present terminal equipment is according to the quantity of the delineation of power target data of target terminal equipment, when target data needs to be sent to
During the terminal device of high-level authority, target data is divided into a fairly large number of part, due to the terminal device of low level authority
The subfile limited amount of reception and whole subfiles can not be received so that subfile can not be decrypted to obtain number of targets
According to.
It is preferred that the terminal device is mobile phone, computer or tablet personal computer.
The application also provides a kind of terminal system, and the terminal system includes some terminal devices, and its feature is, each
Terminal device includes at least two AESs, the corresponding authority of each AES, and each terminal device also includes one
Encrypting module, a transport module, a judge module and a deciphering module,
The encrypting module of present terminal equipment is used to encrypt a target data using a kind of AES;
The transport module of the present terminal equipment is used to the target data after encryption being sent to an other-end equipment;
The judge module of the other-end equipment is used to judge whether the authority with the target data is decrypted, if
Then call the deciphering module;
The deciphering module of the other-end equipment is used to the target data be decrypted.
It is preferred that each terminal device also includes a receiving module and an enquiry module,
The receiving module of the present terminal equipment is used to receive one to the other-end equipment one target data of transmission
Instruction;
The enquiry module of the present terminal equipment is used to inquire about the authority that the other-end equipment has and according to institute
State the authority selection AES of other-end equipment;
The encrypting module of the present terminal equipment is used to encrypt the target data using the AES selected.
It is preferred that the authority is divided into some ranks, for any two authority, encrypted corresponding to the higher authority of rank
Algorithm complex is higher, and the terminal device of the authority with higher level can decrypt adding corresponding to the other authority of lower level
Close algorithm.
It is preferred that the authority is divided into some ranks, the AES includes target data being divided into some height
File, the target data after division is only readable in the presence of all subfiles, and the authority corresponding one of each rank receives
The quantity of the subfile of target data, for any two authority, described in terminal device reception corresponding to the higher authority of rank
The quantity of the subfile of target data is more, and each terminal device also includes a receiving module and an enquiry module,
The receiving module of the present terminal equipment is used to receive one to the other-end equipment one target data of transmission
Instruction;
The enquiry module of the present terminal equipment is used to inquire about the authority that the other-end equipment has;
The encrypting module of the present terminal equipment is used for the authority that target data is divided into the other-end equipment
The subfile of corresponding quantity is with to target data encryption.
It is preferred that the terminal device is mobile phone, computer or tablet personal computer.
It on the basis of common sense in the field is met, above-mentioned each optimum condition, can be combined, it is each preferably real to produce the present invention
Example.
The positive effect of the present invention is:The file encrypting method of the present invention does not need user's input password to be added
Close or decryption, provide the user conveniently, user can be configured to encryption according to the needs of oneself, select in addition, be user
More functions are provided.
Brief description of the drawings
Fig. 1 is the flow chart of the file encrypting method of the embodiment of the present invention 1.
Fig. 2 is the structural representation of the mobile phone of the embodiment of the present invention 1.
Fig. 3 is the flow chart of the file encrypting method of the embodiment of the present invention 2.
Embodiment
The present invention is further illustrated below by the mode of embodiment, but does not therefore limit the present invention to described reality
Apply among a scope.
Embodiment 1
Referring to Fig. 2, the present embodiment provides a kind of terminal system, and the terminal system includes 5 mobile terminals, and (i.e. terminal is set
It is standby), the mobile terminal is respectively mobile phone 1, mobile phone 2, mobile phone 3, notebook computer 4, tablet personal computer 5.
For each mobile terminal, the mobile terminal includes four kinds of AESs, each AES corresponding one
Authority, the authority are divided into four ranks.In the present embodiment, algorithm A corresponds to one-level authority;Algorithm B corresponds to two level authority;Calculate
Method C corresponds to three-level authority;Algorithm D corresponds to level Four authority.The authority of each rank is separate, and mobile phone 1 has one to be weighed to level Four
Limit, mobile phone 2 have two to arrive level Four authority, and mobile phone 3, notebook computer 4, tablet personal computer 5 only have level Four authority.The movement
Terminal also include an encrypting module 11, a transport module 12, a judge module 13, a receiving module 14, an enquiry module 15 with
An and deciphering module 16.
The present embodiment with mobile phone 1 to other mobile terminal transmission objectives data instances, but represent only have the ability of mobile phone 1
Enough it is used as current mobile device.
The receiving module 14 of mobile phone 1 is used to receive an instruction for transmitting a target data to other four mobile terminals.
The enquiry module 15 of the mobile phone 1 be used to inquiring about the authority that other described mobile terminals have and according to it is described other
The authority selection AES of mobile terminal, mobile phone 1 inquires other four mobile terminals and is respectively provided with level Four power in the present embodiment
Limit, the algorithm D according to corresponding to level Four authority of mobile phone 1 encrypt target data.The authority of each mobile terminal can initialize
It is configured during setting, can also changes authority during use, mobile phone 1 can prestores each movement in initial setting up
The authority of terminal, power possessed by Query Information to other mobile terminal enquiries can also be sent before target data is encrypted
Limit.
The encrypting module 11 of the mobile phone 1 is used to encrypt the target data using the AES selected.Due to
Other four mobile terminals all have level Four authority, so can allow other four movements to target data encryption using algorithm D
Terminal, which can decrypt, obtains target data content.
The transport module 12 of the mobile phone 1 is used to for the target data after encryption to be sent to other four beyond mobile phone 1
Mobile terminal.
The judge module 13 of other four mobile terminals is used to judge whether the power with the target data is decrypted
Limit, if then calling the deciphering module 16.In the present embodiment, other four mobile terminals are respectively provided with level Four authority, can be right
Target data is decrypted.
The deciphering module of other four mobile terminals is used to the target data be decrypted.
In above process, each mobile terminal does not carry out the setting or input password decryption of password, encryption/decryption
Process can be completed in the case where user does not perceive.It can not only provide the user with conveniently, additionally it is possible to allow user to have a variety of behaviour
Make mode, as mobile phone 1 target data can also be encrypted using algorithm B, the target data after so encrypting can only be by hand
Machine 2 is decrypted, it is possible to play target data to mobile phone 3, notebook computer 4, tablet personal computer 5 privacy functions.
In addition, the mobile terminal of the present embodiment can also send target data according to authority, such as, mobile phone 1 utilizes calculation
Target data is encrypted method B, because target data can not be decrypted for other mobile terminals in addition to mobile phone 2,
Therefore other mobile terminals can be set can not to receive target data, the terminal system of the present embodiment can also be arranged to other shiftings
The pattern that dynamic terminal can receive target data but can not be decrypted.
Referring to Fig. 1, the present embodiment also provides a kind of file encrypting method realized using above-mentioned terminal system, the file
Encryption method includes:
Step 100, the mobile phone 1 receive an instruction that a target data is transmitted to the mobile phone 2.
In the present embodiment, the instruction that mobile phone 1 receives is:Only target data is sent to mobile phone 2.
Step 101, the mobile phone 1 inquire about the authority that the mobile phone 2 has and select mobile phone according to the authority of the mobile phone 2
AES corresponding to the 2 highest-ranking authorities that can be received.
Here, mobile phone 2 has two to arrive level Four authority, needs to utilize hand if only sending target data to mobile phone 2
Target data is encrypted for the highest-ranking authority that machine 2 can receive, i.e. AES corresponding to two level authority.
Step 102, the mobile phone 1 are encrypted using the AES selected to the target data.
Target data after encryption is sent to mobile phone 2 by step 103, the mobile phone 1.
Step 104, the mobile phone 2 judge whether with the authority for decrypting the target data, if then performing step
105, if otherwise terminating flow.
Step 105, the target data is decrypted.
In the file encrypting method of the present embodiment, mobile phone 1 and mobile phone 2 do not carry out the setting of password or input password solution
Close, encryption/decryption processes can be completed in the case where user does not perceive.It can not only provide the user with conveniently, additionally it is possible to allow
User has a variety of modes of operation.
Embodiment 2
The terminal system of the terminal system of the present embodiment and embodiment 1 is essentially identical, the difference is that only:
For any two authority, AES complexity corresponding to the higher authority of rank is higher, and with more advanced
The mobile terminal of other authority can decrypt the AES corresponding to the other authority of lower level.
In the present embodiment, mobile terminal no longer needs to set multiple authorities, as mobile phone 1 has one to level Four authority, this reality
Apply in example, mobile phone 1 only has one-level authority but covers the repertoire of other rudimentary authorities.
The AES is that target data is divided into several subfiles, and the target data after division is only in all sons
Readable in the presence of file, the authority corresponding one of each rank receives the quantity of the subfile of target data, for any
Two authorities, the quantity that mobile terminal corresponding to the higher authority of rank receives the subfile of target data are more.
In the present embodiment, algorithm A is that target data is divided into 5 subfiles;Algorithm B is that target data is divided into 4
Individual subfile;Algorithm C is that target data is divided into 3 subfiles;Algorithm D is that target data is divided into 2 subfiles.Hand
Machine 1 has one-level authority, can receive 5 subfiles of same target data;Mobile phone 2 has two level authority, can receive same
4 subfiles of one target data;Mobile phone 3, notebook computer 4, tablet personal computer 5 only have level Four authority, can receive same
2 subfiles of one target data.
The present embodiment with mobile phone 1 to other mobile terminal transmission objectives data instances, but represent only have the ability of mobile phone 1
Enough it is used as current mobile device.
The receiving module of the mobile phone 1 is used to receive an instruction for transmitting a target data to other mobile terminals.
The enquiry module of the mobile phone 1 is used to inquire about the authority that other described mobile terminals have.
The encrypting module of the mobile phone 1 is used to target data being divided into corresponding to the authority of other mobile terminals
The subfile of quantity is with to target data encryption.
Here, transmitting terminal divides target data, the Ziwen of the higher reception of authority according to the authority of receiving terminal mobile terminal
Number of packages amount is more, and the low mobile terminal of authority is receiving the Ziwen that is transferred to high authority because the subfile quantity of reception is few
During part, because the subfile received quantity for same target data is restricted, so complete target data can not be obtained, because
This can not be read out to target data, so as to realize file encryption.
In the present embodiment, it is as follows to the process of the transmission objectives data of mobile phone 2 using mobile phone 1:
Mobile phone 1 judges that mobile phone 2 has two level authority, that is to say, that mobile phone 2 can receive the subfile of same target data
For 4, target data is divided into 4 subfiles and issued by mobile phone 1, if the mobile phone 3 of Insufficient privilege have received subfile, by
Can be collected in mobile phone 3 subfile of same target data quantity be 2, therefore even if mobile phone 3 have received subfile also without
Method merges into target data and reads information, the mobile terminal (such as mobile phone 3, notebook computer 4, tablet personal computer 5) of Insufficient privilege
The subfile that can be received can be the header of target data, so as to play a part of notice.
Wherein, the decryption is to merge all subfiles.
The file encrypting method of the present embodiment coordinates with AES can realize multiple functions, provide the user more
It is convenient, and complicated function of keeping secret can be realized with easy algorithm.
Referring to Fig. 3, the file encrypting method of the present embodiment is substantially the same manner as Example 1, the difference is that only:
Step 201, the mobile phone 1 receive an instruction that a target data is transmitted to mobile phone 2.
Target data is simultaneously divided into the authority of the mobile phone 2 by authority that step 202, the inquiry mobile phone 2 of the mobile phone 1 have
Then the subfile of corresponding quantity performs step 103 to be encrypted to the target data.
Wherein, the decryption is to merge all subfiles.
Using the file encrypting method of the present embodiment, mobile phone 1 can also be realized:Mobile phone 3 to the transmission objectives data of mobile phone 2,
Mobile phone 2 can at most receive 4 subfiles, therefore target data is divided into 4 subfiles by mobile phone 3, although mobile phone 3 is only capable of
2 subfiles are enough received, but the quantity that mobile phone 3 can be arranged to to divide target data is more than 2, and such mobile phone 3 is with regard to energy
Enough encrypted transmission files of mobile phone 2 to high authority, simultaneously as the quantity for the subfile that mobile phone 1 can receive is 5, therefore
Mobile phone 1 can be configured to receive to the file of the mobile terminal of all low rights as supervisory terminal.
Although the foregoing describing the embodiment of the present invention, it will be appreciated by those of skill in the art that these
It is merely illustrative of, protection scope of the present invention is defined by the appended claims.Those skilled in the art is not carrying on the back
On the premise of principle and essence from the present invention, various changes or modifications can be made to these embodiments, but these are changed
Protection scope of the present invention is each fallen within modification.
Claims (8)
1. a kind of file encrypting method, for terminal system, the terminal system includes some terminal devices, it is characterised in that
Each terminal device includes at least two AESs, and the corresponding authority of each AES, the authority is divided into some
Rank, the AES include target data being divided into several subfiles, and the target data after division is only in all sons
Readable in the presence of file, the authority corresponding one of each rank receives the quantity of the subfile of target data, for any
Two authorities, the quantity that terminal device corresponding to the higher authority of rank receives the subfile of the target data is more, described
File encrypting method includes:
S1, present terminal equipment receive one to other-end equipment transmit a target data instruction;
S2, the authority that has of other-end equipment described in the present terminal equipment query and by target data be divided into it is described its
The subfile of quantity corresponding to the authority of his terminal device is with to target data encryption;
S3, the present terminal equipment target data after encryption is sent to other-end equipment;
S4, the other-end equipment judge whether with the authority for decrypting the target data, if then performing step S5If
Otherwise flow is terminated;
S5, the target data is decrypted, wherein, the decryption is merges all subfiles.
2. file encrypting method as claimed in claim 1, it is characterised in that step S1Including:
S11, the present terminal equipment receive an instruction that a target data is transmitted to the other-end equipment;
S12, the authority that has of other-end equipment described in the present terminal equipment query and according to the other-end equipment
Authority selects AES;
S13, the AES selected of the present terminal equipment utilization encrypts to the target data.
3. file encrypting method as claimed in claim 1, it is characterised in that the authority is divided into some ranks, for any
Two authorities, AES complexity corresponding to the higher authority of rank is higher, and the terminal of the authority with higher level is set
The standby AES that can be decrypted corresponding to the other authority of lower level.
4. the file encrypting method as described in any one in claims 1 to 3, it is characterised in that the terminal device is hand
Mechanical, electrical brain or tablet personal computer.
5. a kind of terminal system, the terminal system includes some terminal devices, it is characterised in that each terminal device includes
At least two AESs, the corresponding authority of each AES, the authority are divided into some ranks, the AES bag
Include and target data is divided into several subfiles, the target data after division only can in the presence of all subfiles
Read, the authority corresponding one of each rank receives the quantity of the subfile of target data, higher for any two authority, rank
The quantity that terminal device corresponding to authority receives the subfile of the target data is more, and each terminal device also includes an encryption
Module, a transport module, a judge module, a receiving module, an enquiry module and a deciphering module,
The receiving module of present terminal equipment is used to receive an instruction for transmitting a target data to other-end equipment;
The enquiry module of the present terminal equipment is used to inquire about the authority that the other-end equipment has;
The authority institute that the encrypting module of the present terminal equipment is used to target data being divided into the other-end equipment is right
The subfile for the quantity answered is with to target data encryption;
The encrypting module of present terminal equipment is used to encrypt a target data using a kind of AES;
The transport module of the present terminal equipment is used to the target data after encryption being sent to other-end equipment;
The judge module of the other-end equipment is used to judge whether the authority with the target data is decrypted, if then adjusting
With the deciphering module;
The deciphering module of the other-end equipment is used to the target data be decrypted, wherein, the decryption is by institute
There is subfile merging.
6. terminal system as claimed in claim 5, it is characterised in that each terminal device also includes a receiving module and one
Enquiry module,
The receiving module of the present terminal equipment is used to receive a finger for transmitting a target data to the other-end equipment
Order;
The enquiry module of the present terminal equipment be used for inquire about the authority that the other-end equipment has and according to it is described its
The authority selection AES of his terminal device;
The encrypting module of the present terminal equipment is used to encrypt the target data using the AES selected.
7. terminal system as claimed in claim 5, it is characterised in that the authority is divided into some ranks, for any two
Authority, AES complexity corresponding to the higher authority of rank is higher, and the terminal device energy of the authority with higher level
Enough decrypt the AES corresponding to the other authority of lower level.
8. the terminal system as described in any one in claim 5 to 7, it is characterised in that the terminal device is that hand is mechanical, electrical
Brain or tablet personal computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510208298.XA CN104794408B (en) | 2015-04-27 | 2015-04-27 | File encrypting method and terminal system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510208298.XA CN104794408B (en) | 2015-04-27 | 2015-04-27 | File encrypting method and terminal system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104794408A CN104794408A (en) | 2015-07-22 |
CN104794408B true CN104794408B (en) | 2017-12-08 |
Family
ID=53559197
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510208298.XA Active CN104794408B (en) | 2015-04-27 | 2015-04-27 | File encrypting method and terminal system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104794408B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106022147A (en) * | 2016-05-26 | 2016-10-12 | 珠海市魅族科技有限公司 | Method and device for file encryption and decryption |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859086A (en) * | 2005-12-31 | 2006-11-08 | 华为技术有限公司 | Content grading access control system and method |
CN103427998A (en) * | 2013-08-20 | 2013-12-04 | 航天恒星科技有限公司 | Internet data distribution oriented identity authentication and data encryption method |
CN103455764A (en) * | 2013-08-27 | 2013-12-18 | 无锡华御信息技术有限公司 | File segmentation and merging technology-based file encryption and decryption systems |
CN104184740A (en) * | 2014-09-04 | 2014-12-03 | 中电长城网际系统应用有限公司 | Credible transmission method, credible third party and credible transmission system |
CN104270350A (en) * | 2014-09-19 | 2015-01-07 | 杭州华三通信技术有限公司 | Key information transmission method and equipment |
-
2015
- 2015-04-27 CN CN201510208298.XA patent/CN104794408B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859086A (en) * | 2005-12-31 | 2006-11-08 | 华为技术有限公司 | Content grading access control system and method |
CN103427998A (en) * | 2013-08-20 | 2013-12-04 | 航天恒星科技有限公司 | Internet data distribution oriented identity authentication and data encryption method |
CN103455764A (en) * | 2013-08-27 | 2013-12-18 | 无锡华御信息技术有限公司 | File segmentation and merging technology-based file encryption and decryption systems |
CN104184740A (en) * | 2014-09-04 | 2014-12-03 | 中电长城网际系统应用有限公司 | Credible transmission method, credible third party and credible transmission system |
CN104270350A (en) * | 2014-09-19 | 2015-01-07 | 杭州华三通信技术有限公司 | Key information transmission method and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN104794408A (en) | 2015-07-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7817802B2 (en) | Cryptographic key management in a communication network | |
KR102614209B1 (en) | Method and device for safe communication between devices | |
CN105812332A (en) | Data protection method | |
CN204360381U (en) | mobile device | |
CN103763091B (en) | A kind of application program encryption and decryption method and encryption, decryption device | |
CN106330442A (en) | Identity authentication method, device and system | |
CN106452770A (en) | Data encryption method and apparatus, data decryption method and apparatus, and system | |
CN109981275A (en) | Data transmission method, device, system, equipment and storage medium | |
CN106897631A (en) | Data processing method, apparatus and system | |
CN103236934A (en) | Method for cloud storage security control | |
CN104796262B (en) | Data ciphering method and terminal system | |
CN102833077A (en) | Encryption and decryption methods of remote card-issuing data transmission of financial IC (Integrated Circuit) card and financial social security IC card | |
CN101281498A (en) | Ciphering type mobile storage apparatus | |
CN104410602A (en) | Method for realizing random password keyboard based on secure element | |
CN102332077A (en) | Hand-held equipment data encryption and decryption method and hand-held equipment peripheral equipment thereof | |
KR102625879B1 (en) | Method for generating key in crypto system using biometric information | |
CN104794408B (en) | File encrypting method and terminal system | |
JP4028849B2 (en) | Communication system, portable terminal, and program | |
CN103384233B (en) | A kind of methods, devices and systems for acting on behalf of conversion | |
CN104683355A (en) | Anti-repudiation dynamic password generating method and dynamic password verification system | |
JP5675979B2 (en) | Simplified method for personalizing smart cards and related devices | |
CN104683358A (en) | Anti-repudiation dynamic password generating method and dynamic password verification system | |
US20150200918A1 (en) | Multi Layered Secure Data Storage and Transfer Process | |
CN110198320B (en) | Encrypted information transmission method and system | |
CN107229874A (en) | A kind of method for realizing VR Key, device and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |