CN104917603A - Information secure transmission method, receiving terminal and sending terminal - Google Patents

Information secure transmission method, receiving terminal and sending terminal Download PDF

Info

Publication number
CN104917603A
CN104917603A CN201510296996.XA CN201510296996A CN104917603A CN 104917603 A CN104917603 A CN 104917603A CN 201510296996 A CN201510296996 A CN 201510296996A CN 104917603 A CN104917603 A CN 104917603A
Authority
CN
China
Prior art keywords
safe mode
terminal
user
communication key
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510296996.XA
Other languages
Chinese (zh)
Other versions
CN104917603B (en
Inventor
陈璐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510296996.XA priority Critical patent/CN104917603B/en
Publication of CN104917603A publication Critical patent/CN104917603A/en
Application granted granted Critical
Publication of CN104917603B publication Critical patent/CN104917603B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an information secure transmission method, a receiving terminal and a transmitting terminal. The method includes the following steps that: when a terminal receives an encryption command, a trigger event of an application of the terminal is intercepted; the intercepted trigger event is encrypted, so that an encrypted ciphertext can be generated; the encrypted ciphertext is transmitted to the application; and the application sends out the encrypted ciphertext. With the information secure transmission method, the receiving terminal and the sending terminal of the invention adopted, breach of confidence of the application can be prevented, and high security can be realized.

Description

A kind of information security transfer method, receiving terminal and transmitting terminal
Technical field
The present invention relates to the communications field, be specifically related to a kind of information security transfer method, receiving terminal and transmitting terminal.
Background technology
In terminal, user usually needs to transmit Word message, and as should be used for transmission of information by short message or QQ, micro-letter etc., these information all belong to the individual privacy of user, and user is unwilling to allow other people know.Once it is believed that the transmission channel of these information was safe, and have some application to declare that the mode of their transmission of informations is safe, they usually declare that information is transferred to their server from client encrypt, but disclose the event of the extensive monitoring of U.S. government's enforcement in Snowdon after, people just find, network is very unsafe as the transmission channel of information, and the privacy of user is still likely leaked on the server, such as, may be broken through server by hacker and obtain; Or such as may directly be obtained from server by non-honest third company and utilize (privacy of user to be asked for by similar current U.S. government behavior directly to the Internet giant); therefore; the intermediate conveyor passage that data are transmitted in application is not trusted, and becomes dangerous and cannot meet the demand that user protects privacy.
Therefore, need at present a kind of can by the information transmitting methods of the safety of users to trust, all irrelevant with any application, meet the demand that user protects privacy.
Summary of the invention
The technical issues that need to address of the present invention are to provide a kind of information security transfer method and system, receiving terminal, transmitting terminal, all irrelevant with any application, and prevent application from divulging a secret, security reliability is high, meet the demand that user protects privacy.
In order to solve the problems of the technologies described above, the invention provides a kind of information security transfer method, comprising: when terminal receives encrypted command, the trigger event of interception terminal applies; Generation encrypted cipher text is encrypted to the described trigger event intercepted; Send described encrypted cipher text to described application; Encrypted cipher text sends by described application.
Optionally, aforementioned when terminal receives encrypted command, comprise before interception terminal applies trigger event: whether warning terminal user opens safe mode; When receiving after user opens safe mode request, open safe mode.
Optionally, aforementioned when receiving after user opens safe mode request, open safe mode and comprise: prompting user inputs safe mode and opens password; After the safe mode unlatching password of the user's input received is consistent with the password that the safe mode preset is opened, open safe mode.
Optionally, aforementioned when receiving after user opens safe mode request, open safe mode and comprise: after receiving the unlatching safe mode request that user sent by close switch, open safe mode; Described close switch comprises the physical button be arranged in terminal and/or the virtual key suspended on a terminal screen.
Optionally, aforementioned being encrypted described information generates encrypted cipher text and comprises: point out input communication key to terminal use and receive the communication key of described terminal use input, or, obtain the local communication key preset stored; Cryptographic algorithm is adopted to be encrypted described trigger event; Add version number and encryption identification generation encrypted cipher text that encryption identification generates encrypted cipher text or adds described cryptographic algorithm.
Optionally, aforementionedly input communication key is pointed out and the communication key receiving described terminal use input comprises to terminal use: eject user and input the interface of pre-trigger event; The pre-trigger event of the user's input received; Eject the interface of user's input communication key.
Optionally, aforementioned trigger event is the information of user's interpolation that described application receives, and includes but not limited to one of them: Word message, pictorial information and audio/video information.
Optionally, aforementioned applications includes but not limited to one of them: note, mail, micro-letter and QQ.
In order to solve the problems of the technologies described above, present invention also offers a kind of information security transfer method and comprising: when terminal receives decryption command, tackling the encrypted cipher text that described application receives; Described encrypted cipher text is decrypted and obtains the information after deciphering; The information after described deciphering that sends is to described application.
Optionally, aforementioned when terminal applies receives decryption command, also comprise before tackling described encrypted cipher text: whether warning terminal user opens safe mode; After receiving described terminal use and opening the request of safe mode, open safe mode.
Optionally, aforementionedly receive after described terminal use opens the request of safe mode, open safe mode, comprising: point out described terminal use to input safe mode and open password; The safe mode of the described terminal use's input determining to receive open password and the safe mode preset open password consistent after, unlatching safe mode.
Optionally, aforementioned when receiving after user opens safe mode request, open safe mode and comprise: after receiving the unlatching safe mode request that user sent by close switch, open safe mode; Described close switch comprises the physical button be arranged in terminal and/or the virtual key suspended on a terminal screen.
Optionally, aforementioned being decrypted described encrypted cipher text obtains the information after deciphering, and comprising: point out input communication key to terminal use, and receive the communication key of described terminal use input, or, after identifying described encryption identification, obtain the local communication key preset stored; Cryptographic algorithm corresponding to the version number of cryptographic algorithm or the described cryptographic algorithm preset is adopted to obtain the information after deciphering to described enciphered message deciphering; The information after described deciphering that sends is to described application.
Optionally, aforementionedly point out input communication key to terminal use, and receive the communication key of described terminal use input, or, after identifying described encryption identification, comprise before obtaining the local communication key preset stored: identify the encryption identification that encrypted cipher text carries and enciphered message, or encryption identification, the version number of cryptographic algorithm and enciphered message.
Optionally, aforementionedly point out input communication key to terminal use, and the communication key receiving described terminal use input comprises; Eject the interface of user's input communication key; Be decrypted when the communication key received is correct; Miscue interface is ejected when the communication key mistake received.
Optionally, preceding method also comprises: the information after described application receiving and deciphering, and shows in the application.
In order to solve the problems of the technologies described above, present invention also offers a kind of transmitting terminal, comprise control module and security module; Described control module is used for when terminal receives encrypted command, tackles the trigger event of described terminal applies; Described security module is used for being encrypted generation encrypted cipher text to the described information intercepted, and sends described encrypted cipher text to described application; Described terminal applies is used for encrypted cipher text to send.
Optionally, aforementioned terminals also comprises startup module, whether opens safe mode for warning terminal user; When receiving after user opens safe mode request, opening safe mode, sending encrypted command.
Optionally, aforementioned startup module is used for, when receiving after user opens safe mode request, opening safe mode, comprising for pointing out user to input safe mode unlatching password; After the safe mode unlatching key of the user's input received is consistent with the password that the safe mode preset is opened, open safe mode.
Optionally, aforementioned terminals also comprises close switch, opens safe mode request for receiving user, and described close switch is the physical button be arranged in terminal and/or the virtual key suspended on a terminal screen, for opening safe mode.
Optionally, previous security module is used for being encrypted generation encrypted cipher text to described information and comprises: for pointing out input communication key to user and receiving described terminal use's input communication key, or, obtain the local communication key preset stored; Cryptographic algorithm is adopted to be encrypted described trigger event; Add version number and encryption identification generation encrypted cipher text that encryption identification generates encrypted cipher text or adds described cryptographic algorithm.
Optionally, previous security module is used for pointing out input communication key to user and receiving described terminal use's input communication key also comprising: the interface inputting pre-trigger event for ejecting user; Receive the pre-trigger event of user's input; Eject the interface of user's input communication key.
In order to solve the problems of the technologies described above, present invention also offers a kind of receiving terminal, comprise control module and security module; Described control module is used for when terminal receives decryption command, tackles the encrypted cipher text that described application receives; Described security module is used for being decrypted described encrypted cipher text obtaining the information after deciphering, and the information after described deciphering that sends is to described application.
Optionally, aforementioned terminals also comprises startup module, whether opens safe mode for warning terminal user; After receiving described terminal use and opening the request of safe mode, open safe mode.
Optionally, aforementioned startup module is used for, after receiving described terminal use and opening the request of safe mode, opening safe mode, comprising: input safe mode unlatching password for pointing out described terminal use; The safe mode of the described terminal use's input determining to receive open password and the safe mode preset open password consistent after, unlatching safe mode.
Optionally, aforementioned terminals also comprises close switch, and for opening safe mode request when receiving user, described close switch is the physical button be arranged in terminal and/or the virtual key suspended on a terminal screen, for opening safe mode.
Optionally, previous security module is used for being decrypted described encrypted cipher text obtaining the information after deciphering, the information after described deciphering that sends is to described application, comprise: for pointing out input communication key to terminal use, and receive the communication key of described terminal use input, or, after identifying described encryption identification, obtain the local communication key preset stored; Cryptographic algorithm corresponding to the version number of cryptographic algorithm or the described cryptographic algorithm preset is adopted to obtain the information after deciphering to described enciphered message deciphering; The information after described deciphering that sends is to described application.
Optionally, previous security module is used for pointing out input communication key to terminal use, and receive the communication key of described terminal use input, or, after identifying described encryption identification, comprise before obtaining the local communication key preset stored: for identifying the encryption identification that encrypted cipher text carries and enciphered message, or encryption identification, the version number of cryptographic algorithm and enciphered message.
Optionally, previous security module is used for pointing out input communication key to terminal use, and receives the communication key of described terminal use input, comprises the interface for ejecting user's input communication key; Be decrypted when the communication key received is correct; Miscue interface is ejected when the communication key mistake received.
Optionally, aforementioned terminals also comprises display hollow member for receiving the information after security module deciphering, and shows in the application.
Compared with prior art; information security transfer method provided by the invention, receiving terminal, transmitting terminal; the trigger event of application is intercepted and captured by underlying security module; the information of transmission is encrypted or is deciphered; application just as the transmission channel of the information after encrypting, is explained in words the information of passing and is ciphertext, thus prevent application from divulging a secret for application; security reliability is high, meets the demand that user protects privacy.
Accompanying drawing explanation
Fig. 1 is the structure chart of transmitting terminal and receiving terminal in embodiment one;
Fig. 2 is the flow chart of information security transfer method in embodiment one;
Fig. 3 is " firmly " close switch and " soft " close switch schematic diagram in embodiment one;
Fig. 4 is the flow chart of information security transfer method in embodiment one;
Fig. 5 is the structure chart of transmitting terminal in embodiment two;
Fig. 6 is the structure chart of receiving terminal in embodiment two;
Fig. 7 is the flow chart of information security transfer method in embodiment two;
Fig. 8 is the flow chart of information security transfer method in embodiment two;
Fig. 9 is the flow chart of information security transfer method in application example;
Figure 10 is the principle schematic of underlying security module controls application in application example;
Figure 11 is the operation example figure opening safe mode (" close " pattern) in application example;
Figure 12 is that in application example, underlying security module is transformed into ciphertext user's input, returns to the operation example figure of EditView;
Figure 13 is that in application example, underlying security module uses the key of user's input decrypt ciphertext, returns to the schematic diagram that TextView shows.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly understand, hereinafter will be described in detail to embodiments of the invention by reference to the accompanying drawings.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combination in any mutually.
Embodiment one:
Present embodiments provide a kind of information safety transmission system, comprise transmitting terminal and receiving terminal, wherein, as shown in Figure 1, described transmitting terminal comprises: be arranged on the underlying security module in terminal bottom frame, be set in advance in control module in the system control of terminal and application, described application can be the note that mobile phone itself carries, or mail, also may be the third-party application that user downloads, such as micro-letter, QQ, wherein:
Described control module, for when the control of described application is triggered, interception trigger event, and notifies described underlying security module, after receiving the encrypted cipher text that described underlying security module returns, pass to described application;
Wherein, described trigger event be user will application control in interpolation information; The information that described trigger event is correlated with is the information that user will add in the control of application.
Described underlying security module, for after the notice receiving described control module, the information encryption relevant to described trigger event generates encrypted cipher text, and described encrypted cipher text is sent to described control module;
As the preferred mode of one, this transmitting terminal also comprises:
Start module, whether open safe mode for warning terminal user, after receiving the request of opening described underlying security module, open safe mode, trigger described underlying security module and start.
Wherein, as the preferred mode of one, described startup module, for opening safe mode, triggering described underlying security module and starting, comprising:
Point out described terminal use to input safe mode and open password;
The safe mode of the described terminal use's input determining to receive open password and the safe mode preset opens password consistent after, by verifying, trigger the startup of described underlying security module.
Wherein, in the present embodiment, terminal has been preset safe mode and opened password, for opening checking during safe mode.
Certainly, terminal also can not be arranged safe mode and open password, start module after receiving the request of opening described underlying security module, directly start safe mode, user need not input password, directly trigger described underlying security module and start.
Described application, for sending to receiving terminal by described encrypted cipher text.
Wherein, described underlying security module, for receive described control module notice after, encrypted cipher text is generated to information encryption relevant in described trigger event, comprising:
After described underlying security module receives the notice of described control module, point out input communication key to terminal use, and receive the communication key of described terminal use input, or, obtain the local communication key preset stored;
The communication key that described underlying security module utilizes described terminal use to input or the communication key preset that described this locality stores adopt cryptographic algorithm will the information encryption that add in the control of application to described user, and add encryption identification or add the version number of described cryptographic algorithm and encryption identification generates encrypted cipher text.
In the present embodiment, one preferably needs user's input communication key, encrypt according to this communication key, the fail safe of which is higher, and another kind does not preferably need user's input communication key, but presets a communication key in this locality, this key is all used in each encryption, this mode, more convenient for user, user is without the need to each input communication keys.
Wherein, as the preferred mode of one, the control of described application is edit control.
Wherein, as shown in Figure 1, described receiving terminal, comprising: be arranged on the underlying security module in terminal bottom frame, be set in advance in control module in the system control of terminal and application, wherein:
Described control module, for when the control of described application is triggered, interception trigger event, and notify described underlying security module;
Described underlying security module, for receive described control module notice after, the decrypts information relevant to described trigger event.
Described application, for receiving the information that transmitting terminal is sent, and points out user to trigger the control of described application;
Described trigger event is the information sent of described transmitting terminal that control that terminal use reads described application exports; The information that described trigger event is correlated with is the information that the described transmitting terminal of the control output of described application is sent.
Wherein, as the preferred mode of one, this transmitting terminal also comprises the startup module be connected with described underlying security module with described control module, wherein:
Described control module, also for when intercepting trigger event, triggers described startup module work;
Whether described startup module, open safe mode for warning terminal user, after receiving described terminal use and opening the request of safe mode, opens safe mode, triggers described underlying security module and start.
Wherein, as the preferred mode of one, described startup module, for opening safe mode, triggering described underlying security module and starting, comprising:
Point out described terminal use to input safe mode and open password;
The safe mode of the described terminal use's input determining to receive open password and the safe mode preset opens password consistent after, by verifying, trigger the startup of described underlying security module.
Wherein, in the present embodiment, terminal has been preset safe mode and opened password, for opening checking during safe mode.
Certainly, terminal also can not be arranged safe mode and open password, start module after receiving the request of opening described underlying security module, directly start safe mode, user need not input password, directly trigger described underlying security module and start.
Wherein, the information that the described transmitting terminal that the control of described application exports is sent comprises: enciphered message and encryption identification, or enciphered message, the version number of cryptographic algorithm and encryption identification;
Wherein, described underlying security module, for receive described control module notice after, the decrypts information relevant to described trigger event, comprising:
Described underlying security module user read application control export described transmitting terminal send information time, after identifying described encryption identification, input communication key is pointed out to terminal use, and receive the communication key of described terminal use input, or, after identifying described encryption identification, obtain the local communication key preset stored;
The communication key that described underlying security module utilizes described terminal use to input or the communication key preset that described this locality stores, adopt cryptographic algorithm corresponding to the version number of cryptographic algorithm or the described cryptographic algorithm preset to decipher described enciphered message, show the plaintext of the information after deciphering to user.
In the present embodiment, one preferably needs user's input communication key, encrypt according to this communication key, the fail safe of which is higher, and another kind does not preferably need user's input communication key, but presets a communication key in this locality, this key is all used in each encryption, this mode, more convenient for user, user is without the need to each input communication keys.
Wherein, as the preferred mode of one, the control of described application is display control.
As shown in Figure 2, present embodiments provide a kind of information security transfer method, comprise the following steps:
S101: pre-set control module in the system control of terminal;
Control due to application is all the self-defined control inherited from system control and come, therefore, when after control module preset in system control, the control that this control module also can be employed is inherited, namely, also there is control module in the control of application, therefore, control module can tackle the trigger event of application.
S102: when the control of the application of described terminal is triggered, described control module interception trigger event, and notify the underlying security module of described terminal;
Wherein, described trigger event be user will application control in interpolation information; The information that described trigger event is correlated with is the information that user will add in the control of application, and the information of described interpolation can be Word message.
Wherein, the control of described application is editor's (EditView) control, is the self-defined control inherited from system compiles control and come.
Described terminal can be touch-screen intelligent terminal also can be common key-press terminal, and the control of described triggering application refers to that user clicks or press the button of this control.
S103: after described underlying security module receives the notice of described control module, the information encryption relevant to described trigger event generates encrypted cipher text;
Wherein, in the present embodiment, as the preferred mode of one, can " close " pattern be set in terminal, i.e. above-mentioned safe mode, can opening/closing, when opening, namely described underlying security module is opened, and underlying security module will the control of adapter application, in other words the trigger event of user to the control of application no longer passes to application, but preferential by underlying security resume module.Otherwise after closedown " close " pattern, namely described underlying security module is closed, the trigger event of user to the control of application can pass to third party's process normally.In order to opening/closing " close " pattern, need a switch, we are referred to as " close " switch.It can be the button (being called hard " close " button herein) of necessary being in a terminal, as shown in Fig. 3 (a), also can be suspended in virtual key (being called soft " close " button herein) on screen as shown in Fig. 3 (b).
Wherein, open this safe mode, specifically comprise:
Whether warning terminal user opens safe mode, after receiving described terminal use and opening the request of safe mode, opens safe mode, triggers described underlying security module and starts.
Wherein, as the preferred mode of one, described unlatching safe mode, triggers described underlying security module and starts, comprising:
Point out described terminal use to input safe mode and open password;
The safe mode of the described terminal use's input determining to receive open password and the safe mode preset opens password consistent after, by verifying, trigger the startup of described underlying security module.
Wherein, in the present embodiment, terminal has been preset safe mode and opened password, for opening checking during safe mode.
Certainly, terminal also can not be arranged safe mode and open password, start module after receiving the request of opening described underlying security module, directly start safe mode, user need not input password, directly trigger described underlying security module and start.
Wherein, as the preferred mode of one, after described underlying security module receives the notice of described control module, encrypted cipher text is generated to information encryption relevant in described trigger event, comprising:
After described underlying security module receives the notice of described control module, point out input communication key to terminal use, and receive the communication key of described terminal use input; Wherein, the both sides of communication should use other modes to tell counterparting communications key in advance, say by the mode of verbal contract, or, obtain the local communication key preset stored;
The communication key that described underlying security module utilizes described terminal use to input or the communication key preset that described this locality stores adopt cryptographic algorithm will the information encryption that add in the control of application to described user, and add encryption identification or add the version number of described cryptographic algorithm and encryption identification generates encrypted cipher text.
Particularly, described underlying security module utilizes described communication key to adopt cryptographic algorithm to generate the first encrypted cipher text to the information encryption that described user will add in the control of application, first encrypted cipher text is one group of character string, encryption identification is added (such as before or after this character string, talk secretly in the centre of the palm :), or be converted into one group of character string add the version number (recipient can the cryptographic algorithm corresponding according to this version number encrypted cipher text is deciphered) of described cryptographic algorithm before or after described first encrypted cipher text after, before or after this character string, add encryption identification generate final encrypted cipher text.Such as, " talk secretly in the centre of the palm: AAE=V1dWW1pZ4qXYMrFLTIYhH7nGF44m2w==", wherein, " talking secretly in the centre of the palm: " is encryption identification, " AAE=" is the version number of cryptographic algorithm, " V1dWW1pZ4qXYMrFLTIYhH7nGF44m2w==" is real ciphertext, is expressly " hello ".
In the present embodiment, one preferably needs user's input communication key, encrypt according to this communication key, the fail safe of which is higher, and another kind does not preferably need user's input communication key, but presets a communication key in this locality, this key is all used in each encryption, this mode, more convenient for user, user is without the need to each input communication keys.
S104: described encrypted cipher text is sent to receiving terminal by described application by described control module.
As shown in Figure 4, present embodiments provide a kind of information security transfer method, comprise the following steps:
S201: pre-set control module in the system control of terminal;
Identical with step S101, repeat no more herein.
S202: when the control of the application of described terminal is triggered, described control module interception trigger event, and notify the underlying security module of described terminal;
Wherein, before step S202, described method also comprises: described application receives the information that transmitting terminal is sent, and points out user to trigger the control of the application of described terminal; Such as, to user's display with the character string of centre of the palm cipher beginning, such as, " talk secretly in the centre of the palm: FImG6DpTAF2acmMMF==", this information of prompting user is encrypted, and need user to open " close " pattern (i.e. safe mode), the underlying security module of namely opening terminal is deciphered; Specifically comprise: whether warning terminal user opens safe mode, after receiving described terminal use and opening the request of safe mode, open safe mode, trigger described underlying security module and start.
Wherein, as the preferred mode of one, described unlatching safe mode, triggers described underlying security module and starts, comprising:
Point out described terminal use to input safe mode and open password;
The safe mode of the described terminal use's input determining to receive open password and the safe mode preset opens password consistent after, by verifying, trigger the startup of described underlying security module.
Wherein, in the present embodiment, terminal has been preset safe mode and opened password, for opening checking during safe mode.
Certainly, terminal also can not be arranged safe mode and open password, start module after receiving the request of opening described underlying security module, directly start safe mode, user need not input password, directly trigger described underlying security module and start.
Wherein, described trigger event is the information sent of described transmitting terminal that control that terminal use reads described application exports; The information that described trigger event is correlated with is the information that the described transmitting terminal of the control output of described application is sent, and the information of described output is Word message.
Wherein, the control of described application is display (TextView) control, is the self-defined control inherited from system display control and come.
S203: after described underlying security module receives the notice of described control module, the decrypts information relevant to described trigger event.
Wherein, the information that the described transmitting terminal that the control of described application exports is sent comprises: encryption identification and enciphered message, or encryption identification, the version number of cryptographic algorithm and enciphered message;
After described underlying security module receives the notice of described control module, the decrypts information relevant to described trigger event, comprising:
Described underlying security module user read application control export described transmitting terminal send information time, after identifying described encryption identification, input communication key is pointed out to terminal use, and receive the communication key of described terminal use input, or, after identifying described encryption identification, obtain the local communication key preset stored;
The communication key that described underlying security module utilizes described terminal use to input or the communication key preset that described this locality stores, adopt cryptographic algorithm corresponding to the version number of cryptographic algorithm or the described cryptographic algorithm preset to decipher described enciphered message, show the plaintext of the information after deciphering to user.
In the present embodiment, one preferably needs user's input communication key, encrypt according to this communication key, the fail safe of which is higher, and another kind does not preferably need user's input communication key, but presets a communication key in this locality, this key is all used in each encryption, this mode, more convenient for user, user is without the need to each input communication keys.
Embodiment two:
The present embodiment additionally provides a kind of information safety transmission system, comprises transmitting terminal and receiving terminal, wherein, as shown in Figure 5, present embodiments provides a kind of transmitting terminal, comprising:
Detection module, the trigger event that the control for detecting application is triggered;
Wherein, described trigger event be user will application control in interpolation information; The information that described trigger event is correlated with is the information that user will add in the control of application.Wherein, the control of described application is editor's (EditView) control, is the self-defined control inherited from system compiles control and come.
Encrypting module, after the trigger event that the control for applying in detection is triggered, the information encryption relevant to described trigger event generates encrypted cipher text;
Application, for sending to receiving terminal by described encrypted cipher text.
Described application can be the note that mobile phone itself carries, or mail, also may be the third-party application that user downloads, such as micro-letter, QQ.
As the preferred mode of one, the transmitting terminal of the present embodiment also comprises:
Start module, whether open safe mode for warning terminal user, after receiving described terminal use and opening the request of safe mode, open safe mode, trigger described encrypting module and start.
Wherein, as the preferred mode of one, described startup module, for opening safe mode, triggering described encrypting module and starting, comprising:
Point out described terminal use to input safe mode and open password;
The safe mode of the described terminal use's input determining to receive open password and the safe mode preset opens password consistent after, by verifying, unlatching safe mode, triggers the startup of described encrypting module.
Wherein, in the present embodiment, terminal has been preset safe mode and opened password, for opening checking during safe mode.
Certainly, terminal also can not be arranged safe mode and open password, start module after receiving the request of opening described underlying security module, directly start safe mode, user need not input password, directly trigger described underlying security module and start.
Wherein, described encrypting module, after the trigger event that the control for applying in detection is triggered, the information encryption relevant to described trigger event generates encrypted cipher text, comprising:
After the trigger event that the control of described detection module detection application is triggered, described encrypting module points out input communication key to terminal use, and receives the communication key of described terminal use input, or, obtain the communication key preset of local storage;
The communication key preset that the communication key utilizing described terminal use to input or described this locality store adopts the information encryption that will add in the control of described application described user of cryptographic algorithm, and adds encryption identification or add the version number of described cryptographic algorithm and encryption identification generates encrypted cipher text.
In the present embodiment, one preferably needs user's input communication key, encrypt according to this communication key, the fail safe of which is higher, and another kind does not preferably need user's input communication key, but presets a communication key in this locality, this key is all used in each encryption, this mode, more convenient for user, user is without the need to each input communication keys.
As shown in Figure 6, present embodiments provide a kind of transmitting terminal, comprising: detection module, deciphering module and application, wherein:
Described detection module, the trigger event that the control for detecting application is triggered;
Described deciphering module, after the trigger event that the control for applying in detection is triggered, the decrypts information relevant to described trigger event.
Described application, after receiving information that transmitting terminal sends, prompting user triggers the control of described application;
Wherein, described trigger event is the information sent of described transmitting terminal that control that terminal use reads described application exports; The information that described trigger event is correlated with is the information that the described transmitting terminal of the control output of described application is sent.
Wherein, the control of described application is display (TextView) control, is the self-defined control inherited from system display control and come.
As the preferred mode of one, this receiving terminal also comprises the startup module be connected with described deciphering module with described detection module, wherein:
Described detection module, also for when detecting described trigger event, triggers described startup module work;
Whether described startup module, open safe mode for warning terminal user, after receiving described terminal use and opening the request of safe mode, opens safe mode, triggers described deciphering module and start.
Wherein, as the preferred mode of one, described startup module, for opening safe mode, triggering described deciphering module and starting, comprising:
Point out described terminal use to input safe mode and open password;
The safe mode of the described terminal use's input determining to receive open password and the safe mode preset opens password consistent after, by verifying, trigger the startup of described deciphering module.
Wherein, in the present embodiment, terminal has been preset safe mode and opened password, for opening checking during safe mode.
Certainly, terminal also can not be arranged safe mode and open password, start module after receiving the request of opening described underlying security module, directly start safe mode, user need not input password, directly trigger described underlying security module and start.
Wherein, the information that the described transmitting terminal that the control of described application exports is sent comprises: encryption identification and enciphered message, or encryption identification, the version number of cryptographic algorithm and enciphered message;
Described deciphering module, after the trigger event that the control for applying in detection is triggered, the decrypts information relevant to described trigger event, comprising:
After the trigger event that the control of described detection module detection application is triggered, after described deciphering module identifies encryption identification, input communication key is pointed out to terminal use, and receive the communication key of described terminal use input, or, after identifying described encryption identification, obtain the local communication key preset stored;
The communication key preset that the communication key utilizing described terminal use to input or described this locality store, adopt cryptographic algorithm corresponding to the version number of cryptographic algorithm or the described cryptographic algorithm preset to decipher described enciphered message, show the plaintext of the information after deciphering to user.
In the present embodiment, one preferably needs user's input communication key, encrypt according to this communication key, the fail safe of which is higher, and another kind does not preferably need user's input communication key, but presets a communication key in this locality, this key is all used in each encryption, this mode, more convenient for user, user is without the need to each input communication keys.
As shown in Figure 7, present embodiments provide a kind of information security transfer method, comprise the following steps:
S301: terminal detects the trigger event that the control of application is triggered;
Wherein, described trigger event be user will application control in interpolation information; The information that described trigger event is correlated with is the information that user will add in the control of application.
The control of described application is editor's (EditView) control, is the self-defined control inherited from system compiles control and come.Described application can be the note that mobile phone itself carries, or mail, also may be the third-party application that user downloads, such as micro-letter, QQ.
S302: the information encryption relevant to described trigger event generates encrypted cipher text;
Wherein, after described terminal detects the trigger event that the control of application is triggered, the information encryption relevant to described trigger event generates encrypted cipher text, comprising:
Described terminal points out input communication key to terminal use after the trigger event that the control of application is triggered being detected, and receives the communication key of described terminal use input, or, obtain the local communication key preset stored;
The communication key preset that the communication key utilizing described terminal use to input or described this locality store adopts cryptographic algorithm will the information encryption that add in the control of application to described user, and adds encryption identification or add the version number of described cryptographic algorithm and encryption identification generates encrypted cipher text.
In the present embodiment, one preferably needs user's input communication key, encrypt according to this communication key, the fail safe of which is higher, and another kind does not preferably need user's input communication key, but presets a communication key in this locality, this key is all used in each encryption, this mode, more convenient for user, user is without the need to each input communication keys.
S303: described encrypted cipher text is sent to receiving terminal by described application.
Wherein, as the preferred mode of one, before information encryption relevant to described trigger event described in step S302 generates encrypted cipher text, described method also comprises:
Whether warning terminal user opens safe mode, after receiving described terminal use and opening the request of safe mode, opens safe mode.
Wherein, open safe mode namely to refer to the information encryption relevant to described trigger event to generate encrypted cipher text.
Wherein, as the preferred mode of one, described unlatching safe mode, comprising:
Point out described terminal use to input safe mode and open password;
The safe mode of the described terminal use's input determining to receive open password and the safe mode preset opens password consistent after, by verifying, unlatching safe mode.
Wherein, in the present embodiment, terminal has been preset safe mode and opened password, for opening checking during safe mode.
Certainly, terminal also can not be arranged safe mode and open password, start module after receiving the request of opening described underlying security module, directly start safe mode, user need not input password, directly trigger described underlying security module and start.
As shown in Figure 8, present embodiments provide a kind of information security transfer method, comprise the following steps:
S401: terminal detects the trigger event that the control of application is triggered;
Wherein, before described terminal detects the trigger event that the control of application is triggered, described method also comprises: described application receives the information that transmitting terminal is sent, and points out user to trigger the control of described application;
Described trigger event is the information sent of described transmitting terminal that control that terminal use reads described application exports; The information that described trigger event is correlated with is the information that the described transmitting terminal of the control output of described application is sent.
Wherein, as the preferred mode of one, when described terminal detects the trigger event that the control of application is triggered, described method also comprises:
Whether warning terminal user opens safe mode, after receiving described terminal use and opening the request of safe mode, opens safe mode.
Wherein, as the preferred mode of one, described unlatching safe mode, comprising:
Point out described terminal use to input safe mode and open password;
The safe mode of the described terminal use's input determining to receive open password and the safe mode preset opens password consistent after, by verifying, unlatching safe mode.Wherein, open safe mode, namely refer to that can perform step S402 is decrypted.
S402: the decrypts information relevant to described trigger event.
Wherein, the information that the described transmitting terminal that the control of described application exports is sent comprises: encryption identification and enciphered message, or encryption identification, the version number of cryptographic algorithm and enciphered message;
After described terminal detects the trigger event that the control of application is triggered, the decrypts information relevant to described trigger event, comprising:
Described terminal detect user read application control export described transmitting terminal send information time, after identifying described encryption identification, input communication key is pointed out to terminal use, and receive the communication key of described terminal use input, or, after identifying described encryption identification, obtain the local communication key preset stored;
The communication key preset that the communication key utilizing described terminal use to input or described this locality store, adopt cryptographic algorithm corresponding to the version number of cryptographic algorithm or the described cryptographic algorithm preset to decipher described enciphered message, show the plaintext of the information after deciphering to user.
In an application example, the present embodiment is described in further detail below.
In this application example, with the control of application for TextView (display) control and EditView (editor) control, encryption identification is " talking secretly in the centre of the palm: ", and to have opened safe mode be example, Fig. 9 is the schematic flow sheet of this application example information safety transmitting method, as shown in the figure, comprise the following steps:
S301: user A with B is the both sides communicated, A and B uses other modes except the channel that both sides will carry out confidential corespondence to tell the other side this communication key;
S302: user A to terminal A input expressly;
S303: the underlying security module of terminal intercepts and captures this expressly prior to application, prompting user input communication key, user A inputs the communication key of arranging with B;
S304: the ciphertext after encryption is sent to application by underlying security module;
Ciphertext after this encryption comprises: to the information after plain text encryption and encryption identification, or to the version number of the information after plain text encryption, cryptographic algorithm and encryption identification.Now, what application obtained is ciphertext;
S305: apply ciphertext stored in terminal local internal memory;
Terminal local memory applies the communication information receiving and send, but what obtain due to application is ciphertext, so what store in local internal memory is also ciphertext;
S306: the webserver of application, ciphertext is sent to the webserver of application by the application on terminal A, and ciphertext is transmitted to the application on terminal B by the webserver of application;
Same, ciphertext can be stored in this locality storage of network side by the webserver of application.Obviously, what this locality of network side stored in storing is also ciphertext.
S307: after the application on terminal B receives ciphertext, stored in the local internal memory on terminal B, and is shown to user B and sees, can show a string character string " talk secretly in the centre of the palm: FImG6DpTAF2acmMMF==" to user B;
Wherein, " talking secretly in the centre of the palm: " is encryption identification, also can know that the information received is ciphertext after user sees.Clearly, what store in the local internal memory on terminal B is also ciphertext.
S308: the underlying security module on terminal B identifies this encryption identification at bottom, so prompting user B input communication key;
S309: after user B inputs correct communication key, the plaintext that A sends, to decrypt ciphertext, is shown to user and sees by underlying security module.
As can be seen from above-mentioned flow process, in whole communication information transmitting procedure, the information that application obtains and stores, the information obtaining and store at the webserver of the information of transmission over networks and application are all ciphertexts.Even if lost terminal, or go-between communication is intercepted and captured, or the webserver of application is broken/abuses, and the communication information also can not be revealed.
Figure 10 is the principle schematic of underlying security module controls application:
As shown in Figure 10, terminal is provided with application, terminal bottom frame layer is provided with underlying security module, underlying security module is a part of bottom frame layer;
The interface of applying is made up of multiple systems control and the self-defined control from system control succession.Wherein, 204 is self-defined TextView controls; 205 is self-defined EditView controls; Inheritance between control can be seen: 204 inherit in 206 (system TextView controls) from Figure 10; 205 inherit in 207 (system EditView controls);
Preset control module in 206 and 207, this control module, for intercepting and capturing the trigger event that control obtains; With underlying security module communication, perform the instruction of underlying security module; Control the input and output of control.
Clearly, because 204 and 206,205 and 207 is inheritances, so inner at these application self-defined control, also there is control module; Like this, underlying security module just controls the input and output of applying by control module.
In addition, as required, preset control module in other controls that can also provide in system, controls other behaviors of applying by control module, like this application without the need to make any amendment prerequisite under, the input and output of underlying security module controls application.In Here it is Fig. 5, on terminal A, underlying security module can obtain input prior to application; On terminal B, underlying security module can after application provides output the further principle that exports of reprocessing.In fact this make use of the inheritance of modern intelligent terminal window system.The window system that application is difficult to workaround system and provides writes the use of a set of window system more in addition.So application must control module in inheritance system control, and then is controlled by this control module by underlying security module.
Figure 11 is the operation chart of opening safe mode (" close " pattern) in application example:
501 is finger manipulations of user, representative of consumer;
502 is certain third party's chat application;
503 is " close " switches, in figure when a black dot appears in its upper right corner, represents that it is in open mode; If there is no black dot, represent that it is in closed condition;
401 is that the user that allows that underlying security module ejects inputs the interface of the password for opening " close " pattern;
402 is for the input frame of input for the password of unlatching " close " pattern on 401;
403 is when the password of input is correct, the interface that " close " pattern is opened, and now, the upper right corner of 503 there will be a black dot;
405 is the code error when input, and " close " pattern is still in the interface of closed condition, and now, the upper right corner of 503 there will not be black dot;
Operating process comprises: when 503 " close " switch is in closed condition, user clicks 503 with finger 501, underlying security module ejects 401 user please input the password being used for opening " close " pattern, user inputs password in 402, if password correct (consistent with the password preset), " close " pattern is opened, and sees 403; If code error, " close " pattern is still in closed condition, sees 405.
Said process demonstrates the identity of user, shows that user has the right to use of this terminal.
Figure 12 is that underlying security module is transformed into ciphertext user's input, returns to the operation example figure of EditView:
501 is finger manipulations of user, representative of consumer;
502 is certain third party's chat application;
503 is " close " switches, and in figure, it is in open mode;
504 is that the user that allows that underlying security module ejects inputs interface expressly;
505 is entering method keyboards;
506 is plaintexts that user inputs;
507 is that the user that allows that underlying security module ejects inputs the interface of this signcode;
508 is signcodes graphically that user inputs;
509 is after the process of underlying security module encrypt, returns to the ciphertext of EditView;
Operating process comprises: user clicks the EditView control of application 502 with finger 501, because 503 are in open mode (namely " close " pattern is opened), so this trigger event is intercepted and captured by underlying security module and on behalf of process, so ejected 504; User have input expressly after 506 in 504, click signcode button, eject 507 interfaces, user is allowed to have input signcode 508 (in detail in this figure, signcode be graphical passwords, actually can use various cryptogram form), then user clicks confirming button, gets back to the interface of 502; Now, the ciphertext 509 after the process of underlying security module encrypt has been inserted in EditView, this ciphertext is " talk secretly in the centre of the palm: FImG6DpTAF2acmMMF==", comprising: the version number of cryptographic algorithm and encryption identification " talking secretly in the centre of the palm: ", and this encryption identification pre-sets; User clicks the transmission button on 502 interfaces, and the ciphertext 509 of acquisition is sent to the webserver by 502, is stored into terminal local simultaneously stores 509.
In above-mentioned whole process, application all cannot obtain the original character information of user.So this application can not steal the privacy of user.
Figure 13 is that underlying security module uses the key of user's input decrypt ciphertext, returns to the schematic diagram that TextView shows:
601 is these application interfaces that recipient installs;
602 is that the user that allows that underlying security module ejects inputs the interface of this signcode;
603 is the display expressly interfaces of ejecting when key is correct;
604 is eject to obtain miscue interface when wrong cipher key;
Operating process comprises: the terminal of recipient have received aforementioned ciphertext 509, TextView shows ciphertext " talk secretly in the centre of the palm: FImG6DpTAF2acmMMF==", wherein, " talking secretly in the centre of the palm: " is encryption identification, recipient sees " talking secretly in the centre of the palm: ", just request starts safe mode at once, namely opens " close " mode decryption; Wherein, as shown in Figure 7, user clicks TextView to the mode opened, and underlying security module is on behalf of this touch event of process; Underlying security module obtains ciphertext 509 from the display of TextView stores, identify encryption identification, then judge to need deciphering, so eject 602 key input frames, if what recipient was correct have input key (pattern " Z "), underlying security module is according to this secret key decryption, and deciphering will be successful, and underlying security module ejects 603 and sees being expressly shown to recipient; If recipient have input the key of mistake, deciphering will be failed, and underlying security module ejects 604 promptings recipient " wrong cipher key ".
As can be seen from above-described embodiment; relative to prior art; the information security transfer method provided in above-described embodiment and system, receiving terminal, transmitting terminal; intercepted and captured the trigger event of application by underlying security module, be encrypted the information of transmission or decipher, application is just as the transmission channel of the information after encrypting; application is explained in words to the information of passing and be ciphertext; thus preventing application from divulging a secret, security reliability is high, meets the demand that user protects privacy.
The all or part of step that one of ordinary skill in the art will appreciate that in said method is carried out instruction related hardware by program and is completed, and described program can be stored in computer-readable recording medium, as read-only memory, disk or CD etc.Alternatively, all or part of step of above-described embodiment also can use one or more integrated circuit to realize.Correspondingly, each module/unit in above-described embodiment can adopt the form of hardware to realize, and the form of software function module also can be adopted to realize.The present invention is not restricted to the combination of the hardware and software of any particular form.
The foregoing is only the preferred embodiments of the present invention, be not intended to limit protection scope of the present invention.According to summary of the invention of the present invention; also can there be other various embodiments; when not deviating from the present invention's spirit and essence thereof; those of ordinary skill in the art are when making various corresponding change and distortion according to the present invention; within the spirit and principles in the present invention all; any amendment of doing, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (30)

1. an information security transfer method, is characterized in that, comprising:
When terminal receives encrypted command, the trigger event of interception terminal applies;
Generation encrypted cipher text is encrypted to the described trigger event intercepted;
Send described encrypted cipher text to described application;
Encrypted cipher text sends by described application.
2. the method for claim 1, is characterized in that: described when terminal receives encrypted command, comprises before interception terminal applies trigger event:
Whether warning terminal user opens safe mode;
When receiving after user opens safe mode request, open safe mode.
3. method as claimed in claim 2, is characterized in that: described when receiving after user opens safe mode request, unlatching safe mode comprises:
Prompting user inputs safe mode and opens password;
After the safe mode unlatching password of the user's input received is consistent with the password that the safe mode preset is opened, open safe mode.
4. method as claimed in claim 2, is characterized in that: described when receiving after user opens safe mode request, unlatching safe mode comprises:
After receiving the unlatching safe mode request that user sent by close switch, open safe mode; Described close switch comprises the physical button be arranged in terminal and/or the virtual key suspended on a terminal screen.
5. the method for claim 1, is characterized in that: described to described information be encrypted generate encrypted cipher text comprise:
Point out input communication key to terminal use and receive the communication key of described terminal use input, or, obtain the local communication key preset stored;
Cryptographic algorithm is adopted to be encrypted described trigger event;
Add version number and encryption identification generation encrypted cipher text that encryption identification generates encrypted cipher text or adds described cryptographic algorithm.
6. method as claimed in claim 5, is characterized in that: describedly point out input communication key and the communication key receiving described terminal use input comprises to terminal use:
Eject the interface that user inputs pre-trigger event;
The pre-trigger event of the user's input received;
Eject the interface of user's input communication key.
7. the method as described in claim 1 ~ 6, is characterized in that: described trigger event is the information of user's interpolation that described application receives, and includes but not limited to one of them: Word message, pictorial information and audio/video information.
8. the method as described in claim 1 ~ 6, is characterized in that: described application includes but not limited to one of them: note, mail, micro-letter and QQ.
9. an information security transfer method, is characterized in that, comprising:
When terminal receives decryption command, tackle the encrypted cipher text that described application receives;
Described encrypted cipher text is decrypted and obtains the information after deciphering;
The information after described deciphering that sends is to described application.
10. method as claimed in claim 9, is characterized in that: when terminal applies receives decryption command, also comprises before tackling described encrypted cipher text:
Whether warning terminal user opens safe mode;
After receiving described terminal use and opening the request of safe mode, open safe mode.
11. methods as claimed in claim 10, is characterized in that: after receiving described terminal use and opening the request of safe mode, open safe mode, comprising:
Point out described terminal use to input safe mode and open password;
The safe mode of the described terminal use's input determining to receive open password and the safe mode preset open password consistent after, unlatching safe mode.
12. methods as claimed in claim 10, is characterized in that: described when receiving after user opens safe mode request, open safe mode and comprise:
After receiving the unlatching safe mode request that user sent by close switch, open safe mode; Described close switch comprises the physical button be arranged in terminal and/or the virtual key suspended on a terminal screen.
13. methods as claimed in claim 9, is characterized in that: described being decrypted described encrypted cipher text obtains the information after deciphering, and comprising:
Point out input communication key to terminal use, and receive the communication key of described terminal use input, or, after identifying described encryption identification, obtain the local communication key preset stored;
Cryptographic algorithm corresponding to the version number of cryptographic algorithm or the described cryptographic algorithm preset is adopted to obtain the information after deciphering to described enciphered message deciphering;
The information after described deciphering that sends is to described application.
14. methods as claimed in claim 13, it is characterized in that: describedly point out input communication key to terminal use, and receive the communication key of described terminal use input, or, after identifying described encryption identification, comprise before obtaining the local communication key preset stored:
Identify the encryption identification that carries of encrypted cipher text and enciphered message, or encryption identification, the version number of cryptographic algorithm and enciphered message.
15. methods as claimed in claim 13, is characterized in that: describedly point out input communication key to terminal use, and the communication key receiving described terminal use input comprises;
Eject the interface of user's input communication key;
Be decrypted when the communication key received is correct;
Miscue interface is ejected when the communication key mistake received.
16. methods as described in claim 9 ~ 15, is characterized in that: described method also comprises: the information after described application receiving and deciphering, and show in the application.
17. 1 kinds of transmitting terminals, is characterized in that: comprise control module and security module;
Described control module is used for when terminal receives encrypted command, tackles the trigger event of described terminal applies;
Described security module is used for being encrypted generation encrypted cipher text to the described information intercepted, and sends described encrypted cipher text to described application;
Described terminal applies is used for encrypted cipher text to send.
18. terminals as claimed in claim 17, is characterized in that: described terminal also comprises startup module,
Whether safe mode is opened for warning terminal user;
When receiving after user opens safe mode request, opening safe mode, sending encrypted command.
19. terminals as claimed in claim 18, is characterized in that: described startup module is used for when receiving after user opens safe mode request, and unlatching safe mode, comprises
Input safe mode for pointing out user and open password;
After the safe mode unlatching key of the user's input received is consistent with the password that the safe mode preset is opened, open safe mode.
20. terminals as claimed in claim 19, it is characterized in that: described terminal also comprises close switch, open safe mode request for receiving user, described close switch is the physical button be arranged in terminal and/or the virtual key suspended on a terminal screen, for opening safe mode.
21. terminals as claimed in claim 17, is characterized in that: described security module is used for being encrypted generation encrypted cipher text to described information and comprises:
For pointing out input communication key to user and receiving described terminal use's input communication key, or, obtain the local communication key preset stored;
Cryptographic algorithm is adopted to be encrypted described trigger event;
Add version number and encryption identification generation encrypted cipher text that encryption identification generates encrypted cipher text or adds described cryptographic algorithm.
22. terminals as claimed in claim 21, is characterized in that: described security module is used for pointing out input communication key to user and receiving described terminal use's input communication key also comprising:
The interface of pre-trigger event is inputted for ejecting user;
Receive the pre-trigger event of user's input;
Eject the interface of user's input communication key.
23. 1 kinds of receiving terminals, is characterized in that: comprise control module and security module;
Described control module is used for when terminal receives decryption command, tackles the encrypted cipher text that described application receives;
Described security module is used for being decrypted described encrypted cipher text obtaining the information after deciphering, and the information after described deciphering that sends is to described application.
24. terminals as claimed in claim 23, it is characterized in that, described terminal also comprises startup module,
Whether safe mode is opened for warning terminal user;
After receiving described terminal use and opening the request of safe mode, open safe mode.
25. methods as claimed in claim 24, is characterized in that: described startup module is used for after receiving described terminal use and opening the request of safe mode, and unlatching safe mode, comprising:
Input safe mode for pointing out described terminal use and open password;
The safe mode of the described terminal use's input determining to receive open password and the safe mode preset open password consistent after, unlatching safe mode.
26. terminals as claimed in claim 24, is characterized in that: described terminal also comprises close switch,
For opening safe mode request when receiving user, described close switch is the physical button be arranged in terminal and/or the virtual key suspended on a terminal screen, for opening safe mode.
27. terminals as claimed in claim 23, is characterized in that, described security module is used for being decrypted described encrypted cipher text obtaining the information after deciphering, and the information after described deciphering that sends, to described application, comprising:
For pointing out input communication key to terminal use, and receive the communication key of described terminal use input, or, after identifying described encryption identification, obtain the local communication key preset stored;
Cryptographic algorithm corresponding to the version number of cryptographic algorithm or the described cryptographic algorithm preset is adopted to obtain the information after deciphering to described enciphered message deciphering;
The information after described deciphering that sends is to described application.
28. terminals as claimed in claim 27, it is characterized in that: described security module is used for pointing out input communication key to terminal use, and receives the communication key of described terminal use input, or, after identifying described encryption identification, comprise before obtaining the local communication key preset stored:
For identifying the encryption identification that encrypted cipher text carries and enciphered message, or encryption identification, the version number of cryptographic algorithm and enciphered message.
29. methods as claimed in claim 27, is characterized in that: described security module is used for pointing out input communication key to terminal use, and receives the communication key of described terminal use input, comprises
For ejecting the interface of user's input communication key;
Be decrypted when the communication key received is correct;
Miscue interface is ejected when the communication key mistake received.
30. as described in claim 23 ~ 29 in, it is characterized in that: described terminal also comprises display hollow member for receiving the information after security module deciphering, and shows in the application.
CN201510296996.XA 2014-09-22 2014-09-22 A kind of information security transfer method receives terminal and sends terminal Active CN104917603B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510296996.XA CN104917603B (en) 2014-09-22 2014-09-22 A kind of information security transfer method receives terminal and sends terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510296996.XA CN104917603B (en) 2014-09-22 2014-09-22 A kind of information security transfer method receives terminal and sends terminal
CN201410489848.5A CN104270353B (en) 2014-09-22 2014-09-22 information security transmission method and system, receiving terminal and sending terminal

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201410489848.5A Division CN104270353B (en) 2014-09-22 2014-09-22 information security transmission method and system, receiving terminal and sending terminal

Publications (2)

Publication Number Publication Date
CN104917603A true CN104917603A (en) 2015-09-16
CN104917603B CN104917603B (en) 2019-03-12

Family

ID=52161843

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201410489848.5A Active CN104270353B (en) 2014-09-22 2014-09-22 information security transmission method and system, receiving terminal and sending terminal
CN201510296996.XA Active CN104917603B (en) 2014-09-22 2014-09-22 A kind of information security transfer method receives terminal and sends terminal

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201410489848.5A Active CN104270353B (en) 2014-09-22 2014-09-22 information security transmission method and system, receiving terminal and sending terminal

Country Status (2)

Country Link
CN (2) CN104270353B (en)
WO (1) WO2016045504A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016045504A1 (en) * 2014-09-22 2016-03-31 中兴通讯股份有限公司 Method and system for transmitting information safely, receiving terminal and transmission terminal
CN105657697A (en) * 2015-12-24 2016-06-08 北京奇虎科技有限公司 Method and device for protecting short message security
CN108616644A (en) * 2016-12-12 2018-10-02 阿里巴巴集团控股有限公司 Encrypt reminding method and device
CN109274582A (en) * 2018-09-20 2019-01-25 腾讯科技(武汉)有限公司 Methods of exhibiting, device, equipment and the storage medium of instant communication information
CN109471736A (en) * 2018-09-14 2019-03-15 叮联信息技术有限公司 Event information uninterruptedly transmits at random and Real-Time Sharing method

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9495708B2 (en) 2012-06-11 2016-11-15 Acorns Grow Incorporated Systems and methods for managing electronic interactive gaming-based investments
WO2019014140A1 (en) * 2017-07-10 2019-01-17 Investable Games Technology Inc. Platform, systems, and methods for interception of data stream triggers
CN110121002A (en) * 2018-11-28 2019-08-13 熵加网络科技(北京)有限公司 A method of in Android operation system to text encryption and decryption

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101169815A (en) * 2007-11-27 2008-04-30 华为技术有限公司 Computer system and data input method
CN101493750A (en) * 2008-11-28 2009-07-29 深圳华为通信技术有限公司 Application program control input method and device based on touch screen input
CN101534311A (en) * 2009-04-14 2009-09-16 杨筑平 An information security method and procedure
CN103514396A (en) * 2013-09-23 2014-01-15 北京奇虎科技有限公司 Processing method and device for file / application program on mobile communication terminal
CN103701978A (en) * 2012-09-27 2014-04-02 中国电信股份有限公司 Terminal and automatic multimedia file encryption method
CN103745174A (en) * 2013-12-30 2014-04-23 飞天诚信科技股份有限公司 Safety keyboard working method
CN103986837A (en) * 2014-05-28 2014-08-13 天地融科技股份有限公司 Information processing method and device
CN104270353A (en) * 2014-09-22 2015-01-07 中兴通讯股份有限公司 Information safety transmission method and system, receiving terminal and transmitting terminal
CN104700001A (en) * 2013-12-04 2015-06-10 腾讯科技(深圳)有限公司 Information encryption method and device of application program

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094068A (en) * 2007-07-17 2007-12-26 深圳凯虹移动通信有限公司 Transmision method for encrypting information of mobile terminal
KR20120132013A (en) * 2011-05-27 2012-12-05 주식회사 팬택 Portable terminal, and method for securing of transmission data between hardware module of portable terminal
CN103164650B (en) * 2013-03-26 2016-08-03 北京奇虎科技有限公司 The implementation method of browser side safe control and browser
CN103458382B (en) * 2013-05-22 2020-04-21 深圳市中易通安全芯科技有限公司 Hardware encryption transmission and storage method and system for mobile phone private short message
CN103390026B (en) * 2013-06-20 2017-08-25 中国软件与技术服务股份有限公司 A kind of mobile intelligent terminal secure browser and its method of work

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101169815A (en) * 2007-11-27 2008-04-30 华为技术有限公司 Computer system and data input method
CN101493750A (en) * 2008-11-28 2009-07-29 深圳华为通信技术有限公司 Application program control input method and device based on touch screen input
CN101534311A (en) * 2009-04-14 2009-09-16 杨筑平 An information security method and procedure
CN103701978A (en) * 2012-09-27 2014-04-02 中国电信股份有限公司 Terminal and automatic multimedia file encryption method
CN103514396A (en) * 2013-09-23 2014-01-15 北京奇虎科技有限公司 Processing method and device for file / application program on mobile communication terminal
CN104700001A (en) * 2013-12-04 2015-06-10 腾讯科技(深圳)有限公司 Information encryption method and device of application program
CN103745174A (en) * 2013-12-30 2014-04-23 飞天诚信科技股份有限公司 Safety keyboard working method
CN103986837A (en) * 2014-05-28 2014-08-13 天地融科技股份有限公司 Information processing method and device
CN104270353A (en) * 2014-09-22 2015-01-07 中兴通讯股份有限公司 Information safety transmission method and system, receiving terminal and transmitting terminal

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016045504A1 (en) * 2014-09-22 2016-03-31 中兴通讯股份有限公司 Method and system for transmitting information safely, receiving terminal and transmission terminal
CN105657697A (en) * 2015-12-24 2016-06-08 北京奇虎科技有限公司 Method and device for protecting short message security
CN108616644A (en) * 2016-12-12 2018-10-02 阿里巴巴集团控股有限公司 Encrypt reminding method and device
CN108616644B (en) * 2016-12-12 2021-07-30 阿里巴巴集团控股有限公司 Encryption prompting method and device
CN109471736A (en) * 2018-09-14 2019-03-15 叮联信息技术有限公司 Event information uninterruptedly transmits at random and Real-Time Sharing method
CN109274582A (en) * 2018-09-20 2019-01-25 腾讯科技(武汉)有限公司 Methods of exhibiting, device, equipment and the storage medium of instant communication information
CN109274582B (en) * 2018-09-20 2021-12-10 腾讯科技(武汉)有限公司 Instant communication message display method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN104917603B (en) 2019-03-12
CN104270353B (en) 2019-12-06
WO2016045504A1 (en) 2016-03-31
CN104270353A (en) 2015-01-07

Similar Documents

Publication Publication Date Title
CN104917603A (en) Information secure transmission method, receiving terminal and sending terminal
EP3324572B1 (en) Information transmission method and mobile device
EP2953323B1 (en) System and method of securing instant messaging sessions
CN104270517A (en) Information encryption method and mobile terminal
CN104270516B (en) Decryption method and mobile terminal
CN106487659B (en) Information encryption method, information encryption device and terminal
CN105450269A (en) Method and device for realizing safe interaction and pairing authentication between Bluetooth devices
CN108197485A (en) terminal data encryption method and system, terminal data decryption method and system
CN105812332A (en) Data protection method
CN104660589A (en) Method and system for controlling encryption of information and analyzing information as well as terminal
CN107579903B (en) Picture message secure transmission method and system based on mobile device
KR101589111B1 (en) Method of providing security chatting service and system performing the same
CN107094156A (en) A kind of safety communicating method and system based on P2P patterns
CN105743917A (en) Message transmitting method and terminal
CN102306255A (en) Document protection method and system
CN104852800B (en) Data transmission method and device
CN104917718A (en) Method and terminal for fast authentication of mobile terminal user and application server
CN104955029A (en) Address book protection method, address book protection device and communication system
CN106027530A (en) Instant message encryption system based on smartphone and implementation method thereof
Alatawi et al. SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN102098391B (en) Communication terminal and communication information processing method thereof
CN107508814A (en) Data ciphering method, decryption method, apparatus and system
CN109492359B (en) Secure network middleware for identity authentication and implementation method and device thereof
KR100931986B1 (en) Terminal and method for transmitting message and receiving message

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant