CN105022965A - Data encryption method and apparatus - Google Patents

Data encryption method and apparatus Download PDF

Info

Publication number
CN105022965A
CN105022965A CN201510412135.3A CN201510412135A CN105022965A CN 105022965 A CN105022965 A CN 105022965A CN 201510412135 A CN201510412135 A CN 201510412135A CN 105022965 A CN105022965 A CN 105022965A
Authority
CN
China
Prior art keywords
encryption key
information
encrypted
encryption
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510412135.3A
Other languages
Chinese (zh)
Other versions
CN105022965B (en
Inventor
张海平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510412135.3A priority Critical patent/CN105022965B/en
Publication of CN105022965A publication Critical patent/CN105022965A/en
Application granted granted Critical
Publication of CN105022965B publication Critical patent/CN105022965B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Abstract

The embodiment of the present invention discloses a data encryption method and apparatus. The method comprises: acquiring a first encryption key input by a terminal user and associating a second encryption key input by an encryption user; and according to the first encryption key and the second encryption key, carrying out encryption on data to be encrypted. By adopting the data encryption method and apparatus which are disclosed by the embodiment of the present invention, data safety can be improved.

Description

A kind of data ciphering method and device
Technical field
The present invention relates to communication technical field, particularly relate to a kind of data ciphering method and device.
Background technology
Along with the high speed development of the communication technology, the function of user terminal is more and more rich and varied, the user's private information preserved in user terminal also gets more and more, and in order to ensure the security of the user data stored in user terminal, needs the user data to storing in user terminal to be encrypted.
At present conventional in the scheme of ciphering user data, it normally arranges encryption key (as password or finger print information) to the ciphering user data in user terminal by terminal user.
But practice finds, the encryption key arranged by sole user easily occurs to leak or stolen by others, and then causes the security of user data to be on the hazard.
Summary of the invention
The embodiment of the invention discloses a kind of data ciphering method and device, the security of data can be improved.
Embodiment of the present invention first aspect discloses a kind of data ciphering method, comprising:
Obtain the first encryption key of terminal user's input, and the second encryption key of association encrypting user input;
According to described first encryption key and described second encryption key, be-encrypted data is encrypted.
Wherein, the first encryption key of described acquisition terminal user input, and before the second encryption key of described association encrypting user input, also comprise:
The CIPHERING REQUEST that receiving terminal user inputs for be-encrypted data;
Respond described CIPHERING REQUEST, export the first information, described first information is for pointing out input first encryption key.
Wherein, the first encryption key of described acquisition terminal user input, and the second encryption key of described association encrypting user input, comprising:
Obtain the first encryption key that terminal user responds described first information input;
Export the second information, described second information is used for prompting and is confirmed whether to carry out association encryption to described be-encrypted data;
When the confirmation receiving the described second information input of response carries out to described be-encrypted data the instruction associating encryption, the associated terminal corresponding to association encrypting user sends associated key request message;
Receive the associated key response message that described associated terminal sends, and obtain the second encryption key that described associated key response message comprises.
Wherein, before described output second information, also comprise:
Obtain the priority of described be-encrypted data;
Judge that whether the priority of described be-encrypted data is higher than pre-set priority;
If higher than, the associated terminal corresponding to association encrypting user sends associated key request message;
Otherwise, determine the step performing described output second information.
Wherein, described first information also for prompting be confirmed whether described to be-encrypted data carry out association encrypt;
First encryption key of described acquisition terminal user input, and the second encryption key of described association encrypting user input, comprising:
Obtain the first encryption key that terminal user responds described first information input, and when the confirmation receiving terminal user and respond described first information input carries out to described be-encrypted data the instruction associating encryption, send associated key request message to associated terminal corresponding to association encrypting user;
Receive the associated key response message that described associated terminal sends, and obtain the second encryption key that described associated key response message comprises.
Wherein, describedly according to described first encryption key and described second encryption key, be-encrypted data to be encrypted, to comprise:
Described first encryption key is used to be encrypted described be-encrypted data, to obtain the first enciphered data;
Described second encryption key is used to be encrypted described first enciphered data.
Wherein, describedly according to described first encryption key and described second encryption key, be-encrypted data to be encrypted, to comprise:
Target encryption key is generated by preset rules according to described first encryption key and described second encryption key;
Described target encryption key is used to be encrypted described be-encrypted data.
Wherein, described first encryption key comprises: the combination of one or more in password, finger print information, iris information and voiceprint; Or/and,
Described second encryption key comprises: the combination of one or more in password, finger print information, iris information and voiceprint.
Embodiment of the present invention second aspect discloses a kind of data encryption device, comprising:
Acquisition module, for obtaining the first encryption key of terminal user's input, and the second encryption key of association encrypting user input;
Encrypting module, for being encrypted be-encrypted data according to described first encryption key and described second encryption key.
Wherein, also comprise:
Receiver module, for the CIPHERING REQUEST that receiving terminal user inputs for be-encrypted data;
Output module, for responding described CIPHERING REQUEST, exports the first information, and described first information is for pointing out input first encryption key.
Wherein, described acquisition module, responds the first encryption key of described first information input specifically for obtaining terminal user;
Described output module, also for exporting the second information, described second information is used for prompting and is confirmed whether to carry out association encryption to described be-encrypted data;
Described device also comprises:
First sending module, when the confirmation for receiving the described second information input of response when described receiver module carries out to described be-encrypted data the instruction associating encryption, the associated terminal corresponding to association encrypting user sends associated key request message;
Described receiver module, also for receiving the associated key response message that described associated terminal sends;
Shown acquisition module, specifically for obtaining the second encryption key that described associated key response message comprises.
Wherein, described acquisition module, also for obtaining the priority of described be-encrypted data;
Described device also comprises:
Judge module, for judging that whether the priority of described be-encrypted data is higher than pre-set priority;
Described first sending module, also for when described judge module is judged as YES, the associated terminal corresponding to association encrypting user sends associated key request message;
Described output module, specifically for when described judge module is judged as NO, exports the second information.
Wherein, described first information also for prompting be confirmed whether described to be-encrypted data carry out association encrypt;
Described acquisition module, responds the CIPHERING REQUEST of described first information input specifically for obtaining terminal user;
Described device also comprises:
Second sending module, when described receiver module receive confirmation that terminal user responds described first information input the instruction associating encryption is carried out to described be-encrypted data time, send associated key request message to associated terminal corresponding to association encrypting user;
Described receiver module, also for receiving the associated key response message that described associated terminal sends, and obtains the second encryption key that described associated key response message comprises.
Wherein, described encrypting module, specifically for using described first encryption key to be encrypted described be-encrypted data, to obtain the first enciphered data; Described second encryption key is used to be encrypted described first enciphered data.
Wherein, described encrypting module, specifically for generating target encryption key according to described first encryption key and described second encryption key by preset rules; Described target encryption key is used to be encrypted described be-encrypted data.
Wherein, described first encryption key comprises: the combination of one or more in password, finger print information, iris information and voiceprint; Or/and,
Described second encryption key comprises: the combination of one or more in password, finger print information, iris information and voiceprint.
Implement the embodiment of the present invention, there is following beneficial effect:
By obtaining the first encryption key of terminal user's input, and the second encryption key of association encrypting user input, and according to the first encryption key and the second encryption key, be-encrypted data is encrypted, compared with the mode be encrypted by single double secret key be-encrypted data in prior art, improve the security of data.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of a kind of data ciphering method that the embodiment of the present invention provides;
Fig. 2 is the schematic flow sheet of the another kind of data ciphering method that the embodiment of the present invention provides;
Fig. 3 is the schematic flow sheet of the another kind of data ciphering method that the embodiment of the present invention provides;
Fig. 4 is the structural representation of a kind of data encryption device that the embodiment of the present invention provides;
Fig. 5 is the structural representation of the another kind of data encryption device that the embodiment of the present invention provides;
Fig. 6 is the structural representation of the another kind of data encryption device that the embodiment of the present invention provides;
Fig. 7 is the structural representation of the another kind of data encryption device that the embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only a part of embodiment of the present invention, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The embodiment of the invention discloses a kind of data ciphering method and device, can data security be improved.Below be described in detail respectively.
Refer to Fig. 1, the schematic flow sheet of Fig. 1 a kind of data ciphering method disclosed in the embodiment of the present invention, as shown in Figure 1, this data ciphering method can comprise:
First encryption key of S101, acquisition terminal user input, and the second encryption key of association encrypting user input.
In the embodiment of the present invention, said method can be applied to user terminal, this user terminal can include but not limited to PC (Personal Computer, personal computer), notebook computer, mobile phone, panel computer, PDA (Personal Digital Assistant, personal digital assistant) etc., for ease of describing, be that user terminal is described below with executive agent.
In the embodiment of the present invention, in order to improve data security, when needs are encrypted be-encrypted data, encryption key can be provided respectively by multiple user (comprising terminal user and one or more association encrypting user), and then according to the encryption key that the plurality of user provides, be-encrypted data is encrypted.
In the embodiment of the present invention, the user that the user ID that association encrypting user can pre-set for user is corresponding, also can for user be when being encrypted be-encrypted data, the user that user ID selected is in real time corresponding; Wherein, this user ID can include but not limited to phone number, QQ account or micro-letter account etc.
It should be noted that in the embodiment of the present invention, terminal user refers in particular to some fixing users, and refers to when being encrypted the data in user terminal, the user of current use user terminal.For the ease of understanding, in embodiments of the present invention, can be described for terminal and terminal user's one_to_one corresponding, namely a terminal only has a terminal user to use.
In the embodiment of the present invention, the first encryption key can include but not limited to the combination of one or more in password, finger print information, iris information and voiceprint; Or/and,
Second encryption key can include but not limited to the combination of one or more in password, finger print information, iris information and voiceprint.
Wherein, the first encryption key and the second encryption key can be the encryption key that type is identical, and such as, when the first encryption key is password, the second encryption key is also password; When the first encryption key is finger print information, the second encryption key is also finger print information; First encryption key and the second encryption key also can be the encryption key that type is not identical, and such as, when the first encryption key is password, the second encryption key is finger print information.
S102, according to the first encryption key and the second encryption key, be-encrypted data to be encrypted.
In the embodiment of the present invention, get first encryption key of terminal user, and after the second encryption key of association encrypting user, can be encrypted be-encrypted data, to improve data security according to this first encryption key and the second encryption key.
As the optional embodiment of one, in above-mentioned steps 102, according to the first encryption key and the second encryption key, be-encrypted data is encrypted, can comprises the following steps:
11), use the first encryption key to be encrypted be-encrypted data, obtain the first enciphered data;
12) the second encryption key, is used to be encrypted the first enciphered data.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and after the second encryption key of association encrypting user input, the first encryption key and the second encryption key can be used respectively to be encrypted be-encrypted data.
Alternatively, the first encryption key first can be used to be encrypted be-encrypted data, to obtain the enciphered data (the first enciphered data) after encrypting, and then use the second encryption key to be encrypted the first enciphered data; Also the second encryption key first can be used to be encrypted be-encrypted data, to obtain the enciphered data after encrypting, and then to use the first encryption key to be encrypted the enciphered data after encryption.
It should be noted that, in embodiments of the present invention, when associating encrypting user and having multiple, second encryption key also has multiple, now, each encryption key (the first encryption key and multiple second encryption key) does not limit the order embodiment of the present invention that be-encrypted data is encrypted.
As the optional embodiment of another kind, in above-mentioned steps 102, according to the first encryption key and the second encryption key, be-encrypted data is encrypted, can comprises the following steps:
21), target encryption key is generated according to the first encryption key and the second encryption key by preset rules;
22) this target encryption key, is used to be encrypted be-encrypted data.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and after the second encryption key of association encrypting user input, first can generate target encryption key according to the first encryption key and the second encryption key by preset rules, then use this target encryption key to be encrypted be-encrypted data.
Wherein, preset rules can be preset algorithm, as hash algorithm, XOR algorithm, also can be the process operation preset the first encryption key and the second encryption key, as being fixed the interpolation etc. of position
For example, suppose that the first encryption key and the second encryption key are finger print information (being assumed to be the first finger print information and the second finger print information), user terminal gets the first finger print information, and second after finger print information, respectively the first finger print information and the second finger print information can be treated to corresponding string of binary characters, and XOR calculating is carried out to the first finger print information and string of binary characters corresponding to the second finger print information, using the result that obtains as target encryption key, be-encrypted data is encrypted.
Again for example, suppose that the first encryption key and the second encryption key are finger print information (being assumed to be the first finger print information and the second finger print information), user terminal gets the first finger print information, and second after finger print information, first finger print information and the second finger print information can be treated to corresponding string of binary characters, and the first finger print information and string of binary characters corresponding to the second finger print information are fixed the interpolation of position, using the result that obtains as target encryption key, be-encrypted data is encrypted.
Visible, in the method flow described by Fig. 1, by obtaining the first encryption key of terminal user's input, and the second encryption key of association encrypting user input, and according to the first encryption key and the second encryption key, be-encrypted data is encrypted, compared with the mode by single encryption key, be-encrypted data is encrypted in prior art, improve the security of data.
Refer to Fig. 2, the schematic flow sheet of Fig. 2 another kind of data ciphering method disclosed in the embodiment of the present invention, as shown in Figure 2, this data ciphering method can comprise:
The CIPHERING REQUEST that S201, receiving terminal user input for be-encrypted data.
In the embodiment of the present invention, when terminal user needs to be encrypted the data in user terminal, terminal user can to the CIPHERING REQUEST of user terminal input for be-encrypted data.
For example, pc user by clicking file destination in PC or file by mouse right button, and can select " encryption " option in right-click menu option, inputs the CIPHERING REQUEST for this file destination or file to PC.
Again for example, cellphone subscriber can by the long file destination that press in mobile phone of finger or file, and selects " encryption " option in the function choosing-item ejected at mobile phone, inputs the CIPHERING REQUEST for this file destination or file to mobile phone.
S202, respond this CIPHERING REQUEST, export the first information, this first information is for pointing out input first encryption key.
In the embodiment of the present invention, after user terminal receives the CIPHERING REQUEST that terminal user inputs for be-encrypted data, this CIPHERING REQUEST can being responded, exporting the information (the first information) for pointing out input encryption key (the first encryption key).
Wherein, can comprise territory, key-entering section in this first information, as Password Input frame, fingerprint input area etc., terminal user can input encryption key by this territory, key-entering section to user terminal.
S203, acquisition terminal user respond the first encryption key of the first information input.
S204, export the second information, this second information is used for prompting and is confirmed whether that carrying out association to be-encrypted data encrypts.
In the embodiment of the present invention, user terminal receive terminal user respond first information input the first encryption key after, can export for point out be confirmed whether to be-encrypted data carry out associate encryption information (the second information).
After terminal user views this second information, can select according to demand to carry out association encryption to be-encrypted data, or association encryption not carried out to be-encrypted data.
As the optional embodiment of one, in above-mentioned steps S204, before exporting the second information, can also comprise the following steps:
31) priority of be-encrypted data, is obtained;
32), according to the priority of be-encrypted data whether higher than pre-set priority; If be judged as YES, go to step 33); Otherwise, go to step 34);
33), associated key request message is sent to the associated terminal that associated user is corresponding;
34), the step performing output second information is determined.
In this embodiment, can in advance for the data definition priority stored in user terminal, and be arranged on when carrying out data encryption, need the priority (pre-set priority) of carrying out the data associating encryption, priority higher than the data of this pre-set priority when being encrypted, need to carry out association encryption, when priority is encrypted less than or equal to the data of this priority, can be confirmed whether that needs carry out association encryption by user; Wherein, this priority can by User Defined, also can by system according to dtd-data type definition.
Correspondingly, after user terminal receives the CIPHERING REQUEST for be-encrypted data of terminal user's input, user terminal can input the first encryption key by warning terminal user on the one hand, on the other hand, the priority of this be-encrypted data can be obtained, and judge that whether the priority of this be-encrypted data is higher than pre-set priority, if higher than, then user terminal sends associated key request message directly to the associated terminal that association encrypting user is corresponding; Otherwise user terminal exports the second information, be confirmed whether to carry out association encryption to be-encrypted data with warning terminal user.
It should be noted that, the above-mentioned priority according to be-encrypted data determines whether directly to carry out associating the concrete example of one that the embodiment encrypted is only the priority determination data encryption strategy according to be-encrypted data to be-encrypted data, and be not limiting the scope of the present invention, in embodiments of the present invention, priority determination data encryption strategy according to be-encrypted data also comprises other implementation, such as, when the priority of be-encrypted data is higher than pre-set priority, need to be confirmed whether that carrying out association encrypts by terminal user, and when the priority of be-encrypted data is less than or equal to pre-set priority, then directly determine not need to carry out association encryption to be-encrypted data, its specific strategy will not enumerate at this.
S205, when the confirmation receiving the input of response second information treat enciphered data carry out the instruction associating encryption time, send associated key request message to associated terminal corresponding to association encrypting user.
In the embodiment of the present invention, when user terminal receive response second information input confirmation treat enciphered data carry out associate encryption instruction time, terminal user can send associated key request message to the associated terminal that association encrypting user is corresponding, to ask association encrypting user input associate encryption keys.
At the optional embodiment of one, association encrypting user can preset and store in the user terminal.Concrete, terminal user can pre-determine the user ID of association encrypting user, as phone number, QQ account, micro-letter account etc., and carries out relative set in the user terminal.When user terminal receive terminal user respond second information input confirmation treat enciphered data carry out associate encryption instruction time, user terminal can the relevant setting of reading terminals user, obtain the user ID of association encrypting user, and send associated key request message according to the user ID of this association encrypting user to the associated terminal that association encrypting user is corresponding.
As the optional embodiment of another kind, association encrypting user can be selected in real time by user.Concrete, when user terminal receive terminal user respond second information input confirmation treat enciphered data carry out associate encryption instruction time, user can be pointed out to input or select to associate the user ID of encrypting user, and the user ID of the association encrypting user inputting according to terminal user or select send associated key request message to the associated terminal that association encrypting user is corresponding.
In the embodiment of the present invention, after associated terminal receives associated key request message, information can be exported, prompting association encrypting user input encryption key, and the encryption key (the second encryption key) of association encrypting user input is carried in associated key response message and sends to user terminal.
In the embodiment of the present invention, when user terminal receive terminal user respond second information input confirmation not to be-encrypted data carry out associate encryption instruction time, user terminal is directly encrypted be-encrypted data according to the first encryption key, and its specific implementation does not repeat them here.
S206, receive the associated key response message that associated terminal sends, and obtain the second encryption key that this associated key response message comprises.
In the embodiment of the present invention, when user terminal receives the associated key response message of associated terminal transmission, the second encryption key that this associated key response message comprises can be obtained.
In the embodiment of the present invention, in order to improve the security of encryption key itself, when associated terminal sends associated key response message to user terminal, can by terminal user with associate the cipher mode that encrypting user both sides consult and be encrypted encryption key, and the second encryption key after encryption is carried in associated key response message and sends to user terminal.After user terminal receives this associated key response message, the second encryption key after the encryption of wherein carrying can be obtained, and the second encryption key after this encryption is decrypted, to obtain the second encryption key according to the cipher mode that both sides consult.
S207, according to the first encryption key and the second encryption key, be-encrypted data to be encrypted.
In the embodiment of the present invention, in the embodiment of the present invention, get first encryption key of terminal user, and after the second encryption key of association encrypting user, can be encrypted be-encrypted data according to this first encryption key and the second encryption key, to improve data security.
As the optional embodiment of one, in above-mentioned steps 207, according to the first encryption key and the second encryption key, be-encrypted data is encrypted, can comprises the following steps:
41), use the first encryption key to be encrypted be-encrypted data, obtain the first enciphered data;
42) the second encryption key, is used to be encrypted the first enciphered data.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and after the second encryption key of association encrypting user input, the first encryption key and the second encryption key can be used respectively to be encrypted be-encrypted data.
Alternatively, the first encryption key first can be used to be encrypted be-encrypted data, to obtain the enciphered data (the first enciphered data) after encrypting, and then use the second encryption key to be encrypted the first enciphered data; Also the second encryption key first can be used to be encrypted be-encrypted data, to obtain the enciphered data after encrypting, and then to use the first encryption key to be encrypted the enciphered data after encryption.
It should be noted that, in embodiments of the present invention, when associating encrypting user and having multiple, second encryption key also has multiple, now, each encryption key (the first encryption key and multiple second encryption key) does not limit the order embodiment of the present invention that be-encrypted data is encrypted.
As the optional embodiment of another kind, in above-mentioned steps 207, according to the first encryption key and the second encryption key, be-encrypted data is encrypted, can comprises the following steps:
51), target encryption key is generated according to the first encryption key and the second encryption key by preset rules;
52) this target encryption key, is used to be encrypted be-encrypted data.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and after the second encryption key of association encrypting user input, first can generate target encryption key according to the first encryption key and the second encryption key by preset rules, then use this target encryption key to be encrypted be-encrypted data.
Wherein, preset rules can be preset algorithm, as hash algorithm, XOR algorithm, also can be the process operation preset the first encryption key and the second encryption key, as being fixed the interpolation etc. of position
For example, suppose that the first encryption key and the second encryption key are finger print information (being assumed to be the first finger print information and the second finger print information), user terminal gets the first finger print information, and second after finger print information, respectively the first finger print information and the second finger print information can be treated to corresponding string of binary characters, and XOR calculating is carried out to the first finger print information and string of binary characters corresponding to the second finger print information, using the result that obtains as target encryption key, be-encrypted data is encrypted.
Again for example, suppose that the first encryption key and the second encryption key are finger print information (being assumed to be the first finger print information and the second finger print information), user terminal gets the first finger print information, and second after finger print information, first finger print information and the second finger print information can be treated to corresponding string of binary characters, and the first finger print information and string of binary characters corresponding to the second finger print information are fixed the interpolation of position, using the result that obtains as target encryption key, be-encrypted data is encrypted.
Refer to Fig. 3, the schematic flow sheet of Fig. 3 another kind of data ciphering method disclosed in the embodiment of the present invention, as shown in Figure 3, this data ciphering method can comprise:
The CIPHERING REQUEST that S301, receiving terminal user input for be-encrypted data.
In the embodiment of the present invention, when terminal user needs to be encrypted the data in user terminal, terminal user can to the CIPHERING REQUEST of user terminal input for be-encrypted data.
For example, pc user by clicking file destination in PC or file by mouse right button, and can select " encryption " option in right-click menu option, inputs the CIPHERING REQUEST for this file destination or file to PC.
Again for example, cellphone subscriber can by the long file destination that press in mobile phone of finger or file, and selects " encryption " option in the function choosing-item ejected at mobile phone, inputs the CIPHERING REQUEST for this file destination or file to mobile phone.
S302, respond this CIPHERING REQUEST, export the first information, this first information for pointing out input first encryption key, and is confirmed whether to carry out association encryption to be-encrypted data.
In the embodiment of the present invention, after user terminal receives the CIPHERING REQUEST that terminal user inputs for be-encrypted data, this CIPHERING REQUEST can be responded, export information (the first information), this first information for pointing out input encryption key (the first encryption key), and is confirmed whether to carry out association encryption to be-encrypted data.
Terminal user can input encryption key after viewing this first information, and selects according to demand to carry out association encryption to be-encrypted data, or does not carry out association encryption to be-encrypted data.
As the optional embodiment of one, in embodiments of the present invention, after user terminal receives the CIPHERING REQUEST that terminal user inputs for be-encrypted data, the priority of this be-encrypted data can be obtained, and judge that whether the priority of this be-encrypted data is higher than pre-set priority, if higher than, user terminal can export the first information described in step 302; Otherwise user terminal can be determined not need to carry out association encryption to be-encrypted data, and user terminal only can export the information for warning terminal user input encryption key, and does not need prompting user to be confirmed whether to carry out association encryption to be-encrypted data.
S303, acquisition terminal user respond the first encryption key of the first information input, and when the confirmation receiving terminal user and respond the first information input treat enciphered data carry out the instruction associating encryption time, send associated key request message to associated terminal corresponding to association encrypting user.
In the embodiment of the present invention, in the embodiment of the present invention, when user terminal receive response first information input confirmation treat enciphered data carry out associate encryption instruction time, terminal user can send associated key request message to the associated terminal that association encrypting user is corresponding, to ask association encrypting user input associate encryption keys.
At the optional embodiment of one, association encrypting user can preset and store in the user terminal.Concrete, terminal user can pre-determine the user ID of association encrypting user, as phone number, QQ account, micro-letter account etc., and carries out relative set in the user terminal.When user terminal receive terminal user respond first information input confirmation treat enciphered data carry out associate encryption instruction time, user terminal can the relevant setting of reading terminals user, obtain the user ID of association encrypting user, and send associated key request message according to the user ID of this association encrypting user to the associated terminal that association encrypting user is corresponding.
As the optional embodiment of another kind, association encrypting user can be selected in real time by user.Concrete, when user terminal receive terminal user respond second information input confirmation treat enciphered data carry out associate encryption instruction time, user can be pointed out to input or select to associate the user ID of encrypting user, and the user ID of the association encrypting user inputting according to terminal user or select send associated key request message to the associated terminal that association encrypting user is corresponding.
In the embodiment of the present invention, after associated terminal receives associated key request message, information can be exported, prompting association encrypting user input encryption key, and the encryption key (the second encryption key) of association encrypting user input is carried in associated key response message and sends to user terminal.
In the embodiment of the present invention, when user terminal receive terminal user respond second information input confirmation not to be-encrypted data carry out associate encryption instruction time, user terminal is directly encrypted be-encrypted data according to the first encryption key, and its specific implementation does not repeat them here.
S304, receive the associated key response message that associated terminal sends, and obtain the second encryption key that this associated key response message comprises.
In the embodiment of the present invention, when user terminal receives the associated key response message of associated terminal transmission, the second encryption key that this associated key response message comprises can be obtained.
In the embodiment of the present invention, in order to improve the security of encryption key itself, when associated terminal sends associated key response message to user terminal, can by terminal user with associate the cipher mode that encrypting user both sides consult and be encrypted encryption key, and the second encryption key after encryption is carried in associated key response message and sends to user terminal.After user terminal receives this associated key response message, the second encryption key after the encryption of wherein carrying can be obtained, and the second encryption key after this encryption is decrypted, to obtain the second encryption key according to the cipher mode that both sides consult.
S305, according to the first encryption key and the second encryption key, be-encrypted data to be encrypted.
In the embodiment of the present invention, in the embodiment of the present invention, get first encryption key of terminal user, and after the second encryption key of association encrypting user, can be encrypted be-encrypted data according to this first encryption key and the second encryption key, to improve data security.
As the optional embodiment of one, in above-mentioned steps 305, according to the first encryption key and the second encryption key, be-encrypted data is encrypted, can comprises the following steps:
51), use the first encryption key to be encrypted be-encrypted data, obtain the first enciphered data;
52) the second encryption key, is used to be encrypted the first enciphered data.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and after the second encryption key of association encrypting user input, the first encryption key and the second encryption key can be used respectively to be encrypted be-encrypted data.
Alternatively, the first encryption key first can be used to be encrypted be-encrypted data, to obtain the enciphered data (the first enciphered data) after encrypting, and then use the second encryption key to be encrypted the first enciphered data; Also the second encryption key first can be used to be encrypted be-encrypted data, to obtain the enciphered data after encrypting, and then to use the first encryption key to be encrypted the enciphered data after encryption.
It should be noted that, in embodiments of the present invention, when associating encrypting user and having multiple, second encryption key also has multiple, now, each encryption key (the first encryption key and multiple second encryption key) does not limit the order embodiment of the present invention that be-encrypted data is encrypted.
As the optional embodiment of another kind, in above-mentioned steps 305, according to the first encryption key and the second encryption key, be-encrypted data is encrypted, can comprises the following steps:
61), target encryption key is generated according to the first encryption key and the second encryption key by preset rules;
62) this target encryption key, is used to be encrypted be-encrypted data.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and after the second encryption key of association encrypting user input, first can generate target encryption key according to the first encryption key and the second encryption key by preset rules, then use this target encryption key to be encrypted be-encrypted data.
Wherein, preset rules can be preset algorithm, as hash algorithm, XOR algorithm, also can be the process operation preset the first encryption key and the second encryption key, as being fixed the interpolation etc. of position
For example, suppose that the first encryption key and the second encryption key are finger print information (being assumed to be the first finger print information and the second finger print information), user terminal gets the first finger print information, and second after finger print information, respectively the first finger print information and the second finger print information can be treated to corresponding string of binary characters, and XOR calculating is carried out to the first finger print information and string of binary characters corresponding to the second finger print information, using the result that obtains as target encryption key, be-encrypted data is encrypted.
Again for example, suppose that the first encryption key and the second encryption key are finger print information (being assumed to be the first finger print information and the second finger print information), user terminal gets the first finger print information, and second after finger print information, first finger print information and the second finger print information can be treated to corresponding string of binary characters, and the first finger print information and string of binary characters corresponding to the second finger print information are fixed the interpolation of position, using the result that obtains as target encryption key, be-encrypted data is encrypted.
Further, in the embodiment of the present invention, when terminal user needs the decrypt data after to encryption, also the first encryption key obtaining terminal user's input is respectively needed, and the second encryption key of association encrypting user input, and according to this first encryption key and the second encryption key to the decrypt data after encryption, its specific implementation is comparatively close with the implementation be encrypted be-encrypted data, can be understood as the inverse process of encryption, the embodiment of the present invention repeats no more its specific implementation.
By describing above and can finding out, in embodiments of the present invention, by obtaining the first encryption key of terminal user's input, and the second encryption key of association encrypting user input, and according to the first encryption key and the second encryption key, be-encrypted data is encrypted, compared with the mode be encrypted by single double secret key be-encrypted data in prior art, improve the security of data.
Be apparatus of the present invention embodiment below, apparatus of the present invention embodiment and the inventive method embodiment belong to same design, for performing the method described in the inventive method embodiment.For convenience of explanation, apparatus of the present invention embodiment only illustrates the part relevant to apparatus of the present invention embodiment, and concrete ins and outs do not disclose, and please refer to the description of the inventive method embodiment, repeats no longer one by one herein.
Refer to Fig. 4, a kind of structural representation of data encryption device disclosed in the embodiment of the present invention, this data encryption device can be applied to the user terminal in said method embodiment.As shown in Figure 4, the device of this data encryption can comprise:
Acquisition module 401, for obtaining the first encryption key of terminal user's input, and the second encryption key of association encrypting user input;
Encrypting module 402, for being encrypted be-encrypted data according to described first encryption key and described second encryption key.
See also Fig. 5, the structural representation of the another kind of data encryption device that Fig. 5 provides for the embodiment of the present invention, data encryption device shown in Fig. 5 is that data encryption device is as shown in Figure 4 optimized and obtains, compared with the data encryption device shown in Fig. 4, the data encryption device shown in Fig. 5 can also comprise:
Receiver module 403, for the CIPHERING REQUEST that receiving terminal user inputs for be-encrypted data;
Output module 404, for responding described CIPHERING REQUEST, exports the first information, and described first information is for pointing out input first encryption key.
In a kind of embodiment, described acquisition module 401, can respond the first encryption key of described first information input specifically for obtaining terminal user;
Described output module 404, can also be used for exporting the second information, and described second information is used for prompting and is confirmed whether to carry out association encryption to described be-encrypted data;
Correspondingly, see also Fig. 6, the structural representation of the another kind of data encryption device that Fig. 6 provides for the embodiment of the present invention, data encryption device shown in Fig. 6 is that data encryption device is as shown in Figure 5 optimized and obtains, compared with the data encryption device shown in Fig. 5, the data encryption device shown in Fig. 6 can also comprise:
First sending module 405, when confirmation for receiving the described second information input of response when described receiver module 403 carries out to described be-encrypted data the instruction associating encryption, the associated terminal corresponding to association encrypting user sends associated key request message;
Described receiver module 403, can also be used for the associated key response message receiving the transmission of described associated terminal;
Shown acquisition module, specifically for obtaining the second encryption key that described associated key response message comprises.
Alternatively, described acquisition module 401, can also be used for the priority obtaining described be-encrypted data;
Correspondingly, the data encryption device shown in Fig. 6 can also comprise:
Judge module 406, for judging that whether the priority of described be-encrypted data is higher than pre-set priority;
Described first sending module 405, also for when described judge module 406 is judged as YES, the associated terminal corresponding to association encrypting user sends associated key request message;
Described output module 404, specifically for when described judge module 406 is judged as NO, exports the second information.
In another kind of embodiment, described first information can also be used for prompting be confirmed whether described to be-encrypted data carry out association encryption;
Correspondingly, described acquisition module, responds the CIPHERING REQUEST of described first information input specifically for obtaining terminal user;
See also Fig. 7, the structural representation of the another kind of data encryption device that Fig. 7 provides for the embodiment of the present invention, data encryption device shown in Fig. 7 is that data encryption device is as shown in Figure 5 optimized and obtains, compared with the data encryption device shown in Fig. 5, the data encryption device shown in Fig. 7 can also comprise:
Second sending module 407, when described receiver module 403 receive confirmation that terminal user responds described first information input the instruction associating encryption is carried out to described be-encrypted data time, send associated key request message to associated terminal corresponding to association encrypting user;
Described receiver module 403, can also be used for receiving the associated key response message that described associated terminal sends, and obtains the second encryption key that described associated key response message comprises.
In a kind of embodiment, described encrypting module 402, can be encrypted described be-encrypted data specifically for using described first encryption key, to obtain the first enciphered data; Described second encryption key is used to be encrypted described first enciphered data.
In another kind of embodiment, described encrypting module 402, can specifically for generating target encryption key according to described first encryption key and described second encryption key by preset rules; Described target encryption key is used to be encrypted described be-encrypted data.
In an alternative embodiment, described first encryption key comprises: the combination of one or more in password, finger print information, iris information and voiceprint; Or/and,
Described second encryption key comprises: the combination of one or more in password, finger print information, iris information and voiceprint.
In the description of this instructions, specific features, structure, material or feature that the description of reference term " embodiment ", " some embodiments ", " example ", " concrete example " or " some examples " etc. means to describe in conjunction with this embodiment or example are contained at least one embodiment of the present invention or example.In this manual, not necessarily must for identical embodiment or example to the schematic representation of above-mentioned term.And the specific features of description, structure, material or feature can combine in one or more embodiment in office or example in an appropriate manner.In addition, when not conflicting, the feature of the different embodiment described in this instructions or example and different embodiment or example can carry out combining and combining by those skilled in the art.
The feature of the different embodiment described in this instructions and different embodiment can carry out combining and combining by those skilled in the art.Module in all embodiments of the present invention or unit, universal integrated circuit can be passed through, such as CPU (Central Processing Unit, central processing unit), or realized by ASIC (ApplicationSpecific Integrated Circuit, special IC).
Step in all embodiment methods of the present invention can be carried out order according to actual needs and be adjusted, merges and delete; Module in all embodiment device of the present invention or unit can carry out merging, divide and deleting according to actual needs.
Describe and can be understood in process flow diagram or in this any process otherwise described or method, represent and comprise one or more for realizing the module of the code of the executable instruction of the step of specific logical function or process, fragment or part, and the scope of the preferred embodiment of the present invention comprises other realization, wherein can not according to order that is shown or that discuss, comprise according to involved function by the mode while of basic or by contrary order, carry out n-back test, this should understand by embodiments of the invention person of ordinary skill in the field.
In flow charts represent or in this logic otherwise described and/or step, such as, the sequencing list of the executable instruction for realizing logic function can be considered to, may be embodied in any computer-readable medium, for instruction execution system, device or equipment (as computer based system, comprise the system of processor or other can from instruction execution system, device or equipment instruction fetch and perform the system of instruction) use, or to use in conjunction with these instruction execution systems, device or equipment.With regard to this instructions, " computer-readable medium " can be anyly can to comprise, store, communicate, propagate or transmission procedure for instruction execution system, device or equipment or the device that uses in conjunction with these instruction execution systems, device or equipment.The example more specifically (non-exhaustive list) of computer-readable medium comprises following: the electrical connection section (electronic installation) with one or more wiring, portable computer diskette box (magnetic device), random access memory (RAM), ROM (read-only memory) (ROM), erasablely edit ROM (read-only memory) (EPROM or flash memory), fiber device, and portable optic disk ROM (read-only memory) (CDROM).In addition, computer-readable medium can be even paper or other suitable media that can print described program thereon, because can such as by carrying out optical scanning to paper or other media, then carry out editing, decipher or carry out process with other suitable methods if desired and electronically obtain described program, be then stored in computer memory.
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries is that the hardware that can carry out instruction relevant by program completes, described program can be stored in a kind of computer-readable recording medium, this program perform time, step comprising embodiment of the method one or a combination set of.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, also can be that the independent physics of unit exists, also can be integrated in a module by two or more unit.Above-mentioned integrated module both can adopt the form of hardware to realize, and the form of software function module also can be adopted to realize.If described integrated module using the form of software function module realize and as independently production marketing or use time, also can be stored in a computer read/write memory medium.
The above-mentioned storage medium mentioned can be ROM (read-only memory), disk or CD etc.Although illustrate and describe embodiments of the invention above, be understandable that, above-described embodiment is exemplary, can not be interpreted as limitation of the present invention, and those of ordinary skill in the art can change above-described embodiment within the scope of the invention, revises, replace and modification.
Above disclosedly be only preferred embodiment of the present invention, certainly the interest field of the present invention can not be limited with this, one of ordinary skill in the art will appreciate that all or part of flow process realizing above-described embodiment, and according to the equivalent variations that the claims in the present invention are done, still belong to the scope that invention is contained.

Claims (16)

1. a data ciphering method, is characterized in that, comprising:
Obtain the first encryption key of terminal user's input, and the second encryption key of association encrypting user input;
According to described first encryption key and described second encryption key, be-encrypted data is encrypted.
2. method according to claim 1, is characterized in that, the first encryption key of described acquisition terminal user input, and before the second encryption key of described association encrypting user input, also comprises:
The CIPHERING REQUEST that receiving terminal user inputs for be-encrypted data;
Respond described CIPHERING REQUEST, export the first information, described first information is for pointing out input first encryption key.
3. method according to claim 2, is characterized in that, the first encryption key of described acquisition terminal user input, and the second encryption key of described association encrypting user input, comprising:
Obtain the first encryption key that terminal user responds described first information input;
Export the second information, described second information is used for prompting and is confirmed whether to carry out association encryption to described be-encrypted data;
When the confirmation receiving the described second information input of response carries out to described be-encrypted data the instruction associating encryption, the associated terminal corresponding to association encrypting user sends associated key request message;
Receive the associated key response message that described associated terminal sends, and obtain the second encryption key that described associated key response message comprises.
4. method according to claim 3, is characterized in that, before described output second information, also comprises:
Obtain the priority of described be-encrypted data;
Judge that whether the priority of described be-encrypted data is higher than pre-set priority;
If higher than, the associated terminal corresponding to association encrypting user sends associated key request message;
Otherwise, determine the step performing described output second information.
5. method according to claim 2, is characterized in that, described first information also for prompting be confirmed whether described to be-encrypted data carry out association encrypt;
First encryption key of described acquisition terminal user input, and the second encryption key of described association encrypting user input, comprising:
Obtain the first encryption key that terminal user responds described first information input, and when the confirmation receiving terminal user and respond described first information input carries out to described be-encrypted data the instruction associating encryption, send associated key request message to associated terminal corresponding to association encrypting user;
Receive the associated key response message that described associated terminal sends, and obtain the second encryption key that described associated key response message comprises.
6. the method according to any one of claim 1-5, is characterized in that, is describedly encrypted be-encrypted data according to described first encryption key and described second encryption key, comprising:
Described first encryption key is used to be encrypted described be-encrypted data, to obtain the first enciphered data;
Described second encryption key is used to be encrypted described first enciphered data.
7. the method according to any one of claim 1-5, is characterized in that, is describedly encrypted be-encrypted data according to described first encryption key and described second encryption key, comprising:
Target encryption key is generated by preset rules according to described first encryption key and described second encryption key;
Described target encryption key is used to be encrypted described be-encrypted data.
8. the method according to any one of claim 1-5, is characterized in that,
Described first encryption key comprises: the combination of one or more in password, finger print information, iris information and voiceprint; Or/and,
Described second encryption key comprises: the combination of one or more in password, finger print information, iris information and voiceprint.
9. a data encryption device, is characterized in that, comprising:
Acquisition module, for obtaining the first encryption key of terminal user's input, and the second encryption key of association encrypting user input;
Encrypting module, for being encrypted be-encrypted data according to described first encryption key and described second encryption key.
10. device according to claim 9, is characterized in that, also comprises:
Receiver module, for the CIPHERING REQUEST that receiving terminal user inputs for be-encrypted data;
Output module, for responding described CIPHERING REQUEST, exports the first information, and described first information is for pointing out input first encryption key.
11. devices according to claim 10, is characterized in that,
Described acquisition module, responds the first encryption key of described first information input specifically for obtaining terminal user;
Described output module, also for exporting the second information, described second information is used for prompting and is confirmed whether to carry out association encryption to described be-encrypted data;
Described device also comprises:
First sending module, when the confirmation for receiving the described second information input of response when described receiver module carries out to described be-encrypted data the instruction associating encryption, the associated terminal corresponding to association encrypting user sends associated key request message;
Described receiver module, also for receiving the associated key response message that described associated terminal sends;
Shown acquisition module, specifically for obtaining the second encryption key that described associated key response message comprises.
12. devices according to claim 11, is characterized in that,
Described acquisition module, also for obtaining the priority of described be-encrypted data;
Described device also comprises:
Judge module, for judging that whether the priority of described be-encrypted data is higher than pre-set priority;
Described first sending module, also for when described judge module is judged as YES, the associated terminal corresponding to association encrypting user sends associated key request message;
Described output module, specifically for when described judge module is judged as NO, exports the second information.
13. devices according to claim 10, is characterized in that, described first information also for prompting be confirmed whether described to be-encrypted data carry out association encrypt;
Described acquisition module, responds the CIPHERING REQUEST of described first information input specifically for obtaining terminal user;
Described device also comprises:
Second sending module, when described receiver module receive confirmation that terminal user responds described first information input the instruction associating encryption is carried out to described be-encrypted data time, send associated key request message to associated terminal corresponding to association encrypting user;
Described receiver module, also for receiving the associated key response message that described associated terminal sends, and obtains the second encryption key that described associated key response message comprises.
14. devices according to any one of claim 9-13, is characterized in that,
Described encrypting module, specifically for using described first encryption key to be encrypted described be-encrypted data, to obtain the first enciphered data; Described second encryption key is used to be encrypted described first enciphered data.
15. devices according to any one of claim 9-13, is characterized in that,
Described encrypting module, specifically for generating target encryption key according to described first encryption key and described second encryption key by preset rules; Described target encryption key is used to be encrypted described be-encrypted data.
16. devices according to any one of claim 9-13, is characterized in that,
Described first encryption key comprises: the combination of one or more in password, finger print information, iris information and voiceprint; Or/and,
Described second encryption key comprises: the combination of one or more in password, finger print information, iris information and voiceprint.
CN201510412135.3A 2015-07-14 2015-07-14 A kind of data ciphering method and device Expired - Fee Related CN105022965B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510412135.3A CN105022965B (en) 2015-07-14 2015-07-14 A kind of data ciphering method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510412135.3A CN105022965B (en) 2015-07-14 2015-07-14 A kind of data ciphering method and device

Publications (2)

Publication Number Publication Date
CN105022965A true CN105022965A (en) 2015-11-04
CN105022965B CN105022965B (en) 2019-09-06

Family

ID=54412927

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510412135.3A Expired - Fee Related CN105022965B (en) 2015-07-14 2015-07-14 A kind of data ciphering method and device

Country Status (1)

Country Link
CN (1) CN105022965B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105809008A (en) * 2016-04-21 2016-07-27 惠州Tcl移动通信有限公司 Mobile terminal content encryption method and system based on irises
CN105913533A (en) * 2016-06-25 2016-08-31 浙江中烟工业有限责任公司 Intelligent door safety control method and intelligent door safety control system
CN106067875A (en) * 2016-05-24 2016-11-02 珠海市魅族科技有限公司 Intelligent terminal's encryption method and system
CN109005151A (en) * 2018-06-13 2018-12-14 四川斐讯信息技术有限公司 A kind of encryption of information, decryption processing method and processing terminal

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110051931A1 (en) * 2009-08-31 2011-03-03 Apple Inc. Encryption method and apparatus using composition of ciphers
CN102932349A (en) * 2012-10-31 2013-02-13 成都主导软件技术有限公司 Data transmission method, device and system
CN103118363A (en) * 2011-11-17 2013-05-22 中国电信股份有限公司 Method, system, terminal device and platform device of secret information transmission
CN103248477A (en) * 2013-04-27 2013-08-14 深圳创维-Rgb电子有限公司 Dynamic encryption method and device
CN103761486A (en) * 2013-12-02 2014-04-30 苗立地 Electronic file encryption method and device
CN104144411A (en) * 2013-05-08 2014-11-12 中兴通讯股份有限公司 Encryption and decryption terminal and encryption and decryption method applied to encryption terminal and decryption terminal
CN104468496A (en) * 2013-09-13 2015-03-25 株式会社日立制作所 Method, information service system and program for information encryption/decryption
CN104660589A (en) * 2015-01-20 2015-05-27 中兴通讯股份有限公司 Method and system for controlling encryption of information and analyzing information as well as terminal
US20150178507A1 (en) * 2013-07-10 2015-06-25 Martin Haerterich Optimal Re-Encryption Strategy for Joins in Encrypted Databases

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110051931A1 (en) * 2009-08-31 2011-03-03 Apple Inc. Encryption method and apparatus using composition of ciphers
CN103118363A (en) * 2011-11-17 2013-05-22 中国电信股份有限公司 Method, system, terminal device and platform device of secret information transmission
CN102932349A (en) * 2012-10-31 2013-02-13 成都主导软件技术有限公司 Data transmission method, device and system
CN103248477A (en) * 2013-04-27 2013-08-14 深圳创维-Rgb电子有限公司 Dynamic encryption method and device
CN104144411A (en) * 2013-05-08 2014-11-12 中兴通讯股份有限公司 Encryption and decryption terminal and encryption and decryption method applied to encryption terminal and decryption terminal
US20150178507A1 (en) * 2013-07-10 2015-06-25 Martin Haerterich Optimal Re-Encryption Strategy for Joins in Encrypted Databases
CN104468496A (en) * 2013-09-13 2015-03-25 株式会社日立制作所 Method, information service system and program for information encryption/decryption
CN103761486A (en) * 2013-12-02 2014-04-30 苗立地 Electronic file encryption method and device
CN104660589A (en) * 2015-01-20 2015-05-27 中兴通讯股份有限公司 Method and system for controlling encryption of information and analyzing information as well as terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵泽茂等: "《信息安全技术》", 28 February 2009, 西安电子科技大学出版社 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105809008A (en) * 2016-04-21 2016-07-27 惠州Tcl移动通信有限公司 Mobile terminal content encryption method and system based on irises
CN105809008B (en) * 2016-04-21 2019-06-04 惠州Tcl移动通信有限公司 A kind of mobile terminal content locking and unlocking method and system based on iris
CN106067875A (en) * 2016-05-24 2016-11-02 珠海市魅族科技有限公司 Intelligent terminal's encryption method and system
CN105913533A (en) * 2016-06-25 2016-08-31 浙江中烟工业有限责任公司 Intelligent door safety control method and intelligent door safety control system
CN109005151A (en) * 2018-06-13 2018-12-14 四川斐讯信息技术有限公司 A kind of encryption of information, decryption processing method and processing terminal

Also Published As

Publication number Publication date
CN105022965B (en) 2019-09-06

Similar Documents

Publication Publication Date Title
CN110278078B (en) Data processing method, device and system
CN102271037B (en) Based on the key protectors of online key
CN108566381A (en) A kind of security upgrading method, device, server, equipment and medium
CN104144049A (en) Encryption communication method, system and device
CN105812332A (en) Data protection method
CN107612683B (en) Encryption and decryption method, device, system, equipment and storage medium
US11140547B2 (en) Method for securely controlling smart home, and terminal device
CN112287372B (en) Method and apparatus for protecting clipboard privacy
CN104507080A (en) File processing method and terminal
WO2020155812A1 (en) Data storage method and device, and apparatus
CN110708291B (en) Data authorization access method, device, medium and electronic equipment in distributed network
CN113242134B (en) Digital certificate signing method, device, system and storage medium
CN105022965A (en) Data encryption method and apparatus
CN109687966A (en) Encryption method and its system
KR101246339B1 (en) System and method using qr code for security authentication
CN115208697A (en) Adaptive data encryption method and device based on attack behavior
CN113422679A (en) Key generation method, device and system, encryption method, electronic device and computer-readable storage medium
CN111431922A (en) Internet of things data encryption transmission method and system
CN105743860A (en) Method and device for converting characters
CN112003697B (en) Encryption and decryption method and device for cryptographic module, electronic equipment and computer storage medium
CN111953480B (en) Key generation device and method, operation key generation device and method
CN112291189B (en) Method, device, equipment and storage medium for sending and checking ciphertext
WO2017020449A1 (en) Fingerprint reading method and user equipment
CN102426635B (en) Display device for file information, display method and system
CN105430022A (en) Data input control method and terminal equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190906