CN105022965B - A kind of data ciphering method and device - Google Patents

A kind of data ciphering method and device Download PDF

Info

Publication number
CN105022965B
CN105022965B CN201510412135.3A CN201510412135A CN105022965B CN 105022965 B CN105022965 B CN 105022965B CN 201510412135 A CN201510412135 A CN 201510412135A CN 105022965 B CN105022965 B CN 105022965B
Authority
CN
China
Prior art keywords
encryption
encryption key
key
user
encrypted data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510412135.3A
Other languages
Chinese (zh)
Other versions
CN105022965A (en
Inventor
张海平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510412135.3A priority Critical patent/CN105022965B/en
Publication of CN105022965A publication Critical patent/CN105022965A/en
Application granted granted Critical
Publication of CN105022965B publication Critical patent/CN105022965B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of data ciphering method and devices, wherein this method comprises: obtaining the first encryption key of terminal user's input, and the second encryption key of association encryption user's input;Be-encrypted data is encrypted according to first encryption key and second encryption key.Using the embodiment of the present invention, Information Security can be improved.

Description

A kind of data ciphering method and device
Technical field
The present invention relates to field of communication technology more particularly to a kind of data ciphering methods and device.
Background technique
With the rapid development of communication technology, the function of user terminal more and more abundant multiplicity saves in user terminal User's private information is also more and more, in order to guarantee the safety of the user data stored in user terminal, needs to user's end The user data stored in end is encrypted.
It is usually (such as close by terminal user's setting encryption key in the currently used scheme to ciphering user data Code or finger print information) to the ciphering user data in user terminal.
However practice discovery, leakage is easy to happen by the encryption key that sole user is arranged or is stolen by others, and then is led The safety for user data of applying is on the hazard.
Summary of the invention
The embodiment of the invention discloses a kind of data ciphering method and devices, and the safety of data can be improved.
First aspect of the embodiment of the present invention discloses a kind of data ciphering method, comprising:
Obtain the first encryption key of terminal user's input, and the second encryption key of association encryption user's input;
Be-encrypted data is encrypted according to first encryption key and second encryption key.
Wherein, the of first encryption key for obtaining terminal user's input and association encryption user's input Before two encryption keys, further includes:
Receive the CIPHERING REQUEST that terminal user is directed to be-encrypted data input;
The CIPHERING REQUEST is responded, exports the first prompt information, first prompt information is for prompting input first to add Key.
Wherein, the of first encryption key for obtaining terminal user's input and association encryption user's input Two encryption keys, comprising:
Obtain the first encryption key that terminal user responds the first prompt information input;
The second prompt information is exported, second prompt information is confirmed whether to carry out the be-encrypted data for prompting Association encryption;
Encryption is associated to the be-encrypted data when receiving the confirmation for responding the second prompt information input When instruction, associated key request message is sent to the corresponding associated terminal of association encryption user;
The associated key response message that the associated terminal is sent is received, and obtains and is wrapped in the associated key response message The second encryption key included.
Wherein, before the second prompt information of the output, further includes:
Obtain the priority of the be-encrypted data;
Judge whether the priority of the be-encrypted data is higher than pre-set priority;
If being higher than, associated key request message is sent to the corresponding associated terminal of association encryption user;
Otherwise, it determines the step of executing the second prompt information of the output.
Wherein, first prompt information is also used to prompt to be confirmed whether described to be associated encryption to be-encrypted data;
Second encryption of first encryption key for obtaining terminal user's input and association encryption user's input Key, comprising:
It obtains terminal user and responds the first encryption key of the first prompt information input, and work as and receive terminal user When responding the confirmation of first prompt information input and being associated the instruction of encryption to the be-encrypted data, encrypted to association The corresponding associated terminal of user sends associated key request message;
The associated key response message that the associated terminal is sent is received, and obtains and is wrapped in the associated key response message The second encryption key included.
It is wherein, described that be-encrypted data is encrypted according to first encryption key and second encryption key, Include:
The be-encrypted data is encrypted using first encryption key, to obtain the first encryption data;
First encryption data is encrypted using second encryption key.
It is wherein, described that be-encrypted data is encrypted according to first encryption key and second encryption key, Include:
Target encryption key is generated by preset rules according to first encryption key and second encryption key;
The be-encrypted data is encrypted using the target encryption key.
Wherein, first encryption key includes: one of password, finger print information, iris information and voiceprint Or several combination;Or/and
Second encryption key includes: one or more of password, finger print information, iris information and voiceprint Combination.
Second aspect of the embodiment of the present invention discloses a kind of data encryption device, comprising:
Module is obtained, for obtaining the first encryption key of terminal user's input, and the of association encryption user's input Two encryption keys;
Encrypting module, for being added according to first encryption key and second encryption key to be-encrypted data It is close.
Wherein, further includes:
Receiving module, the CIPHERING REQUEST for being directed to be-encrypted data input for receiving terminal user;
Output module exports the first prompt information, first prompt information is for mentioning for responding the CIPHERING REQUEST Show the first encryption key of input.
Wherein, the acquisition module, respond the first prompt information input specifically for obtaining terminal user first Encryption key;
The output module, is also used to export the second prompt information, and second prompt information is confirmed whether for prompting Encryption is associated to the be-encrypted data;
Described device further include:
First sending module, for receiving the confirmation pair for responding second prompt information and inputting when the receiving module When the be-encrypted data is associated the instruction of encryption, associated key is sent to the corresponding associated terminal of association encryption user and is asked Seek message;
The receiving module is also used to receive the associated key response message that the associated terminal is sent;
Shown acquisition module, specifically for obtaining the second encryption key for including in the associated key response message.
Wherein, the acquisition module, is also used to obtain the priority of the be-encrypted data;
Described device further include:
Judgment module, for judging whether the priority of the be-encrypted data is higher than pre-set priority;
First sending module is also used to when the judgment module is judged as YES, and to association, encryption user is corresponding Associated terminal sends associated key request message;
The output module, specifically for exporting the second prompt information when the judgment module is judged as NO.
Wherein, first prompt information is also used to prompt to be confirmed whether described to be associated encryption to be-encrypted data;
The acquisition module responds the CIPHERING REQUEST of the first prompt information input specifically for obtaining terminal user;
Described device further include:
Second sending module responds the first prompt information input really when the receiving module receives terminal user Recognize when being associated the instruction of encryption to the be-encrypted data, it is close to send association to the corresponding associated terminal of association encryption user Key request message;
The receiving module is also used to receive the associated key response message that the associated terminal is sent, and described in acquisition The second encryption key for including in associated key response message.
Wherein, the encrypting module, specifically for being added using first encryption key to the be-encrypted data It is close, to obtain the first encryption data;First encryption data is encrypted using second encryption key.
Wherein, the encrypting module, specifically for being passed through according to first encryption key and second encryption key Preset rules generate target encryption key;The be-encrypted data is encrypted using the target encryption key.
Wherein, first encryption key includes: one of password, finger print information, iris information and voiceprint Or several combination;Or/and
Second encryption key includes: one or more of password, finger print information, iris information and voiceprint Combination.
The implementation of the embodiments of the present invention has the following beneficial effects:
The first encryption key inputted by obtaining terminal user, and the second encryption of association encryption user's input are close Key, and be-encrypted data is encrypted according to the first encryption key and the second encryption key, it is single with passing through in the prior art The mode that key pair be-encrypted data is encrypted is compared, and the safety of data is improved.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is a kind of flow diagram of data ciphering method provided in an embodiment of the present invention;
Fig. 2 is the flow diagram of another data ciphering method provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of another data ciphering method provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of data encryption device provided in an embodiment of the present invention;
Fig. 5 is the structural schematic diagram of another data encryption device provided in an embodiment of the present invention;
Fig. 6 is the structural schematic diagram of another data encryption device provided in an embodiment of the present invention;
Fig. 7 is the structural schematic diagram of another data encryption device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that the described embodiments are merely a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a kind of data ciphering method and devices, and Information Security can be improved.Individually below It is described in detail.
Referring to Fig. 1, Fig. 1 is a kind of flow diagram of data ciphering method disclosed by the embodiments of the present invention, such as Fig. 1 institute Show, which may include:
S101, the first encryption key for obtaining terminal user's input, and the second encryption of association encryption user's input are close Key.
In the embodiment of the present invention, the above method can be applied to user terminal, which can include but is not limited to PC (Personal Computer, personal computer), laptop, mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant) etc., for ease of description, being retouched below by user terminal of executing subject It states.
In the embodiment of the present invention, in order to improve Information Security, when needing to encrypt be-encrypted data, Ke Yiyou Multiple users' (including terminal user and one or more associations encrypt user) provide encryption key respectively, and then more according to this The encryption key that a user provides encrypts be-encrypted data.
In the embodiment of the present invention, association encryption user can be the corresponding user of the pre-set user identifier of user, It can be user when being encrypted to be-encrypted data, the corresponding user of user identifier selected in real time;Wherein, which marks Knowledge can include but is not limited to phone number, QQ account or wechat account etc..
It should be noted that terminal user is not the user for refering in particular to some fixation, and is referred in the embodiment of the present invention When being encrypted to the data in user terminal, the user of currently used user terminal.In order to make it easy to understand, of the invention real It applies in example, can be illustrated so that terminal and terminal user correspond as an example, i.e., a terminal only has a terminal user and makes With.
In the embodiment of the present invention, the first encryption key can include but is not limited to password, finger print information, iris information and The combination of one or more of voiceprint;Or/and
Second encryption key can include but is not limited to one in password, finger print information, iris information and voiceprint Kind or several combinations.
Wherein, the first encryption key and the second encryption key can be the identical encryption key of type, add for example, working as first When key is password, the second encryption key is also password;When the first encryption key is finger print information, the second encryption key For finger print information;First encryption key and the second encryption key may be the different encryption key of type, for example, when first When encryption key is password, the second encryption key is finger print information.
S102, be-encrypted data is encrypted according to the first encryption key and the second encryption key.
In the embodiment of the present invention, the first encryption key of terminal user is got, and association encrypts the second of user and adds After key, be-encrypted data can be encrypted according to first encryption key and the second encryption key, to improve number According to safety.
As an alternative embodiment, in above-mentioned steps 102, according to the first encryption key and the second encryption key pair Be-encrypted data is encrypted, and may comprise steps of:
11), be-encrypted data is encrypted using the first encryption key, obtains the first encryption data;
12), the first encryption data is encrypted using the second encryption key.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and association encryption It, can be respectively using the first encryption key and the second encryption key to number to be encrypted after second encryption key of user's input According to being encrypted.
It is alternatively possible to first be encrypted using the first encryption key to be-encrypted data, to obtain encrypted encryption Data (the first encryption data), then reuse the second encryption key and encrypt to the first encryption data;It can also first use Second encryption key encrypts be-encrypted data, and to obtain encrypted encryption data, it is close then to reuse the first encryption Key encrypts encrypted encryption data.
It should be noted that in embodiments of the present invention, when association encryption user has multiple, the second encryption key also can Have it is multiple, at this point, each encryption key (the first encryption key and multiple second encryption keys) encrypts be-encrypted data The sequence embodiment of the present invention without limitation.
As another optional embodiment, in above-mentioned steps 102, according to the first encryption key and the second encryption key Be-encrypted data is encrypted, may comprise steps of:
21) target encryption key, is generated by preset rules according to the first encryption key and the second encryption key;
22), be-encrypted data is encrypted using the target encryption key.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and association encryption It, can be first raw by preset rules according to the first encryption key and the second encryption key after second encryption key of user's input At target encryption key, then be-encrypted data is encrypted using the target encryption key.
Wherein, preset rules can be preset algorithm, such as hash algorithm, exclusive or algorithm, be also possible to close to the first encryption Key and the second encryption key carry out preset processing operation, such as the interpolation of position is fixed
As an example it is assumed that the first encryption key and the second encryption key are that finger print information (is assumed to be the first fingerprint letter Breath and the second finger print information), after user terminal gets the first finger print information and the second finger print information, can respectively by First finger print information and the processing of the second finger print information are corresponding string of binary characters, and to the first finger print information and the second fingerprint The corresponding string of binary characters of information carries out exclusive or calculating, using obtained result as target encryption key, to be-encrypted data It is encrypted.
Again as an example it is assumed that the first encryption key and the second encryption key are that finger print information (is assumed to be the first fingerprint Information and the second finger print information), it, can be by after user terminal gets the first finger print information and the second finger print information One finger print information and the processing of the second finger print information are corresponding string of binary characters, and the first finger print information and the second fingerprint are believed The interpolation that position is fixed in corresponding string of binary characters is ceased, using obtained result as target encryption key, to number to be encrypted According to being encrypted.
As it can be seen that in the method flow described in Fig. 1, the first encryption key inputted by obtaining terminal user, and Second encryption key of association encryption user's input, and according to the first encryption key and the second encryption key to be-encrypted data into Row encryption, in the prior art in such a way that single encryption key encrypts be-encrypted data compared with, improve data Safety.
Referring to Fig. 2, Fig. 2 is the flow diagram of another data ciphering method disclosed by the embodiments of the present invention, such as Fig. 2 Shown, which may include:
S201, the CIPHERING REQUEST that terminal user is directed to be-encrypted data input is received.
In the embodiment of the present invention, when terminal user needs to encrypt the data in user terminal, terminal user can To be directed to the CIPHERING REQUEST of be-encrypted data to user terminal input.
For example, pc user can be by clicking file destination or file in PC by mouse right button, and in right button dish " encryption " option is selected in radio button, to PC input for the file destination or the CIPHERING REQUEST of file.
Again for example, mobile phone user can be by the file destination or file in finger long-pressing mobile phone, and in mobile phone " encryption " option is selected in the function choosing-item of pop-up, to mobile phone input for the file destination or the CIPHERING REQUEST of file.
S202, the CIPHERING REQUEST is responded, exports the first prompt information, first prompt information is for prompting input first to add Key.
In the embodiment of the present invention, user terminal receive terminal user for be-encrypted data input CIPHERING REQUEST it Afterwards, the CIPHERING REQUEST can be responded, (first mentions for prompting the prompt information of input encryption key (the first encryption key) for output Show information).
It wherein, may include key-entering section domain in first prompt information, such as Password Input frame, fingerprint input area Encryption key can be inputted to user terminal by the key-entering section domain Deng, terminal user.
S203, the first encryption key that terminal user responds the input of the first prompt information is obtained.
S204, the second prompt information of output, second prompt information are confirmed whether to carry out be-encrypted data for prompting Association encryption.
In the embodiment of the present invention, the first encryption that user terminal receives terminal user's response the first prompt information input is close After key, prompt information (the second prompt letter for prompting to be confirmed whether to be associated be-encrypted data encryption can be exported Breath).
After terminal user views second prompt information, it can select to be associated be-encrypted data according to demand Encryption, or encryption is not associated to be-encrypted data.
As an alternative embodiment, before exporting the second prompt information, can also include in above-mentioned steps S204 Following steps:
31) priority of be-encrypted data, is obtained;
32) whether pre-set priority, is higher than according to the priority of be-encrypted data;If being judged as YES, step 33) is gone to; Otherwise, step 34) is gone to;
33), associated key request message is sent to the corresponding associated terminal of association user;
34) the step of executing the second prompt information of output, is determined.
In this embodiment, can in advance for the data definition priority stored in user terminal, and be arranged into When row data encryption, need to be associated the priority (pre-set priority) of the data of encryption, it is default preferential that priority is higher than this The data of grade need to be associated encryption when being encrypted, and priority is encrypted less than or equal to the data of the priority When, it can be confirmed whether to need to be associated encryption by user;Wherein, which can be customized by the user, can also be by System is according to dtd--data type definition.
Correspondingly, when user terminal receive terminal user input be directed to be-encrypted data CIPHERING REQUEST after, use On the one hand family terminal can input the first encryption key, on the other hand, the available be-encrypted data with warning terminal user Priority, and judge whether the priority of the be-encrypted data is higher than pre-set priority, if being higher than, user terminal is directly to pass The corresponding associated terminal of connection encryption user sends associated key request message;Otherwise, user terminal exports the second prompt information, with Warning terminal user is confirmed whether to be associated be-encrypted data encryption.
It should be noted that the above-mentioned priority according to be-encrypted data determines whether directly to close be-encrypted data The embodiment of connection encryption only determines a kind of specific example of data encryption strategy according to the priority of be-encrypted data, and It is not limiting the scope of the present invention, in embodiments of the present invention, data is determined according to the priority of be-encrypted data Encryption policy further includes other implementations, for example, needing when the priority of be-encrypted data is higher than pre-set priority by end End subscriber is confirmed whether to be associated encryption, and when the priority of be-encrypted data is less than or equal to pre-set priority, then directly It connects determination not needing to be associated be-encrypted data encryption, specific strategy will not enumerate herein.
S205, the instruction that encryption data is associated encryption is treated when the confirmation for receiving response the second prompt information input When, associated key request message is sent to the corresponding associated terminal of association encryption user.
In the embodiment of the present invention, when encryption data is treated in the confirmation that user terminal receives response the second prompt information input When being associated the instruction of encryption, terminal user can send associated key request to the corresponding associated terminal of association encryption user Message is associated with encryption user with request and inputs associate encryption keys.
In a kind of optional embodiment, association encryption user can preset and store in the user terminal.Specifically , terminal user can predefine the user identifier of association encryption user, such as phone number, QQ account, wechat account, and Accordingly it is arranged in the user terminal.When user terminal receives the confirmation pair that terminal user responds the input of the second prompt information When be-encrypted data is associated the instruction of encryption, user terminal can be obtained association and be added with the correlation setting of reading terminals user The user identifier of close user, and sent out according to the user identifier that the association encrypts user to the corresponding associated terminal of association encryption user Send associated key request message.
As another optional embodiment, association encryption user can be selected in real time by user.Specifically, working as user When terminal receives terminal user and responds the confirmation of the second prompt information input and treat encryption data and be associated the instruction of encryption, User can be prompted to input or select the user identifier of association encryption user, and the association for inputting or selecting according to terminal user adds The user identifier of close user sends associated key request message to the corresponding associated terminal of association encryption user.
In the embodiment of the present invention, after associated terminal receives associated key request message, prompt information can be exported, is mentioned Show that association encryption user inputs encryption key, and the encryption key (the second encryption key) of association encryption user's input is carried User terminal is sent in associated key response message.
In the embodiment of the present invention, when the confirmation that user terminal receives terminal user's response the second prompt information input is not right When be-encrypted data is associated the instruction of encryption, user terminal directly adds be-encrypted data according to the first encryption key Close, specific implementation repeats no more herein.
S206, the associated key response message that associated terminal is sent is received, and obtains and is wrapped in the associated key response message The second encryption key included.
In the embodiment of the present invention, when user terminal receives the associated key response message of associated terminal transmission, it can obtain Take the second encryption key for including in the associated key response message.
In the embodiment of the present invention, in order to improve the safety of encryption key itself, associated terminal sends to user terminal and closes Join key response message when, can by terminal user and be associated with encrypt user both sides negotiation cipher mode to encryption key into Row encryption, and encrypted second encryption key is carried and is sent to user terminal in associated key response message.User is whole After termination receives the associated key response message, available encrypted second encryption key wherein carried, and according to Encrypted second encryption key is decrypted in the cipher mode that both sides negotiate, to obtain the second encryption key.
S207, be-encrypted data is encrypted according to the first encryption key and the second encryption key.
In the embodiment of the present invention, in the embodiment of the present invention, the first encryption key of terminal user is got, and association adds After the second encryption key of close user, be-encrypted data can be carried out according to first encryption key and the second encryption key Encryption, to improve Information Security.
As an alternative embodiment, in above-mentioned steps 207, according to the first encryption key and the second encryption key pair Be-encrypted data is encrypted, and may comprise steps of:
41), be-encrypted data is encrypted using the first encryption key, obtains the first encryption data;
42), the first encryption data is encrypted using the second encryption key.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and association encryption It, can be respectively using the first encryption key and the second encryption key to number to be encrypted after second encryption key of user's input According to being encrypted.
It is alternatively possible to first be encrypted using the first encryption key to be-encrypted data, to obtain encrypted encryption Data (the first encryption data), then reuse the second encryption key and encrypt to the first encryption data;It can also first use Second encryption key encrypts be-encrypted data, and to obtain encrypted encryption data, it is close then to reuse the first encryption Key encrypts encrypted encryption data.
It should be noted that in embodiments of the present invention, when association encryption user has multiple, the second encryption key also can Have it is multiple, at this point, each encryption key (the first encryption key and multiple second encryption keys) encrypts be-encrypted data The sequence embodiment of the present invention without limitation.
As another optional embodiment, in above-mentioned steps 207, according to the first encryption key and the second encryption key Be-encrypted data is encrypted, may comprise steps of:
51) target encryption key, is generated by preset rules according to the first encryption key and the second encryption key;
52), be-encrypted data is encrypted using the target encryption key.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and association encryption It, can be first raw by preset rules according to the first encryption key and the second encryption key after second encryption key of user's input At target encryption key, then be-encrypted data is encrypted using the target encryption key.
Wherein, preset rules can be preset algorithm, such as hash algorithm, exclusive or algorithm, be also possible to close to the first encryption Key and the second encryption key carry out preset processing operation, such as the interpolation of position is fixed
As an example it is assumed that the first encryption key and the second encryption key are that finger print information (is assumed to be the first fingerprint letter Breath and the second finger print information), after user terminal gets the first finger print information and the second finger print information, can respectively by First finger print information and the processing of the second finger print information are corresponding string of binary characters, and to the first finger print information and the second fingerprint The corresponding string of binary characters of information carries out exclusive or calculating, using obtained result as target encryption key, to be-encrypted data It is encrypted.
Again as an example it is assumed that the first encryption key and the second encryption key are that finger print information (is assumed to be the first fingerprint Information and the second finger print information), it, can be by after user terminal gets the first finger print information and the second finger print information One finger print information and the processing of the second finger print information are corresponding string of binary characters, and the first finger print information and the second fingerprint are believed The interpolation that position is fixed in corresponding string of binary characters is ceased, using obtained result as target encryption key, to number to be encrypted According to being encrypted.
Referring to Fig. 3, Fig. 3 is the flow diagram of another data ciphering method disclosed by the embodiments of the present invention, such as Fig. 3 Shown, which may include:
S301, the CIPHERING REQUEST that terminal user is directed to be-encrypted data input is received.
In the embodiment of the present invention, when terminal user needs to encrypt the data in user terminal, terminal user can To be directed to the CIPHERING REQUEST of be-encrypted data to user terminal input.
For example, pc user can be by clicking file destination or file in PC by mouse right button, and in right button dish " encryption " option is selected in radio button, to PC input for the file destination or the CIPHERING REQUEST of file.
Again for example, mobile phone user can be by the file destination or file in finger long-pressing mobile phone, and in mobile phone " encryption " option is selected in the function choosing-item of pop-up, to mobile phone input for the file destination or the CIPHERING REQUEST of file.
S302, the CIPHERING REQUEST is responded, exports the first prompt information, first prompt information is for prompting input first to add Key, and be confirmed whether to be associated be-encrypted data encryption.
In the embodiment of the present invention, user terminal receive terminal user for be-encrypted data input CIPHERING REQUEST it Afterwards, the CIPHERING REQUEST can be responded, is exported prompt information (the first prompt information), first prompt information is for prompting input to add Key (the first encryption key), and be confirmed whether to be associated be-encrypted data encryption.
After terminal user views first prompt information, encryption key can be inputted, and selection is treated according to demand Encryption data is associated encryption, or is not associated encryption to be-encrypted data.
As an alternative embodiment, in embodiments of the present invention, user terminal receive terminal user be directed to After the CIPHERING REQUEST of encryption data input, the priority of the available be-encrypted data, and judge the be-encrypted data Whether priority is higher than pre-set priority, if being higher than, user terminal can export the first prompt information described in step 302; Otherwise, user terminal, which can determine, does not need to be associated be-encrypted data encryption, and user terminal can only be exported for mentioning Show that terminal user inputs the prompt information of encryption key, without prompting user to be confirmed whether to be associated be-encrypted data Encryption.
S303, the first encryption key that terminal user responds the input of the first prompt information is obtained, and is used when receiving terminal When the confirmation that family responds the input of the first prompt information treats encryption data and is associated the instruction of encryption, to association encryption user couple The associated terminal answered sends associated key request message.
In the embodiment of the present invention, in the embodiment of the present invention, when user terminal receives response the first prompt information input When confirmation is associated the instruction of encryption to be-encrypted data, terminal user can be to the corresponding associated terminal of association encryption user Associated key request message is sent, encryption user is associated with request and inputs associate encryption keys.
In a kind of optional embodiment, association encryption user can preset and store in the user terminal.Specifically , terminal user can predefine the user identifier of association encryption user, such as phone number, QQ account, wechat account, and Accordingly it is arranged in the user terminal.When user terminal receives the confirmation pair that terminal user responds the input of the first prompt information When be-encrypted data is associated the instruction of encryption, user terminal can be obtained association and be added with the correlation setting of reading terminals user The user identifier of close user, and sent out according to the user identifier that the association encrypts user to the corresponding associated terminal of association encryption user Send associated key request message.
As another optional embodiment, association encryption user can be selected in real time by user.Specifically, working as user When terminal receives terminal user and responds the confirmation of the second prompt information input and treat encryption data and be associated the instruction of encryption, User can be prompted to input or select the user identifier of association encryption user, and the association for inputting or selecting according to terminal user adds The user identifier of close user sends associated key request message to the corresponding associated terminal of association encryption user.
In the embodiment of the present invention, after associated terminal receives associated key request message, prompt information can be exported, is mentioned Show that association encryption user inputs encryption key, and the encryption key (the second encryption key) of association encryption user's input is carried User terminal is sent in associated key response message.
In the embodiment of the present invention, when the confirmation that user terminal receives terminal user's response the second prompt information input is not right When be-encrypted data is associated the instruction of encryption, user terminal directly adds be-encrypted data according to the first encryption key Close, specific implementation repeats no more herein.
S304, the associated key response message that associated terminal is sent is received, and obtains and is wrapped in the associated key response message The second encryption key included.
In the embodiment of the present invention, when user terminal receives the associated key response message of associated terminal transmission, it can obtain Take the second encryption key for including in the associated key response message.
In the embodiment of the present invention, in order to improve the safety of encryption key itself, associated terminal sends to user terminal and closes Join key response message when, can by terminal user and be associated with encrypt user both sides negotiation cipher mode to encryption key into Row encryption, and encrypted second encryption key is carried and is sent to user terminal in associated key response message.User is whole After termination receives the associated key response message, available encrypted second encryption key wherein carried, and according to Encrypted second encryption key is decrypted in the cipher mode that both sides negotiate, to obtain the second encryption key.
S305, be-encrypted data is encrypted according to the first encryption key and the second encryption key.
In the embodiment of the present invention, in the embodiment of the present invention, the first encryption key of terminal user is got, and association adds After the second encryption key of close user, be-encrypted data can be carried out according to first encryption key and the second encryption key Encryption, to improve Information Security.
As an alternative embodiment, in above-mentioned steps 305, according to the first encryption key and the second encryption key pair Be-encrypted data is encrypted, and may comprise steps of:
51), be-encrypted data is encrypted using the first encryption key, obtains the first encryption data;
52), the first encryption data is encrypted using the second encryption key.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and association encryption It, can be respectively using the first encryption key and the second encryption key to number to be encrypted after second encryption key of user's input According to being encrypted.
It is alternatively possible to first be encrypted using the first encryption key to be-encrypted data, to obtain encrypted encryption Data (the first encryption data), then reuse the second encryption key and encrypt to the first encryption data;It can also first use Second encryption key encrypts be-encrypted data, and to obtain encrypted encryption data, it is close then to reuse the first encryption Key encrypts encrypted encryption data.
It should be noted that in embodiments of the present invention, when association encryption user has multiple, the second encryption key also can Have it is multiple, at this point, each encryption key (the first encryption key and multiple second encryption keys) encrypts be-encrypted data The sequence embodiment of the present invention without limitation.
As another optional embodiment, in above-mentioned steps 305, according to the first encryption key and the second encryption key Be-encrypted data is encrypted, may comprise steps of:
61) target encryption key, is generated by preset rules according to the first encryption key and the second encryption key;
62), be-encrypted data is encrypted using the target encryption key.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and association encryption It, can be first raw by preset rules according to the first encryption key and the second encryption key after second encryption key of user's input At target encryption key, then be-encrypted data is encrypted using the target encryption key.
Wherein, preset rules can be preset algorithm, such as hash algorithm, exclusive or algorithm, be also possible to close to the first encryption Key and the second encryption key carry out preset processing operation, such as the interpolation of position is fixed
As an example it is assumed that the first encryption key and the second encryption key are that finger print information (is assumed to be the first fingerprint letter Breath and the second finger print information), after user terminal gets the first finger print information and the second finger print information, can respectively by First finger print information and the processing of the second finger print information are corresponding string of binary characters, and to the first finger print information and the second fingerprint The corresponding string of binary characters of information carries out exclusive or calculating, using obtained result as target encryption key, to be-encrypted data It is encrypted.
Again as an example it is assumed that the first encryption key and the second encryption key are that finger print information (is assumed to be the first fingerprint Information and the second finger print information), it, can be by after user terminal gets the first finger print information and the second finger print information One finger print information and the processing of the second finger print information are corresponding string of binary characters, and the first finger print information and the second fingerprint are believed The interpolation that position is fixed in corresponding string of binary characters is ceased, using obtained result as target encryption key, to number to be encrypted According to being encrypted.
Further, in the embodiment of the present invention, when terminal user needs that encrypted data are decrypted, it is also desirable to The first encryption key of terminal user's input is obtained respectively, and is associated with the second encryption key of encryption user's input, and according to Encrypted data are decrypted in first encryption key and the second encryption key, specific implementation with to number to be encrypted It is more close according to the implementation encrypted, it can be understood as the inverse process of encryption, the embodiment of the present invention implement it It repeats no more.
By above description as can be seen that in embodiments of the present invention, being encrypted by obtain terminal user's input first Key, and the second encryption key of association encryption user's input, and treated according to the first encryption key and the second encryption key Encryption data is encrypted, in the prior art in such a way that single key pair be-encrypted data is encrypted compared with, improve The safeties of data.
The following is an embodiment of the apparatus of the present invention, and apparatus of the present invention embodiment and embodiment of the present invention method belong to same structure Think, for executing method described in embodiment of the present invention method.For ease of description, apparatus of the present invention embodiment only show with The relevant part of apparatus of the present invention embodiment, it is disclosed by specific technical details, the description of embodiment of the present invention method is please referred to, It no longer repeats one by one herein.
Referring to Fig. 4, being a kind of structural schematic diagram of data encryption device disclosed by the embodiments of the present invention, the data encryption Device can be applied to the user terminal in above method embodiment.As shown in figure 4, the device of the data encryption may include:
Module 401 is obtained, the first encryption key inputted for obtaining terminal user, and association encryption user's input Second encryption key;
Encrypting module 402, for according to first encryption key and second encryption key to be-encrypted data into Row encryption.
Please refer to fig. 5, Fig. 5 is the structural schematic diagram of another data encryption device provided in an embodiment of the present invention, Data encryption device shown in fig. 5 is that data encryption device as shown in Figure 4 optimizes, with data shown in Fig. 4 Encryption device is compared, and data encryption device shown in fig. 5 can also include:
Receiving module 403, the CIPHERING REQUEST for being directed to be-encrypted data input for receiving terminal user;
Output module 404 exports the first prompt information, first prompt information is used for responding the CIPHERING REQUEST The first encryption key is inputted in prompt.
In an alternative embodiment, the acquisition module 401 can be specifically used for obtaining terminal user's response described the First encryption key of one prompt information input;
The output module 404 can be also used for the second prompt information of output, and second prompt information is for prompting really Recognize and whether encryption is associated to the be-encrypted data;
Correspondingly, referring to Figure 6 together, Fig. 6 is the structure of another data encryption device provided in an embodiment of the present invention Schematic diagram, data encryption device shown in fig. 6 are that data encryption device as shown in Figure 5 optimizes, and shown in Fig. 5 Data encryption device compare, data encryption device shown in fig. 6 can also include:
First sending module 405, for receiving response the second prompt information input when the receiving module 403 When confirmation is associated the instruction of encryption to the be-encrypted data, association is sent to the corresponding associated terminal of association encryption user Secret key request message;
The receiving module 403 can be also used for receiving the associated key response message that the associated terminal is sent;
Shown acquisition module, specifically for obtaining the second encryption key for including in the associated key response message.
Optionally, the acquisition module 401, can be also used for the priority for obtaining the be-encrypted data;
Correspondingly, data encryption device shown in fig. 6 can also include:
Judgment module 406, for judging whether the priority of the be-encrypted data is higher than pre-set priority;
First sending module 405 is also used to when the judgment module 406 is judged as YES, and encrypts user to association Corresponding associated terminal sends associated key request message;
The output module 404, specifically for exporting the second prompt information when the judgment module 406 is judged as NO.
In another alternative embodiment, first prompt information can be also used for prompting to be confirmed whether described to be added Ciphertext data is associated encryption;
Correspondingly, the acquisition module responds adding for the first prompt information input specifically for obtaining terminal user Close request;
Referring to Figure 7 together, Fig. 7 is the structural schematic diagram of another data encryption device provided in an embodiment of the present invention, Data encryption device shown in Fig. 7 is that data encryption device as shown in Figure 5 optimizes, with data shown in fig. 5 Encryption device is compared, and data encryption device shown in Fig. 7 can also include:
Second sending module 407, when the receiving module 403 receives terminal user, to respond first prompt information defeated When the confirmation entered is associated the instruction of encryption to the be-encrypted data, sent to the corresponding associated terminal of association encryption user Associated key request message;
The receiving module 403 can be also used for receiving the associated key response message that the associated terminal is sent, and obtain Take the second encryption key for including in the associated key response message.
In an alternative embodiment, the encrypting module 402 can be specifically used for using first encryption key pair The be-encrypted data is encrypted, to obtain the first encryption data;Using second encryption key to first encryption Data are encrypted.
In another alternative embodiment, the encrypting module 402 can be specifically used for according to first encryption key Target encryption key is generated by preset rules with second encryption key;Using the target encryption key to described to be added Ciphertext data is encrypted.
In an alternative embodiment, first encryption key includes: password, finger print information, iris information and vocal print letter The combination of one or more of breath;Or/and
Second encryption key includes: one or more of password, finger print information, iris information and voiceprint Combination.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not Must must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be It can be combined in any suitable manner in any one or more embodiment or examples.In addition, without conflicting with each other, this field Technical staff can carry out the feature of different embodiments or examples described in this specification and different embodiments or examples Combination and combination.
Those skilled in the art can be by different embodiments described in this specification and the feature of different embodiments It is combined.Module or unit in all embodiments of the invention can pass through universal integrated circuit, such as CPU (Central Processing Unit, central processing unit), or pass through ASIC (Application Specific Integrated Circuit, specific integrated circuit) Lai Shixian.
Step in all embodiments of the invention method can be sequentially adjusted, merged and deleted according to actual needs; Module or unit in all embodiments of the invention device can be combined, divided and deleted according to actual needs.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussed suitable Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be of the invention Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment It sets.The more specific example (non-exhaustive list) of computer-readable medium include the following: there is the electricity of one or more wirings Interconnecting piece (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable Medium, because can then be edited, be interpreted or when necessary with it for example by carrying out optical scanner to paper or other media His suitable method is handled electronically to obtain described program, is then stored in computer storage.
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, each functional unit in each embodiment of the present invention can integrate in a processing module It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above The embodiment of the present invention is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as to limit of the invention System, those skilled in the art can be changed above-described embodiment, modify, replace and become within the scope of the invention Type.
Above disclosed is only presently preferred embodiments of the present invention, cannot limit the right of the present invention with this certainly Range, those skilled in the art can understand all or part of the processes for realizing the above embodiment, and according to right of the present invention Equivalent variations made by it is required that, still belongs to the scope covered by the invention.

Claims (6)

1. a kind of data ciphering method characterized by comprising the encryption for receiving terminal user for be-encrypted data input is asked It asks;The CIPHERING REQUEST is responded, the first prompt information is exported, first prompt information is close for prompting the first encryption of input Key;The first encryption key that terminal user responds first prompt information input is obtained, exports the second prompt information, described the Two prompt informations are confirmed whether to be associated encryption to the be-encrypted data for prompting;It is mentioned when receiving response described second When showing that the confirmation of information input is associated the instruction of encryption to the be-encrypted data, to the corresponding association of association encryption user Terminal sends associated key request message;The associated key response message that the associated terminal is sent is received, and obtains the pass The second encryption key for including in connection key response message;
Be-encrypted data is encrypted according to first encryption key and second encryption key;It is described according to described One encryption key and second encryption key encrypt be-encrypted data,
Include:
Target encryption key is generated by preset rules according to first encryption key and second encryption key;
Be-encrypted data is encrypted using the target encryption key.
2. the method according to claim 1, wherein before the second prompt information of the output, further includes:
Obtain the priority of the be-encrypted data;Judge whether the priority of the be-encrypted data is higher than pre-set priority; If being higher than, associated key request message is sent to the corresponding associated terminal of association encryption user;Otherwise, it determines executing the output The step of second prompt information.
3. the method according to claim 1, wherein first prompt information is also used to prompt to be confirmed whether institute It states and encryption is associated to be-encrypted data;
Second encryption of first encryption key for obtaining terminal user's input and association encryption user's input is close Key, comprising:
The first encryption key that terminal user responds the first prompt information input is obtained, and is responded when receiving terminal user When the confirmation of the first prompt information input is associated the instruction of encryption to the be-encrypted data, user is encrypted to association Corresponding associated terminal sends associated key request message;
The associated key response message that the associated terminal is sent is received, and obtains in the associated key response message and includes Second encryption key.
4. a kind of data encryption device characterized by comprising
Receiving module, the CIPHERING REQUEST for being directed to be-encrypted data input for receiving terminal user, is also used to receive associated terminal The associated key response message of transmission;
Output module exports the first prompt information, first prompt information is defeated for prompting for responding the CIPHERING REQUEST Enter the first encryption key, be also used to export the second prompt information, second prompt information is confirmed whether for prompting to described Be-encrypted data is associated encryption;
First sending module, for receiving the confirmation for responding the second prompt information input to described when the receiving module When be-encrypted data is associated the instruction of encryption, associated key request is sent to the corresponding associated terminal of association encryption user and is disappeared Breath;
Module is obtained, responds the first encryption key of the first prompt information input for obtaining terminal user, and be used for Obtain the second encryption key for including in the associated key response message;Encrypting module, for close according to first encryption Key and second encryption key encrypt be-encrypted data;It is described to be added according to first encryption key and described second Close key pair be-encrypted data is encrypted, comprising: is passed through according to first encryption key and second encryption key pre- If rule generates target encryption key;Be-encrypted data is encrypted using the target encryption key.
5. device according to claim 4, which is characterized in that the acquisition module is also used to obtain the number to be encrypted According to priority;Described device further include: judgment module, for judging it is default whether the priority of the be-encrypted data is higher than Priority;
First sending module is also used to when the judgment module is judged as YES, to the corresponding association of association encryption user Terminal sends associated key request message;
The output module, specifically for exporting the second prompt information when the judgment module is judged as NO.
6. device according to claim 4, which is characterized in that first prompt information is also used to prompt to be confirmed whether institute It states and encryption is associated to be-encrypted data;
The acquisition module responds the CIPHERING REQUEST of the first prompt information input specifically for obtaining terminal user;
Described device further include: the second sending module, when the receiving module receives terminal user's response first prompt Information is defeated
When the confirmation entered is associated the instruction of encryption to the be-encrypted data, to the corresponding associated terminal of association encryption user Send associated key request message;
The receiving module is also used to receive the associated key response message that the associated terminal is sent, and obtains the association The second encryption key for including in key response message.
CN201510412135.3A 2015-07-14 2015-07-14 A kind of data ciphering method and device Expired - Fee Related CN105022965B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510412135.3A CN105022965B (en) 2015-07-14 2015-07-14 A kind of data ciphering method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510412135.3A CN105022965B (en) 2015-07-14 2015-07-14 A kind of data ciphering method and device

Publications (2)

Publication Number Publication Date
CN105022965A CN105022965A (en) 2015-11-04
CN105022965B true CN105022965B (en) 2019-09-06

Family

ID=54412927

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510412135.3A Expired - Fee Related CN105022965B (en) 2015-07-14 2015-07-14 A kind of data ciphering method and device

Country Status (1)

Country Link
CN (1) CN105022965B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105809008B (en) * 2016-04-21 2019-06-04 惠州Tcl移动通信有限公司 A kind of mobile terminal content locking and unlocking method and system based on iris
CN106067875B (en) * 2016-05-24 2020-04-17 珠海市魅族科技有限公司 Intelligent terminal encryption method and system
CN105913533B (en) * 2016-06-25 2018-06-05 浙江中烟工业有限责任公司 Intelligent door method of controlling security and system
CN109005151A (en) * 2018-06-13 2018-12-14 四川斐讯信息技术有限公司 A kind of encryption of information, decryption processing method and processing terminal

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8681975B2 (en) * 2009-08-31 2014-03-25 Apple Inc. Encryption method and apparatus using composition of ciphers
CN103118363B (en) * 2011-11-17 2016-07-27 中国电信股份有限公司 A kind of method of mutual biography secret information, system, terminal unit and platform device
CN102932349B (en) * 2012-10-31 2015-07-08 成都主导软件技术有限公司 Data transmission method, device and system
CN103248477B (en) * 2013-04-27 2015-12-23 深圳创维-Rgb电子有限公司 A kind of dynamic encrypting method and device
CN104144411B (en) * 2013-05-08 2019-09-24 南京中兴新软件有限责任公司 Encryption, decryption terminal and the encryption and decryption approaches applied to terminal
US9003204B2 (en) * 2013-07-10 2015-04-07 Sap Se Optimal re-encryption strategy for joins in encrypted databases
JP6151140B2 (en) * 2013-09-13 2017-06-21 株式会社日立製作所 Information encryption / decryption method, information providing system, and program
CN103761486A (en) * 2013-12-02 2014-04-30 苗立地 Electronic file encryption method and device
CN104660589B (en) * 2015-01-20 2021-09-10 中兴通讯股份有限公司 Method, system and terminal for encrypting control and information analysis of information

Also Published As

Publication number Publication date
CN105022965A (en) 2015-11-04

Similar Documents

Publication Publication Date Title
EP3893170B1 (en) Federated learning-based model parameter training method, apparatus and device, and medium
CN102271037B (en) Based on the key protectors of online key
CA2969493C (en) System and method for enabling secure authentication
US8700908B2 (en) System and method for managing secure information within a hybrid portable computing device
CN105490711B (en) Bluetooth automatic connection method and main equipment, from equipment and system
CN104919511B (en) Data decoding device, attribute-based encryption system and data decoding method
CN112287372B (en) Method and apparatus for protecting clipboard privacy
CN107113286A (en) The roaming content erasing operation of striding equipment
CN105022965B (en) A kind of data ciphering method and device
CN106330442A (en) Identity authentication method, device and system
CN111178884A (en) Information processing method, device, equipment and readable storage medium
CN101159754A (en) Internet application management system operating on intelligent mobile terminal
WO2021190197A1 (en) Method and apparatus for authenticating biometric payment device, computer device and storage medium
US11405782B2 (en) Methods and systems for securing and utilizing a personal data store on a mobile device
CN106203141A (en) The data processing method of a kind of application and device
CN106789085B (en) Computer booting based on mobile phone cipher manages system and method
KR101246339B1 (en) System and method using qr code for security authentication
JP2018530054A (en) Payment authentication method and apparatus for mobile terminal and mobile terminal
CN108334786A (en) A kind of data ciphering method
CN111901312A (en) Method, system, equipment and readable storage medium for network access control
CN106557708A (en) A kind of method for security protection and system
CN106254226A (en) A kind of information synchronization method and device
CN105550558B (en) A kind of fingerprint reading method and user equipment
CN105245526B (en) Call the method and apparatus of SIM card application
WO2013038418A1 (en) System and method to authorize the access of the service to an end user

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190906