CN105022965B - A kind of data ciphering method and device - Google Patents
A kind of data ciphering method and device Download PDFInfo
- Publication number
- CN105022965B CN105022965B CN201510412135.3A CN201510412135A CN105022965B CN 105022965 B CN105022965 B CN 105022965B CN 201510412135 A CN201510412135 A CN 201510412135A CN 105022965 B CN105022965 B CN 105022965B
- Authority
- CN
- China
- Prior art keywords
- encryption
- encryption key
- key
- user
- encrypted data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a kind of data ciphering method and devices, wherein this method comprises: obtaining the first encryption key of terminal user's input, and the second encryption key of association encryption user's input;Be-encrypted data is encrypted according to first encryption key and second encryption key.Using the embodiment of the present invention, Information Security can be improved.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of data ciphering methods and device.
Background technique
With the rapid development of communication technology, the function of user terminal more and more abundant multiplicity saves in user terminal
User's private information is also more and more, in order to guarantee the safety of the user data stored in user terminal, needs to user's end
The user data stored in end is encrypted.
It is usually (such as close by terminal user's setting encryption key in the currently used scheme to ciphering user data
Code or finger print information) to the ciphering user data in user terminal.
However practice discovery, leakage is easy to happen by the encryption key that sole user is arranged or is stolen by others, and then is led
The safety for user data of applying is on the hazard.
Summary of the invention
The embodiment of the invention discloses a kind of data ciphering method and devices, and the safety of data can be improved.
First aspect of the embodiment of the present invention discloses a kind of data ciphering method, comprising:
Obtain the first encryption key of terminal user's input, and the second encryption key of association encryption user's input;
Be-encrypted data is encrypted according to first encryption key and second encryption key.
Wherein, the of first encryption key for obtaining terminal user's input and association encryption user's input
Before two encryption keys, further includes:
Receive the CIPHERING REQUEST that terminal user is directed to be-encrypted data input;
The CIPHERING REQUEST is responded, exports the first prompt information, first prompt information is for prompting input first to add
Key.
Wherein, the of first encryption key for obtaining terminal user's input and association encryption user's input
Two encryption keys, comprising:
Obtain the first encryption key that terminal user responds the first prompt information input;
The second prompt information is exported, second prompt information is confirmed whether to carry out the be-encrypted data for prompting
Association encryption;
Encryption is associated to the be-encrypted data when receiving the confirmation for responding the second prompt information input
When instruction, associated key request message is sent to the corresponding associated terminal of association encryption user;
The associated key response message that the associated terminal is sent is received, and obtains and is wrapped in the associated key response message
The second encryption key included.
Wherein, before the second prompt information of the output, further includes:
Obtain the priority of the be-encrypted data;
Judge whether the priority of the be-encrypted data is higher than pre-set priority;
If being higher than, associated key request message is sent to the corresponding associated terminal of association encryption user;
Otherwise, it determines the step of executing the second prompt information of the output.
Wherein, first prompt information is also used to prompt to be confirmed whether described to be associated encryption to be-encrypted data;
Second encryption of first encryption key for obtaining terminal user's input and association encryption user's input
Key, comprising:
It obtains terminal user and responds the first encryption key of the first prompt information input, and work as and receive terminal user
When responding the confirmation of first prompt information input and being associated the instruction of encryption to the be-encrypted data, encrypted to association
The corresponding associated terminal of user sends associated key request message;
The associated key response message that the associated terminal is sent is received, and obtains and is wrapped in the associated key response message
The second encryption key included.
It is wherein, described that be-encrypted data is encrypted according to first encryption key and second encryption key,
Include:
The be-encrypted data is encrypted using first encryption key, to obtain the first encryption data;
First encryption data is encrypted using second encryption key.
It is wherein, described that be-encrypted data is encrypted according to first encryption key and second encryption key,
Include:
Target encryption key is generated by preset rules according to first encryption key and second encryption key;
The be-encrypted data is encrypted using the target encryption key.
Wherein, first encryption key includes: one of password, finger print information, iris information and voiceprint
Or several combination;Or/and
Second encryption key includes: one or more of password, finger print information, iris information and voiceprint
Combination.
Second aspect of the embodiment of the present invention discloses a kind of data encryption device, comprising:
Module is obtained, for obtaining the first encryption key of terminal user's input, and the of association encryption user's input
Two encryption keys;
Encrypting module, for being added according to first encryption key and second encryption key to be-encrypted data
It is close.
Wherein, further includes:
Receiving module, the CIPHERING REQUEST for being directed to be-encrypted data input for receiving terminal user;
Output module exports the first prompt information, first prompt information is for mentioning for responding the CIPHERING REQUEST
Show the first encryption key of input.
Wherein, the acquisition module, respond the first prompt information input specifically for obtaining terminal user first
Encryption key;
The output module, is also used to export the second prompt information, and second prompt information is confirmed whether for prompting
Encryption is associated to the be-encrypted data;
Described device further include:
First sending module, for receiving the confirmation pair for responding second prompt information and inputting when the receiving module
When the be-encrypted data is associated the instruction of encryption, associated key is sent to the corresponding associated terminal of association encryption user and is asked
Seek message;
The receiving module is also used to receive the associated key response message that the associated terminal is sent;
Shown acquisition module, specifically for obtaining the second encryption key for including in the associated key response message.
Wherein, the acquisition module, is also used to obtain the priority of the be-encrypted data;
Described device further include:
Judgment module, for judging whether the priority of the be-encrypted data is higher than pre-set priority;
First sending module is also used to when the judgment module is judged as YES, and to association, encryption user is corresponding
Associated terminal sends associated key request message;
The output module, specifically for exporting the second prompt information when the judgment module is judged as NO.
Wherein, first prompt information is also used to prompt to be confirmed whether described to be associated encryption to be-encrypted data;
The acquisition module responds the CIPHERING REQUEST of the first prompt information input specifically for obtaining terminal user;
Described device further include:
Second sending module responds the first prompt information input really when the receiving module receives terminal user
Recognize when being associated the instruction of encryption to the be-encrypted data, it is close to send association to the corresponding associated terminal of association encryption user
Key request message;
The receiving module is also used to receive the associated key response message that the associated terminal is sent, and described in acquisition
The second encryption key for including in associated key response message.
Wherein, the encrypting module, specifically for being added using first encryption key to the be-encrypted data
It is close, to obtain the first encryption data;First encryption data is encrypted using second encryption key.
Wherein, the encrypting module, specifically for being passed through according to first encryption key and second encryption key
Preset rules generate target encryption key;The be-encrypted data is encrypted using the target encryption key.
Wherein, first encryption key includes: one of password, finger print information, iris information and voiceprint
Or several combination;Or/and
Second encryption key includes: one or more of password, finger print information, iris information and voiceprint
Combination.
The implementation of the embodiments of the present invention has the following beneficial effects:
The first encryption key inputted by obtaining terminal user, and the second encryption of association encryption user's input are close
Key, and be-encrypted data is encrypted according to the first encryption key and the second encryption key, it is single with passing through in the prior art
The mode that key pair be-encrypted data is encrypted is compared, and the safety of data is improved.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, for ability
For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is a kind of flow diagram of data ciphering method provided in an embodiment of the present invention;
Fig. 2 is the flow diagram of another data ciphering method provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of another data ciphering method provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of data encryption device provided in an embodiment of the present invention;
Fig. 5 is the structural schematic diagram of another data encryption device provided in an embodiment of the present invention;
Fig. 6 is the structural schematic diagram of another data encryption device provided in an embodiment of the present invention;
Fig. 7 is the structural schematic diagram of another data encryption device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that the described embodiments are merely a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a kind of data ciphering method and devices, and Information Security can be improved.Individually below
It is described in detail.
Referring to Fig. 1, Fig. 1 is a kind of flow diagram of data ciphering method disclosed by the embodiments of the present invention, such as Fig. 1 institute
Show, which may include:
S101, the first encryption key for obtaining terminal user's input, and the second encryption of association encryption user's input are close
Key.
In the embodiment of the present invention, the above method can be applied to user terminal, which can include but is not limited to
PC (Personal Computer, personal computer), laptop, mobile phone, tablet computer, PDA (Personal
Digital Assistant, personal digital assistant) etc., for ease of description, being retouched below by user terminal of executing subject
It states.
In the embodiment of the present invention, in order to improve Information Security, when needing to encrypt be-encrypted data, Ke Yiyou
Multiple users' (including terminal user and one or more associations encrypt user) provide encryption key respectively, and then more according to this
The encryption key that a user provides encrypts be-encrypted data.
In the embodiment of the present invention, association encryption user can be the corresponding user of the pre-set user identifier of user,
It can be user when being encrypted to be-encrypted data, the corresponding user of user identifier selected in real time;Wherein, which marks
Knowledge can include but is not limited to phone number, QQ account or wechat account etc..
It should be noted that terminal user is not the user for refering in particular to some fixation, and is referred in the embodiment of the present invention
When being encrypted to the data in user terminal, the user of currently used user terminal.In order to make it easy to understand, of the invention real
It applies in example, can be illustrated so that terminal and terminal user correspond as an example, i.e., a terminal only has a terminal user and makes
With.
In the embodiment of the present invention, the first encryption key can include but is not limited to password, finger print information, iris information and
The combination of one or more of voiceprint;Or/and
Second encryption key can include but is not limited to one in password, finger print information, iris information and voiceprint
Kind or several combinations.
Wherein, the first encryption key and the second encryption key can be the identical encryption key of type, add for example, working as first
When key is password, the second encryption key is also password;When the first encryption key is finger print information, the second encryption key
For finger print information;First encryption key and the second encryption key may be the different encryption key of type, for example, when first
When encryption key is password, the second encryption key is finger print information.
S102, be-encrypted data is encrypted according to the first encryption key and the second encryption key.
In the embodiment of the present invention, the first encryption key of terminal user is got, and association encrypts the second of user and adds
After key, be-encrypted data can be encrypted according to first encryption key and the second encryption key, to improve number
According to safety.
As an alternative embodiment, in above-mentioned steps 102, according to the first encryption key and the second encryption key pair
Be-encrypted data is encrypted, and may comprise steps of:
11), be-encrypted data is encrypted using the first encryption key, obtains the first encryption data;
12), the first encryption data is encrypted using the second encryption key.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and association encryption
It, can be respectively using the first encryption key and the second encryption key to number to be encrypted after second encryption key of user's input
According to being encrypted.
It is alternatively possible to first be encrypted using the first encryption key to be-encrypted data, to obtain encrypted encryption
Data (the first encryption data), then reuse the second encryption key and encrypt to the first encryption data;It can also first use
Second encryption key encrypts be-encrypted data, and to obtain encrypted encryption data, it is close then to reuse the first encryption
Key encrypts encrypted encryption data.
It should be noted that in embodiments of the present invention, when association encryption user has multiple, the second encryption key also can
Have it is multiple, at this point, each encryption key (the first encryption key and multiple second encryption keys) encrypts be-encrypted data
The sequence embodiment of the present invention without limitation.
As another optional embodiment, in above-mentioned steps 102, according to the first encryption key and the second encryption key
Be-encrypted data is encrypted, may comprise steps of:
21) target encryption key, is generated by preset rules according to the first encryption key and the second encryption key;
22), be-encrypted data is encrypted using the target encryption key.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and association encryption
It, can be first raw by preset rules according to the first encryption key and the second encryption key after second encryption key of user's input
At target encryption key, then be-encrypted data is encrypted using the target encryption key.
Wherein, preset rules can be preset algorithm, such as hash algorithm, exclusive or algorithm, be also possible to close to the first encryption
Key and the second encryption key carry out preset processing operation, such as the interpolation of position is fixed
As an example it is assumed that the first encryption key and the second encryption key are that finger print information (is assumed to be the first fingerprint letter
Breath and the second finger print information), after user terminal gets the first finger print information and the second finger print information, can respectively by
First finger print information and the processing of the second finger print information are corresponding string of binary characters, and to the first finger print information and the second fingerprint
The corresponding string of binary characters of information carries out exclusive or calculating, using obtained result as target encryption key, to be-encrypted data
It is encrypted.
Again as an example it is assumed that the first encryption key and the second encryption key are that finger print information (is assumed to be the first fingerprint
Information and the second finger print information), it, can be by after user terminal gets the first finger print information and the second finger print information
One finger print information and the processing of the second finger print information are corresponding string of binary characters, and the first finger print information and the second fingerprint are believed
The interpolation that position is fixed in corresponding string of binary characters is ceased, using obtained result as target encryption key, to number to be encrypted
According to being encrypted.
As it can be seen that in the method flow described in Fig. 1, the first encryption key inputted by obtaining terminal user, and
Second encryption key of association encryption user's input, and according to the first encryption key and the second encryption key to be-encrypted data into
Row encryption, in the prior art in such a way that single encryption key encrypts be-encrypted data compared with, improve data
Safety.
Referring to Fig. 2, Fig. 2 is the flow diagram of another data ciphering method disclosed by the embodiments of the present invention, such as Fig. 2
Shown, which may include:
S201, the CIPHERING REQUEST that terminal user is directed to be-encrypted data input is received.
In the embodiment of the present invention, when terminal user needs to encrypt the data in user terminal, terminal user can
To be directed to the CIPHERING REQUEST of be-encrypted data to user terminal input.
For example, pc user can be by clicking file destination or file in PC by mouse right button, and in right button dish
" encryption " option is selected in radio button, to PC input for the file destination or the CIPHERING REQUEST of file.
Again for example, mobile phone user can be by the file destination or file in finger long-pressing mobile phone, and in mobile phone
" encryption " option is selected in the function choosing-item of pop-up, to mobile phone input for the file destination or the CIPHERING REQUEST of file.
S202, the CIPHERING REQUEST is responded, exports the first prompt information, first prompt information is for prompting input first to add
Key.
In the embodiment of the present invention, user terminal receive terminal user for be-encrypted data input CIPHERING REQUEST it
Afterwards, the CIPHERING REQUEST can be responded, (first mentions for prompting the prompt information of input encryption key (the first encryption key) for output
Show information).
It wherein, may include key-entering section domain in first prompt information, such as Password Input frame, fingerprint input area
Encryption key can be inputted to user terminal by the key-entering section domain Deng, terminal user.
S203, the first encryption key that terminal user responds the input of the first prompt information is obtained.
S204, the second prompt information of output, second prompt information are confirmed whether to carry out be-encrypted data for prompting
Association encryption.
In the embodiment of the present invention, the first encryption that user terminal receives terminal user's response the first prompt information input is close
After key, prompt information (the second prompt letter for prompting to be confirmed whether to be associated be-encrypted data encryption can be exported
Breath).
After terminal user views second prompt information, it can select to be associated be-encrypted data according to demand
Encryption, or encryption is not associated to be-encrypted data.
As an alternative embodiment, before exporting the second prompt information, can also include in above-mentioned steps S204
Following steps:
31) priority of be-encrypted data, is obtained;
32) whether pre-set priority, is higher than according to the priority of be-encrypted data;If being judged as YES, step 33) is gone to;
Otherwise, step 34) is gone to;
33), associated key request message is sent to the corresponding associated terminal of association user;
34) the step of executing the second prompt information of output, is determined.
In this embodiment, can in advance for the data definition priority stored in user terminal, and be arranged into
When row data encryption, need to be associated the priority (pre-set priority) of the data of encryption, it is default preferential that priority is higher than this
The data of grade need to be associated encryption when being encrypted, and priority is encrypted less than or equal to the data of the priority
When, it can be confirmed whether to need to be associated encryption by user;Wherein, which can be customized by the user, can also be by
System is according to dtd--data type definition.
Correspondingly, when user terminal receive terminal user input be directed to be-encrypted data CIPHERING REQUEST after, use
On the one hand family terminal can input the first encryption key, on the other hand, the available be-encrypted data with warning terminal user
Priority, and judge whether the priority of the be-encrypted data is higher than pre-set priority, if being higher than, user terminal is directly to pass
The corresponding associated terminal of connection encryption user sends associated key request message;Otherwise, user terminal exports the second prompt information, with
Warning terminal user is confirmed whether to be associated be-encrypted data encryption.
It should be noted that the above-mentioned priority according to be-encrypted data determines whether directly to close be-encrypted data
The embodiment of connection encryption only determines a kind of specific example of data encryption strategy according to the priority of be-encrypted data, and
It is not limiting the scope of the present invention, in embodiments of the present invention, data is determined according to the priority of be-encrypted data
Encryption policy further includes other implementations, for example, needing when the priority of be-encrypted data is higher than pre-set priority by end
End subscriber is confirmed whether to be associated encryption, and when the priority of be-encrypted data is less than or equal to pre-set priority, then directly
It connects determination not needing to be associated be-encrypted data encryption, specific strategy will not enumerate herein.
S205, the instruction that encryption data is associated encryption is treated when the confirmation for receiving response the second prompt information input
When, associated key request message is sent to the corresponding associated terminal of association encryption user.
In the embodiment of the present invention, when encryption data is treated in the confirmation that user terminal receives response the second prompt information input
When being associated the instruction of encryption, terminal user can send associated key request to the corresponding associated terminal of association encryption user
Message is associated with encryption user with request and inputs associate encryption keys.
In a kind of optional embodiment, association encryption user can preset and store in the user terminal.Specifically
, terminal user can predefine the user identifier of association encryption user, such as phone number, QQ account, wechat account, and
Accordingly it is arranged in the user terminal.When user terminal receives the confirmation pair that terminal user responds the input of the second prompt information
When be-encrypted data is associated the instruction of encryption, user terminal can be obtained association and be added with the correlation setting of reading terminals user
The user identifier of close user, and sent out according to the user identifier that the association encrypts user to the corresponding associated terminal of association encryption user
Send associated key request message.
As another optional embodiment, association encryption user can be selected in real time by user.Specifically, working as user
When terminal receives terminal user and responds the confirmation of the second prompt information input and treat encryption data and be associated the instruction of encryption,
User can be prompted to input or select the user identifier of association encryption user, and the association for inputting or selecting according to terminal user adds
The user identifier of close user sends associated key request message to the corresponding associated terminal of association encryption user.
In the embodiment of the present invention, after associated terminal receives associated key request message, prompt information can be exported, is mentioned
Show that association encryption user inputs encryption key, and the encryption key (the second encryption key) of association encryption user's input is carried
User terminal is sent in associated key response message.
In the embodiment of the present invention, when the confirmation that user terminal receives terminal user's response the second prompt information input is not right
When be-encrypted data is associated the instruction of encryption, user terminal directly adds be-encrypted data according to the first encryption key
Close, specific implementation repeats no more herein.
S206, the associated key response message that associated terminal is sent is received, and obtains and is wrapped in the associated key response message
The second encryption key included.
In the embodiment of the present invention, when user terminal receives the associated key response message of associated terminal transmission, it can obtain
Take the second encryption key for including in the associated key response message.
In the embodiment of the present invention, in order to improve the safety of encryption key itself, associated terminal sends to user terminal and closes
Join key response message when, can by terminal user and be associated with encrypt user both sides negotiation cipher mode to encryption key into
Row encryption, and encrypted second encryption key is carried and is sent to user terminal in associated key response message.User is whole
After termination receives the associated key response message, available encrypted second encryption key wherein carried, and according to
Encrypted second encryption key is decrypted in the cipher mode that both sides negotiate, to obtain the second encryption key.
S207, be-encrypted data is encrypted according to the first encryption key and the second encryption key.
In the embodiment of the present invention, in the embodiment of the present invention, the first encryption key of terminal user is got, and association adds
After the second encryption key of close user, be-encrypted data can be carried out according to first encryption key and the second encryption key
Encryption, to improve Information Security.
As an alternative embodiment, in above-mentioned steps 207, according to the first encryption key and the second encryption key pair
Be-encrypted data is encrypted, and may comprise steps of:
41), be-encrypted data is encrypted using the first encryption key, obtains the first encryption data;
42), the first encryption data is encrypted using the second encryption key.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and association encryption
It, can be respectively using the first encryption key and the second encryption key to number to be encrypted after second encryption key of user's input
According to being encrypted.
It is alternatively possible to first be encrypted using the first encryption key to be-encrypted data, to obtain encrypted encryption
Data (the first encryption data), then reuse the second encryption key and encrypt to the first encryption data;It can also first use
Second encryption key encrypts be-encrypted data, and to obtain encrypted encryption data, it is close then to reuse the first encryption
Key encrypts encrypted encryption data.
It should be noted that in embodiments of the present invention, when association encryption user has multiple, the second encryption key also can
Have it is multiple, at this point, each encryption key (the first encryption key and multiple second encryption keys) encrypts be-encrypted data
The sequence embodiment of the present invention without limitation.
As another optional embodiment, in above-mentioned steps 207, according to the first encryption key and the second encryption key
Be-encrypted data is encrypted, may comprise steps of:
51) target encryption key, is generated by preset rules according to the first encryption key and the second encryption key;
52), be-encrypted data is encrypted using the target encryption key.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and association encryption
It, can be first raw by preset rules according to the first encryption key and the second encryption key after second encryption key of user's input
At target encryption key, then be-encrypted data is encrypted using the target encryption key.
Wherein, preset rules can be preset algorithm, such as hash algorithm, exclusive or algorithm, be also possible to close to the first encryption
Key and the second encryption key carry out preset processing operation, such as the interpolation of position is fixed
As an example it is assumed that the first encryption key and the second encryption key are that finger print information (is assumed to be the first fingerprint letter
Breath and the second finger print information), after user terminal gets the first finger print information and the second finger print information, can respectively by
First finger print information and the processing of the second finger print information are corresponding string of binary characters, and to the first finger print information and the second fingerprint
The corresponding string of binary characters of information carries out exclusive or calculating, using obtained result as target encryption key, to be-encrypted data
It is encrypted.
Again as an example it is assumed that the first encryption key and the second encryption key are that finger print information (is assumed to be the first fingerprint
Information and the second finger print information), it, can be by after user terminal gets the first finger print information and the second finger print information
One finger print information and the processing of the second finger print information are corresponding string of binary characters, and the first finger print information and the second fingerprint are believed
The interpolation that position is fixed in corresponding string of binary characters is ceased, using obtained result as target encryption key, to number to be encrypted
According to being encrypted.
Referring to Fig. 3, Fig. 3 is the flow diagram of another data ciphering method disclosed by the embodiments of the present invention, such as Fig. 3
Shown, which may include:
S301, the CIPHERING REQUEST that terminal user is directed to be-encrypted data input is received.
In the embodiment of the present invention, when terminal user needs to encrypt the data in user terminal, terminal user can
To be directed to the CIPHERING REQUEST of be-encrypted data to user terminal input.
For example, pc user can be by clicking file destination or file in PC by mouse right button, and in right button dish
" encryption " option is selected in radio button, to PC input for the file destination or the CIPHERING REQUEST of file.
Again for example, mobile phone user can be by the file destination or file in finger long-pressing mobile phone, and in mobile phone
" encryption " option is selected in the function choosing-item of pop-up, to mobile phone input for the file destination or the CIPHERING REQUEST of file.
S302, the CIPHERING REQUEST is responded, exports the first prompt information, first prompt information is for prompting input first to add
Key, and be confirmed whether to be associated be-encrypted data encryption.
In the embodiment of the present invention, user terminal receive terminal user for be-encrypted data input CIPHERING REQUEST it
Afterwards, the CIPHERING REQUEST can be responded, is exported prompt information (the first prompt information), first prompt information is for prompting input to add
Key (the first encryption key), and be confirmed whether to be associated be-encrypted data encryption.
After terminal user views first prompt information, encryption key can be inputted, and selection is treated according to demand
Encryption data is associated encryption, or is not associated encryption to be-encrypted data.
As an alternative embodiment, in embodiments of the present invention, user terminal receive terminal user be directed to
After the CIPHERING REQUEST of encryption data input, the priority of the available be-encrypted data, and judge the be-encrypted data
Whether priority is higher than pre-set priority, if being higher than, user terminal can export the first prompt information described in step 302;
Otherwise, user terminal, which can determine, does not need to be associated be-encrypted data encryption, and user terminal can only be exported for mentioning
Show that terminal user inputs the prompt information of encryption key, without prompting user to be confirmed whether to be associated be-encrypted data
Encryption.
S303, the first encryption key that terminal user responds the input of the first prompt information is obtained, and is used when receiving terminal
When the confirmation that family responds the input of the first prompt information treats encryption data and is associated the instruction of encryption, to association encryption user couple
The associated terminal answered sends associated key request message.
In the embodiment of the present invention, in the embodiment of the present invention, when user terminal receives response the first prompt information input
When confirmation is associated the instruction of encryption to be-encrypted data, terminal user can be to the corresponding associated terminal of association encryption user
Associated key request message is sent, encryption user is associated with request and inputs associate encryption keys.
In a kind of optional embodiment, association encryption user can preset and store in the user terminal.Specifically
, terminal user can predefine the user identifier of association encryption user, such as phone number, QQ account, wechat account, and
Accordingly it is arranged in the user terminal.When user terminal receives the confirmation pair that terminal user responds the input of the first prompt information
When be-encrypted data is associated the instruction of encryption, user terminal can be obtained association and be added with the correlation setting of reading terminals user
The user identifier of close user, and sent out according to the user identifier that the association encrypts user to the corresponding associated terminal of association encryption user
Send associated key request message.
As another optional embodiment, association encryption user can be selected in real time by user.Specifically, working as user
When terminal receives terminal user and responds the confirmation of the second prompt information input and treat encryption data and be associated the instruction of encryption,
User can be prompted to input or select the user identifier of association encryption user, and the association for inputting or selecting according to terminal user adds
The user identifier of close user sends associated key request message to the corresponding associated terminal of association encryption user.
In the embodiment of the present invention, after associated terminal receives associated key request message, prompt information can be exported, is mentioned
Show that association encryption user inputs encryption key, and the encryption key (the second encryption key) of association encryption user's input is carried
User terminal is sent in associated key response message.
In the embodiment of the present invention, when the confirmation that user terminal receives terminal user's response the second prompt information input is not right
When be-encrypted data is associated the instruction of encryption, user terminal directly adds be-encrypted data according to the first encryption key
Close, specific implementation repeats no more herein.
S304, the associated key response message that associated terminal is sent is received, and obtains and is wrapped in the associated key response message
The second encryption key included.
In the embodiment of the present invention, when user terminal receives the associated key response message of associated terminal transmission, it can obtain
Take the second encryption key for including in the associated key response message.
In the embodiment of the present invention, in order to improve the safety of encryption key itself, associated terminal sends to user terminal and closes
Join key response message when, can by terminal user and be associated with encrypt user both sides negotiation cipher mode to encryption key into
Row encryption, and encrypted second encryption key is carried and is sent to user terminal in associated key response message.User is whole
After termination receives the associated key response message, available encrypted second encryption key wherein carried, and according to
Encrypted second encryption key is decrypted in the cipher mode that both sides negotiate, to obtain the second encryption key.
S305, be-encrypted data is encrypted according to the first encryption key and the second encryption key.
In the embodiment of the present invention, in the embodiment of the present invention, the first encryption key of terminal user is got, and association adds
After the second encryption key of close user, be-encrypted data can be carried out according to first encryption key and the second encryption key
Encryption, to improve Information Security.
As an alternative embodiment, in above-mentioned steps 305, according to the first encryption key and the second encryption key pair
Be-encrypted data is encrypted, and may comprise steps of:
51), be-encrypted data is encrypted using the first encryption key, obtains the first encryption data;
52), the first encryption data is encrypted using the second encryption key.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and association encryption
It, can be respectively using the first encryption key and the second encryption key to number to be encrypted after second encryption key of user's input
According to being encrypted.
It is alternatively possible to first be encrypted using the first encryption key to be-encrypted data, to obtain encrypted encryption
Data (the first encryption data), then reuse the second encryption key and encrypt to the first encryption data;It can also first use
Second encryption key encrypts be-encrypted data, and to obtain encrypted encryption data, it is close then to reuse the first encryption
Key encrypts encrypted encryption data.
It should be noted that in embodiments of the present invention, when association encryption user has multiple, the second encryption key also can
Have it is multiple, at this point, each encryption key (the first encryption key and multiple second encryption keys) encrypts be-encrypted data
The sequence embodiment of the present invention without limitation.
As another optional embodiment, in above-mentioned steps 305, according to the first encryption key and the second encryption key
Be-encrypted data is encrypted, may comprise steps of:
61) target encryption key, is generated by preset rules according to the first encryption key and the second encryption key;
62), be-encrypted data is encrypted using the target encryption key.
In this embodiment, user terminal gets the first encryption key of terminal user's input, and association encryption
It, can be first raw by preset rules according to the first encryption key and the second encryption key after second encryption key of user's input
At target encryption key, then be-encrypted data is encrypted using the target encryption key.
Wherein, preset rules can be preset algorithm, such as hash algorithm, exclusive or algorithm, be also possible to close to the first encryption
Key and the second encryption key carry out preset processing operation, such as the interpolation of position is fixed
As an example it is assumed that the first encryption key and the second encryption key are that finger print information (is assumed to be the first fingerprint letter
Breath and the second finger print information), after user terminal gets the first finger print information and the second finger print information, can respectively by
First finger print information and the processing of the second finger print information are corresponding string of binary characters, and to the first finger print information and the second fingerprint
The corresponding string of binary characters of information carries out exclusive or calculating, using obtained result as target encryption key, to be-encrypted data
It is encrypted.
Again as an example it is assumed that the first encryption key and the second encryption key are that finger print information (is assumed to be the first fingerprint
Information and the second finger print information), it, can be by after user terminal gets the first finger print information and the second finger print information
One finger print information and the processing of the second finger print information are corresponding string of binary characters, and the first finger print information and the second fingerprint are believed
The interpolation that position is fixed in corresponding string of binary characters is ceased, using obtained result as target encryption key, to number to be encrypted
According to being encrypted.
Further, in the embodiment of the present invention, when terminal user needs that encrypted data are decrypted, it is also desirable to
The first encryption key of terminal user's input is obtained respectively, and is associated with the second encryption key of encryption user's input, and according to
Encrypted data are decrypted in first encryption key and the second encryption key, specific implementation with to number to be encrypted
It is more close according to the implementation encrypted, it can be understood as the inverse process of encryption, the embodiment of the present invention implement it
It repeats no more.
By above description as can be seen that in embodiments of the present invention, being encrypted by obtain terminal user's input first
Key, and the second encryption key of association encryption user's input, and treated according to the first encryption key and the second encryption key
Encryption data is encrypted, in the prior art in such a way that single key pair be-encrypted data is encrypted compared with, improve
The safeties of data.
The following is an embodiment of the apparatus of the present invention, and apparatus of the present invention embodiment and embodiment of the present invention method belong to same structure
Think, for executing method described in embodiment of the present invention method.For ease of description, apparatus of the present invention embodiment only show with
The relevant part of apparatus of the present invention embodiment, it is disclosed by specific technical details, the description of embodiment of the present invention method is please referred to,
It no longer repeats one by one herein.
Referring to Fig. 4, being a kind of structural schematic diagram of data encryption device disclosed by the embodiments of the present invention, the data encryption
Device can be applied to the user terminal in above method embodiment.As shown in figure 4, the device of the data encryption may include:
Module 401 is obtained, the first encryption key inputted for obtaining terminal user, and association encryption user's input
Second encryption key;
Encrypting module 402, for according to first encryption key and second encryption key to be-encrypted data into
Row encryption.
Please refer to fig. 5, Fig. 5 is the structural schematic diagram of another data encryption device provided in an embodiment of the present invention,
Data encryption device shown in fig. 5 is that data encryption device as shown in Figure 4 optimizes, with data shown in Fig. 4
Encryption device is compared, and data encryption device shown in fig. 5 can also include:
Receiving module 403, the CIPHERING REQUEST for being directed to be-encrypted data input for receiving terminal user;
Output module 404 exports the first prompt information, first prompt information is used for responding the CIPHERING REQUEST
The first encryption key is inputted in prompt.
In an alternative embodiment, the acquisition module 401 can be specifically used for obtaining terminal user's response described the
First encryption key of one prompt information input;
The output module 404 can be also used for the second prompt information of output, and second prompt information is for prompting really
Recognize and whether encryption is associated to the be-encrypted data;
Correspondingly, referring to Figure 6 together, Fig. 6 is the structure of another data encryption device provided in an embodiment of the present invention
Schematic diagram, data encryption device shown in fig. 6 are that data encryption device as shown in Figure 5 optimizes, and shown in Fig. 5
Data encryption device compare, data encryption device shown in fig. 6 can also include:
First sending module 405, for receiving response the second prompt information input when the receiving module 403
When confirmation is associated the instruction of encryption to the be-encrypted data, association is sent to the corresponding associated terminal of association encryption user
Secret key request message;
The receiving module 403 can be also used for receiving the associated key response message that the associated terminal is sent;
Shown acquisition module, specifically for obtaining the second encryption key for including in the associated key response message.
Optionally, the acquisition module 401, can be also used for the priority for obtaining the be-encrypted data;
Correspondingly, data encryption device shown in fig. 6 can also include:
Judgment module 406, for judging whether the priority of the be-encrypted data is higher than pre-set priority;
First sending module 405 is also used to when the judgment module 406 is judged as YES, and encrypts user to association
Corresponding associated terminal sends associated key request message;
The output module 404, specifically for exporting the second prompt information when the judgment module 406 is judged as NO.
In another alternative embodiment, first prompt information can be also used for prompting to be confirmed whether described to be added
Ciphertext data is associated encryption;
Correspondingly, the acquisition module responds adding for the first prompt information input specifically for obtaining terminal user
Close request;
Referring to Figure 7 together, Fig. 7 is the structural schematic diagram of another data encryption device provided in an embodiment of the present invention,
Data encryption device shown in Fig. 7 is that data encryption device as shown in Figure 5 optimizes, with data shown in fig. 5
Encryption device is compared, and data encryption device shown in Fig. 7 can also include:
Second sending module 407, when the receiving module 403 receives terminal user, to respond first prompt information defeated
When the confirmation entered is associated the instruction of encryption to the be-encrypted data, sent to the corresponding associated terminal of association encryption user
Associated key request message;
The receiving module 403 can be also used for receiving the associated key response message that the associated terminal is sent, and obtain
Take the second encryption key for including in the associated key response message.
In an alternative embodiment, the encrypting module 402 can be specifically used for using first encryption key pair
The be-encrypted data is encrypted, to obtain the first encryption data;Using second encryption key to first encryption
Data are encrypted.
In another alternative embodiment, the encrypting module 402 can be specifically used for according to first encryption key
Target encryption key is generated by preset rules with second encryption key;Using the target encryption key to described to be added
Ciphertext data is encrypted.
In an alternative embodiment, first encryption key includes: password, finger print information, iris information and vocal print letter
The combination of one or more of breath;Or/and
Second encryption key includes: one or more of password, finger print information, iris information and voiceprint
Combination.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
Must must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be
It can be combined in any suitable manner in any one or more embodiment or examples.In addition, without conflicting with each other, this field
Technical staff can carry out the feature of different embodiments or examples described in this specification and different embodiments or examples
Combination and combination.
Those skilled in the art can be by different embodiments described in this specification and the feature of different embodiments
It is combined.Module or unit in all embodiments of the invention can pass through universal integrated circuit, such as CPU
(Central Processing Unit, central processing unit), or pass through ASIC (Application Specific
Integrated Circuit, specific integrated circuit) Lai Shixian.
Step in all embodiments of the invention method can be sequentially adjusted, merged and deleted according to actual needs;
Module or unit in all embodiments of the invention device can be combined, divided and deleted according to actual needs.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes
It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion
Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussed suitable
Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use
In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for
Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction
The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set
It is standby and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass
Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment
It sets.The more specific example (non-exhaustive list) of computer-readable medium include the following: there is the electricity of one or more wirings
Interconnecting piece (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory
(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits
Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable
Medium, because can then be edited, be interpreted or when necessary with it for example by carrying out optical scanner to paper or other media
His suitable method is handled electronically to obtain described program, is then stored in computer storage.
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries
It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium
In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, each functional unit in each embodiment of the present invention can integrate in a processing module
It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould
Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above
The embodiment of the present invention is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as to limit of the invention
System, those skilled in the art can be changed above-described embodiment, modify, replace and become within the scope of the invention
Type.
Above disclosed is only presently preferred embodiments of the present invention, cannot limit the right of the present invention with this certainly
Range, those skilled in the art can understand all or part of the processes for realizing the above embodiment, and according to right of the present invention
Equivalent variations made by it is required that, still belongs to the scope covered by the invention.
Claims (6)
1. a kind of data ciphering method characterized by comprising the encryption for receiving terminal user for be-encrypted data input is asked
It asks;The CIPHERING REQUEST is responded, the first prompt information is exported, first prompt information is close for prompting the first encryption of input
Key;The first encryption key that terminal user responds first prompt information input is obtained, exports the second prompt information, described the
Two prompt informations are confirmed whether to be associated encryption to the be-encrypted data for prompting;It is mentioned when receiving response described second
When showing that the confirmation of information input is associated the instruction of encryption to the be-encrypted data, to the corresponding association of association encryption user
Terminal sends associated key request message;The associated key response message that the associated terminal is sent is received, and obtains the pass
The second encryption key for including in connection key response message;
Be-encrypted data is encrypted according to first encryption key and second encryption key;It is described according to described
One encryption key and second encryption key encrypt be-encrypted data,
Include:
Target encryption key is generated by preset rules according to first encryption key and second encryption key;
Be-encrypted data is encrypted using the target encryption key.
2. the method according to claim 1, wherein before the second prompt information of the output, further includes:
Obtain the priority of the be-encrypted data;Judge whether the priority of the be-encrypted data is higher than pre-set priority;
If being higher than, associated key request message is sent to the corresponding associated terminal of association encryption user;Otherwise, it determines executing the output
The step of second prompt information.
3. the method according to claim 1, wherein first prompt information is also used to prompt to be confirmed whether institute
It states and encryption is associated to be-encrypted data;
Second encryption of first encryption key for obtaining terminal user's input and association encryption user's input is close
Key, comprising:
The first encryption key that terminal user responds the first prompt information input is obtained, and is responded when receiving terminal user
When the confirmation of the first prompt information input is associated the instruction of encryption to the be-encrypted data, user is encrypted to association
Corresponding associated terminal sends associated key request message;
The associated key response message that the associated terminal is sent is received, and obtains in the associated key response message and includes
Second encryption key.
4. a kind of data encryption device characterized by comprising
Receiving module, the CIPHERING REQUEST for being directed to be-encrypted data input for receiving terminal user, is also used to receive associated terminal
The associated key response message of transmission;
Output module exports the first prompt information, first prompt information is defeated for prompting for responding the CIPHERING REQUEST
Enter the first encryption key, be also used to export the second prompt information, second prompt information is confirmed whether for prompting to described
Be-encrypted data is associated encryption;
First sending module, for receiving the confirmation for responding the second prompt information input to described when the receiving module
When be-encrypted data is associated the instruction of encryption, associated key request is sent to the corresponding associated terminal of association encryption user and is disappeared
Breath;
Module is obtained, responds the first encryption key of the first prompt information input for obtaining terminal user, and be used for
Obtain the second encryption key for including in the associated key response message;Encrypting module, for close according to first encryption
Key and second encryption key encrypt be-encrypted data;It is described to be added according to first encryption key and described second
Close key pair be-encrypted data is encrypted, comprising: is passed through according to first encryption key and second encryption key pre-
If rule generates target encryption key;Be-encrypted data is encrypted using the target encryption key.
5. device according to claim 4, which is characterized in that the acquisition module is also used to obtain the number to be encrypted
According to priority;Described device further include: judgment module, for judging it is default whether the priority of the be-encrypted data is higher than
Priority;
First sending module is also used to when the judgment module is judged as YES, to the corresponding association of association encryption user
Terminal sends associated key request message;
The output module, specifically for exporting the second prompt information when the judgment module is judged as NO.
6. device according to claim 4, which is characterized in that first prompt information is also used to prompt to be confirmed whether institute
It states and encryption is associated to be-encrypted data;
The acquisition module responds the CIPHERING REQUEST of the first prompt information input specifically for obtaining terminal user;
Described device further include: the second sending module, when the receiving module receives terminal user's response first prompt
Information is defeated
When the confirmation entered is associated the instruction of encryption to the be-encrypted data, to the corresponding associated terminal of association encryption user
Send associated key request message;
The receiving module is also used to receive the associated key response message that the associated terminal is sent, and obtains the association
The second encryption key for including in key response message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510412135.3A CN105022965B (en) | 2015-07-14 | 2015-07-14 | A kind of data ciphering method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510412135.3A CN105022965B (en) | 2015-07-14 | 2015-07-14 | A kind of data ciphering method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105022965A CN105022965A (en) | 2015-11-04 |
CN105022965B true CN105022965B (en) | 2019-09-06 |
Family
ID=54412927
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510412135.3A Expired - Fee Related CN105022965B (en) | 2015-07-14 | 2015-07-14 | A kind of data ciphering method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105022965B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105809008B (en) * | 2016-04-21 | 2019-06-04 | 惠州Tcl移动通信有限公司 | A kind of mobile terminal content locking and unlocking method and system based on iris |
CN106067875B (en) * | 2016-05-24 | 2020-04-17 | 珠海市魅族科技有限公司 | Intelligent terminal encryption method and system |
CN105913533B (en) * | 2016-06-25 | 2018-06-05 | 浙江中烟工业有限责任公司 | Intelligent door method of controlling security and system |
CN109005151A (en) * | 2018-06-13 | 2018-12-14 | 四川斐讯信息技术有限公司 | A kind of encryption of information, decryption processing method and processing terminal |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8681975B2 (en) * | 2009-08-31 | 2014-03-25 | Apple Inc. | Encryption method and apparatus using composition of ciphers |
CN103118363B (en) * | 2011-11-17 | 2016-07-27 | 中国电信股份有限公司 | A kind of method of mutual biography secret information, system, terminal unit and platform device |
CN102932349B (en) * | 2012-10-31 | 2015-07-08 | 成都主导软件技术有限公司 | Data transmission method, device and system |
CN103248477B (en) * | 2013-04-27 | 2015-12-23 | 深圳创维-Rgb电子有限公司 | A kind of dynamic encrypting method and device |
CN104144411B (en) * | 2013-05-08 | 2019-09-24 | 南京中兴新软件有限责任公司 | Encryption, decryption terminal and the encryption and decryption approaches applied to terminal |
US9003204B2 (en) * | 2013-07-10 | 2015-04-07 | Sap Se | Optimal re-encryption strategy for joins in encrypted databases |
JP6151140B2 (en) * | 2013-09-13 | 2017-06-21 | 株式会社日立製作所 | Information encryption / decryption method, information providing system, and program |
CN103761486A (en) * | 2013-12-02 | 2014-04-30 | 苗立地 | Electronic file encryption method and device |
CN104660589B (en) * | 2015-01-20 | 2021-09-10 | 中兴通讯股份有限公司 | Method, system and terminal for encrypting control and information analysis of information |
-
2015
- 2015-07-14 CN CN201510412135.3A patent/CN105022965B/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN105022965A (en) | 2015-11-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3893170B1 (en) | Federated learning-based model parameter training method, apparatus and device, and medium | |
CN102271037B (en) | Based on the key protectors of online key | |
CA2969493C (en) | System and method for enabling secure authentication | |
US8700908B2 (en) | System and method for managing secure information within a hybrid portable computing device | |
CN105490711B (en) | Bluetooth automatic connection method and main equipment, from equipment and system | |
CN104919511B (en) | Data decoding device, attribute-based encryption system and data decoding method | |
CN112287372B (en) | Method and apparatus for protecting clipboard privacy | |
CN107113286A (en) | The roaming content erasing operation of striding equipment | |
CN105022965B (en) | A kind of data ciphering method and device | |
CN106330442A (en) | Identity authentication method, device and system | |
CN111178884A (en) | Information processing method, device, equipment and readable storage medium | |
CN101159754A (en) | Internet application management system operating on intelligent mobile terminal | |
WO2021190197A1 (en) | Method and apparatus for authenticating biometric payment device, computer device and storage medium | |
US11405782B2 (en) | Methods and systems for securing and utilizing a personal data store on a mobile device | |
CN106203141A (en) | The data processing method of a kind of application and device | |
CN106789085B (en) | Computer booting based on mobile phone cipher manages system and method | |
KR101246339B1 (en) | System and method using qr code for security authentication | |
JP2018530054A (en) | Payment authentication method and apparatus for mobile terminal and mobile terminal | |
CN108334786A (en) | A kind of data ciphering method | |
CN111901312A (en) | Method, system, equipment and readable storage medium for network access control | |
CN106557708A (en) | A kind of method for security protection and system | |
CN106254226A (en) | A kind of information synchronization method and device | |
CN105550558B (en) | A kind of fingerprint reading method and user equipment | |
CN105245526B (en) | Call the method and apparatus of SIM card application | |
WO2013038418A1 (en) | System and method to authorize the access of the service to an end user |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190906 |