CN105050079A - Data automatic encryption/decryption method in standby state of cellphone - Google Patents
Data automatic encryption/decryption method in standby state of cellphone Download PDFInfo
- Publication number
- CN105050079A CN105050079A CN201510329298.5A CN201510329298A CN105050079A CN 105050079 A CN105050079 A CN 105050079A CN 201510329298 A CN201510329298 A CN 201510329298A CN 105050079 A CN105050079 A CN 105050079A
- Authority
- CN
- China
- Prior art keywords
- enciphering
- deciphering
- file
- perform step
- current
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0225—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The invention provides a data automatic encryption/decryption method in a standby state of a cellphone. According to the method, spare resources in the standby state of the cellphone are employed, and automatic encryption/decryption of to-be-encrypted/decrypted data selected by users in advance is performed. In the process for executing encryption and decryption, the encryption process can be automatically controlled according to the current standby state, current electric quantity, and current memory occupancy rate of the cellphone, the operation frequency and waiting time for the users are reduced, and the influence on the usage of user equipment in the encryption/decryption process is reduced.
Description
(1) technical field
The present invention relates to mobile terminal data security fields, be specifically related to the automatic method for encryption/decryption of data under a kind of android standby status of mobile phone.
(2) background technology
Along with mobile phone users is to the attention gradually of terminal data privacy, most users, before transmit file or backup etc. operates, all needs to carry out enciphering/deciphering to data in advance.But be limited to the conditions such as the hardware performance of current phone, the data enciphering/deciphering of current phone end can expend and take the various types of hardware resource on mobile phone.For compared with large files enciphering/deciphering or use the higher senior encryption/decryption algorithm of complexity, the more time can be taken.Simultaneously during enciphering/deciphering because of resource occupation, user is difficult to carry out other valid functions, have impact on Consumer's Experience.At present not for the automatic method for encryption/decryption of the data under standby status of mobile phone.
(3) summary of the invention
Object of the present invention is providing the data under a kind of standby status of mobile phone automatic method for encryption/decryption.The method utilizes the idling-resource under standby status of mobile phone, to user select in advance to be added/data decryption carries out automatic enciphering/deciphering.The method utilizes the mobile phone vacant period to carry out enciphering/deciphering, saves the time that user waits for enciphering/deciphering, reduces the impact that enciphering/deciphering process causes user's normal running.
In order to achieve the above object, the technical solution used in the present invention is, user selects the file treating enciphering/deciphering in advance, system is detected by the electricity to the holding state of user and mobile phone, memory usage, automatically carries out enciphering/deciphering operation when mobile phone is in holding state and indices meets user-specific criteria.
The main modular related in this method comprises: monitoring module and enciphering/deciphering module.After system initialization, be set by the user the electricity lower limit P of mobile phone
tand memory usage upper limit O
m.Monitoring module mainly monitors following content: current electric quantity P
cwhether be less than electricity lower limit P
t; Current memory occupancy O
cwhether be greater than memory usage upper limit O
m; Whether current phone is in holding state.The cryptographic algorithm that enciphering/deciphering module primary responsibility is selected according to user carries out enciphering/deciphering to file, can generate relevant interim enciphering/deciphering file in enciphering/deciphering process.
Its concrete grammar step is:
(1) user sets initial parameter, comprises the electricity lower limit P of mobile phone
twith memory usage upper limit O
m;
(2) user selects interface in enciphering/deciphering queue, to add the file treating enciphering/deciphering, Choice encryption algorithm by file;
(3) user opens standby enciphering/deciphering function;
(4) monitoring module judges whether current phone is in holding state, is, performs step (6), otherwise performs step (5);
(5) whether user stops standby enciphering/deciphering function, is, performs step (14), otherwise performs step (4);
(6) monitoring module judge current to be added/whether decrypted list is empty, be perform step (14), otherwise perform step (7);
(7) monitoring module judges current electric quantity P
cwhether lower than electricity lower limit P
t, be perform step (7), otherwise perform step (8);
(8) monitoring module judges current memory occupancy O
cwhether be greater than memory usage upper limit O
m, be perform step (8), otherwise perform step (9);
(9) from document queue, select File performs enciphering/deciphering;
(10) step (9) term of execution, monitoring module performs current electric quantity P
c(whether be less than P
t), current memory occupancy O
c(whether be greater than O
m) and holding state (whether being holding state) monitor, if exist abnormal, perform step (11), otherwise perform step (12);
(11) stop enciphering/deciphering process, delete interim enciphering/deciphering file, perform step (4);
(12) judge whether file enciphering/deciphering terminates, and is, perform step (13), otherwise perform step (10);
(13) current file enciphering/deciphering is terminated, this file is deleted from enciphering/deciphering queue, and the file that enciphering/deciphering is good is saved in relevant position; Perform step (6);
(14) current enciphering/deciphering process is terminated.
The automatic method for encryption/decryption of data under standby status of mobile phone set forth in the present invention, the method utilizes the idling-resource under standby status of mobile phone, to user select in advance to be added/data decryption carries out automatic enciphering/deciphering.The method utilizes the mobile phone vacant period to carry out enciphering/deciphering, saves the time that user waits for enciphering/deciphering, reduces the impact that enciphering/deciphering process causes user's normal running.
The novelty of this method is:
1. idle period enciphering/deciphering.The method utilizes the mobile phone vacant period to carry out enciphering/deciphering, saves the time that user waits for enciphering/deciphering, reduces the impact that enciphering/deciphering process causes user's normal running.
2. automatic enciphering/deciphering.By pending file is added enciphering/deciphering queue, according to the automatic start and stop enciphering/deciphering of mobile phone state, number of operations and the stand-by period of user can be decreased.
3. auto state monitoring.When encryption and decryption, monitoring module is by monitoring electricity, memory usage and user operation, can, when EMS memory occupation too high or user interrupt holding state active break current enciphering/deciphering process too low at electricity, reduce the impact that enciphering/deciphering process uses subscriber equipment.
(4) accompanying drawing explanation
The schematic diagram of Fig. 1, methods described herein
Fig. 2, standby status of mobile phone method for encryption/decryption flow chart
(5) embodiment
Below in conjunction with accompanying drawing citing, the present invention is described in more detail:
The feature of the method for the invention is:
The main modular related in this method comprises: monitoring module and enciphering/deciphering module.After system initialization, be set by the user the electricity lower limit P of mobile phone
tand memory usage upper limit O
m.Monitoring module mainly monitors following content: current electric quantity P
cwhether be less than electricity lower limit P
t; Current memory occupancy O
cwhether be greater than memory usage upper limit O
m; Whether current phone is in holding state.The cryptographic algorithm that enciphering/deciphering module primary responsibility is selected according to user carries out enciphering/deciphering to file, can generate relevant interim enciphering/deciphering file in enciphering/deciphering process.
Its concrete grammar step is:
(1) user sets initial parameter, comprises the electricity lower limit P of mobile phone
twith memory usage upper limit O
m;
(2) user selects interface in enciphering/deciphering queue, to add the file treating enciphering/deciphering, Choice encryption algorithm by file;
(3) user opens standby enciphering/deciphering function;
(4) monitoring module judges whether current phone is in holding state, is, performs step (6), otherwise performs step (5);
(5) whether user stops standby enciphering/deciphering function, is, performs step (14), otherwise performs step (4);
(6) monitoring module judge current to be added/whether decrypted list is empty, be perform step (14), otherwise perform step (7);
(7) monitoring module judges current electric quantity P
cwhether lower than electricity lower limit P
t, be perform step (7), otherwise perform step (8);
(8) monitoring module judges current memory occupancy O
cwhether be greater than memory usage upper limit O
m, be perform step (8), otherwise perform step (9);
(9) from document queue, select File performs enciphering/deciphering;
(10) step (9) term of execution, monitoring module performs current electric quantity P
c(whether be less than P
t), current memory occupancy O
c(whether be greater than O
m) and holding state (whether being holding state) monitor, if exist abnormal, perform step (11), otherwise perform step (12);
(11) stop enciphering/deciphering process, delete interim enciphering/deciphering file, perform step (4);
(12) judge whether file enciphering/deciphering terminates, and is, perform step (13), otherwise perform step (10);
(13) current file enciphering/deciphering is terminated, this file is deleted from enciphering/deciphering queue, and the file that enciphering/deciphering is good is saved in relevant position; Perform step (6);
(14) current enciphering/deciphering process is terminated.
The automatic method for encryption/decryption of data under standby status of mobile phone set forth in the present invention, the method utilizes the idling-resource under standby status of mobile phone, to user select in advance to be added/data decryption carries out automatic enciphering/deciphering.The method utilizes the mobile phone vacant period to carry out enciphering/deciphering, saves the time that user waits for enciphering/deciphering, reduces the impact that enciphering/deciphering process causes user's normal running.
The concrete Implementation Modes of the automatic method for encryption/decryption of the data under standby status of mobile phone set forth in the present invention is such:
User selects to treat that the data of enciphering/deciphering put into pending queue, and opens enciphering/deciphering function; Monitoring module judges system current idle state, if mobile phone enters holding state, then enciphering/deciphering queue, electricity and occupancy are detected, if enciphering/deciphering queue does not add/separate requirement for empty, indices meet, then the file in queue is processed; In the process of process, monitoring module can continue to monitor current indices, detect simultaneously and whether have user to operate in ciphering process, if it is abnormal to detect that above index any one occurs, then stops current file operation and restoring operation is carried out to the file in process; If do not monitor exception before file encryption terminates, then continue other the pending files treated in processing queue and process by said process, until pending queue is empty, so far the Implementation Modes of whole algorithm terminates.
Claims (1)
1. the automatic method for encryption/decryption of the data under standby status of mobile phone, is characterized in that: the present invention is achieved in that
The main modular related in this method comprises: monitoring module and enciphering/deciphering module.After system initialization, be set by the user the electricity lower limit P of mobile phone
tand memory usage upper limit O
m.Monitoring module mainly monitors following content: current electric quantity P
cwhether be less than electricity lower limit P
t; Current memory occupancy O
cwhether be greater than memory usage upper limit O
m; Whether current phone is in holding state.The cryptographic algorithm that enciphering/deciphering module primary responsibility is selected according to user carries out enciphering/deciphering to file, can generate relevant interim enciphering/deciphering file in enciphering/deciphering process.
Its concrete grammar step is:
(1) user sets initial parameter, comprises the electricity lower limit P of mobile phone
twith memory usage upper limit O
m;
(2) user selects interface in enciphering/deciphering queue, to add the file treating enciphering/deciphering, Choice encryption algorithm by file;
(3) user opens standby enciphering/deciphering function;
(4) monitoring module judges whether current phone is in holding state, is, performs step (6), otherwise performs step (5);
(5) whether user stops standby enciphering/deciphering function, is, performs step (14), otherwise performs step (4);
(6) monitoring module judge current to be added/whether decrypted list is empty, be perform step (14), otherwise perform step (7);
(7) monitoring module judges current electric quantity P
cwhether lower than electricity lower limit P
t, be perform step (7), otherwise perform step (8);
(8) monitoring module judges current memory occupancy O
cwhether be greater than memory usage upper limit O
m, be perform step (8), otherwise perform step (9);
(9) from document queue, select File performs enciphering/deciphering;
(10) step (9) term of execution, monitoring module performs current electric quantity P
c(whether be less than P
t), current memory occupancy O
c(whether be greater than O
m) and holding state (whether being holding state) monitor, if exist abnormal, perform step (11), otherwise perform step (12);
(11) stop enciphering/deciphering process, delete interim enciphering/deciphering file, perform step (4);
(12) judge whether file enciphering/deciphering terminates, and is, perform step (13), otherwise perform step (10);
(13) current file enciphering/deciphering is terminated, this file is deleted from enciphering/deciphering queue, and the file that enciphering/deciphering is good is saved in relevant position; Perform step (6);
(14) current enciphering/deciphering process is terminated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510329298.5A CN105050079B (en) | 2015-06-15 | 2015-06-15 | A kind of data automatic method for encryption/decryption under standby status of mobile phone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510329298.5A CN105050079B (en) | 2015-06-15 | 2015-06-15 | A kind of data automatic method for encryption/decryption under standby status of mobile phone |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105050079A true CN105050079A (en) | 2015-11-11 |
CN105050079B CN105050079B (en) | 2018-10-23 |
Family
ID=54456180
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510329298.5A Active CN105050079B (en) | 2015-06-15 | 2015-06-15 | A kind of data automatic method for encryption/decryption under standby status of mobile phone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105050079B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080104417A1 (en) * | 2006-10-25 | 2008-05-01 | Nachtigall Ernest H | System and method for file encryption and decryption |
CN101374302A (en) * | 2008-09-23 | 2009-02-25 | 王水平 | System and method for forwarding radiofrequency signal of mobile terminal |
CN201378837Y (en) * | 2009-03-17 | 2010-01-06 | 天津远创科技发展有限公司 | Secure mobile phone with function of electricity saving |
CN102332077A (en) * | 2010-07-14 | 2012-01-25 | 国民技术股份有限公司 | Hand-held equipment data encryption and decryption method and hand-held equipment peripheral equipment thereof |
-
2015
- 2015-06-15 CN CN201510329298.5A patent/CN105050079B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080104417A1 (en) * | 2006-10-25 | 2008-05-01 | Nachtigall Ernest H | System and method for file encryption and decryption |
CN101374302A (en) * | 2008-09-23 | 2009-02-25 | 王水平 | System and method for forwarding radiofrequency signal of mobile terminal |
CN201378837Y (en) * | 2009-03-17 | 2010-01-06 | 天津远创科技发展有限公司 | Secure mobile phone with function of electricity saving |
CN102332077A (en) * | 2010-07-14 | 2012-01-25 | 国民技术股份有限公司 | Hand-held equipment data encryption and decryption method and hand-held equipment peripheral equipment thereof |
Also Published As
Publication number | Publication date |
---|---|
CN105050079B (en) | 2018-10-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11216549B2 (en) | Security verification method and device | |
EP3173926A1 (en) | Dual-system electronic apparatus and terminal | |
CN106031227B (en) | Data traffic management method and device | |
CN103970601B (en) | Execute operational order method and apparatus | |
US9088896B2 (en) | Mobile device password reset | |
CN103577280A (en) | Method and system for duplicating data | |
CN105550564A (en) | Terminal unlocking method and system | |
CN103747512A (en) | Data traffic processing method, data traffic processing system and terminal | |
CN104298546A (en) | Sharing method for hardware communication device and terminal | |
CN104870068A (en) | Method and router for access network | |
CN104021352A (en) | Method and system for isolating applications through data | |
CN103577281A (en) | Method and system for recovering data | |
CN102368798A (en) | Mobile phone setting control system, control method thereof, mobile phone setting method, apparatus thereof and mobile phone | |
CN106648974A (en) | Data backup method and mobile terminal | |
CN105095742A (en) | Root detection and recovery method for mobile terminal and mobile terminal | |
US10111207B2 (en) | Network device, terminal device, and voice service control method | |
CN108898026B (en) | Data encryption method and device | |
CN105759934B (en) | A kind of information processing method and electronic equipment | |
CN103428370A (en) | Mobile phone and multi-user control method thereof | |
CN104883341A (en) | Application management device, terminal and application management method | |
CN103491238A (en) | Unlocking system and method | |
CN105050079A (en) | Data automatic encryption/decryption method in standby state of cellphone | |
CN104412274A (en) | Portable terminal, program, and control method | |
CN108650664B (en) | Bluetooth connection control method, terminal and Bluetooth SIM card | |
CN105848143A (en) | Dual-system integrated smart mobile phone and private information processing method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |