CN105227578A - The encryption and decryption method of transfer files and encryption and decryption device - Google Patents
The encryption and decryption method of transfer files and encryption and decryption device Download PDFInfo
- Publication number
- CN105227578A CN105227578A CN201510719602.7A CN201510719602A CN105227578A CN 105227578 A CN105227578 A CN 105227578A CN 201510719602 A CN201510719602 A CN 201510719602A CN 105227578 A CN105227578 A CN 105227578A
- Authority
- CN
- China
- Prior art keywords
- file
- key
- transmission
- module
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012546 transfer Methods 0.000 title claims abstract description 149
- 238000000034 method Methods 0.000 title claims abstract description 46
- 230000005540 biological transmission Effects 0.000 claims abstract description 104
- 210000005252 bulbus oculi Anatomy 0.000 claims description 90
- 238000010586 diagram Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 210000003786 sclera Anatomy 0.000 description 2
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The encryption method that the invention provides a kind of transfer files comprises the following steps: receive file waiting for transmission and file transfer instruction, carries key targeted customer mark in described file transfer instruction; According to described key targeted customer mark, obtain the key that described file waiting for transmission is encrypted; File waiting for transmission described in described double secret key is adopted to be encrypted; According to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.The present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.
Description
Technical field
The present invention relates to encryption and decryption technology field, particularly relate to a kind of encryption and decryption method and encryption and decryption device of transfer files.
Background technology
Along with the development of society, the Internet and mobile Internet have become in people's life, an inseparable part, and bring various convenience with simultaneously efficiently in the Internet, the leakage of individual subscriber privacy also becomes the focus of concern.In the prior art, even if instant chat software or communication tool are not all encrypted file content itself when file transfer, as long as that is any other people gets this file and just normally can open and check, obtain content wherein.Such fail safe is very poor, if need to transmit some classified papers by instant chat software, or computer is invaded by others, and so some valuable individual privacies or classified papers may just be easy to reveal.
Therefore, there is larger safety problem in the secret file of applying Internet user in the related.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of encryption and decryption method and encryption and decryption device of transfer files, there is larger safety problem in the secret file being intended to solve applying Internet user in prior art.
For solving the problems of the technologies described above, embodiments provide following technical scheme:
The invention provides a kind of encryption method of transfer files, the encryption method of described transfer files comprises the following steps:
Receive file waiting for transmission and file transfer instruction, in described file transfer instruction, carry key targeted customer mark;
According to described key targeted customer mark, obtain the key that described file waiting for transmission is encrypted;
File waiting for transmission described in described double secret key is adopted to be encrypted;
According to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
Present invention also offers a kind of decryption method of transfer files, the decryption method of described transfer files comprises the following steps:
Receive encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
According to described deciphering designated user mark, obtain the key that described encrypt file is decrypted;
Adopt the key of described deciphering, described encrypt file is decrypted;
Successful decryption, then open described file.
Present invention also offers a kind of encryption device of transfer files, the encryption device of described transfer files comprises:
Receiver module, for receiving file waiting for transmission and file transfer instruction, carries key targeted customer mark in described file transfer instruction;
Key Acquisition Module, for according to described key targeted customer mark, obtains the key be encrypted described file waiting for transmission;
Encrypting module, is encrypted for adopting file waiting for transmission described in described double secret key;
Transport module, for according to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
Present invention also offers a kind of decryption device of transfer files, the decryption device of described transfer files comprises:
Receiver module, for receiving encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
Key Acquisition Module, for according to described deciphering designated user mark, obtains the key be decrypted described encrypt file;
Deciphering module, for adopting the key of described deciphering, is decrypted described encrypt file;
File Open module, for successful decryption, then opens described file.
Relative to prior art, the encryption and decryption method of transfer files of the present invention and encryption and decryption device, by when transfer files, eyeball information according to specifying is encrypted described file, send to recipient's mobile terminal again after encryption, the eyeball information that recipient's acquisition for mobile terminal is specified, the encrypt file received is decrypted, only have successful decryption, just can open file and check.Therefore, the present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.
Accompanying drawing explanation
Fig. 1 is the realization flow schematic diagram of the encryption method of the transfer files that the embodiment of the present invention one provides;
Fig. 2 is the realization flow schematic diagram of the encryption method of the transfer files that the embodiment of the present invention two provides;
Fig. 3 is the realization flow schematic diagram of the encryption method of the transfer files that the embodiment of the present invention three provides;
Fig. 4 is the realization flow schematic diagram of the decryption method of the transfer files that the embodiment of the present invention four provides;
Fig. 5 is the realization flow schematic diagram of the decryption method of the transfer files that the embodiment of the present invention five provides;
Fig. 6 is the realization flow schematic diagram of the decryption method of the transfer files that the embodiment of the present invention six provides;
Fig. 7 is the structural representation of the encryption device of the transfer files that the embodiment of the present invention seven provides;
Fig. 8 is the structural representation of the encryption device of the transfer files that the embodiment of the present invention eight provides;
Fig. 9 is the structural representation of the encryption device of the transfer files that the embodiment of the present invention nine provides;
Figure 10 is the structural representation of the decryption device of the transfer files that the embodiment of the present invention ten provides;
Figure 11 is the structural representation of the decryption device of the transfer files that the embodiment of the present invention 11 provides;
Figure 12 is the structural representation of the decryption device of the transfer files that the embodiment of the present invention 12 provides.
Embodiment
What please refer in accompanying drawing is graphic, and wherein identical element numbers represents identical assembly, and principle of the present invention implements to illustrate in a suitable computing environment.The following description is based on exemplified specific embodiments of the invention, and it should not be regarded as limiting the present invention not at other specific embodiment that this describes in detail.
The principle of the invention illustrates with above-mentioned word, and it is not represented as a kind of restriction, and those skilled in the art can recognize that the plurality of step of the following stated and operation also may be implemented in the middle of hardware.Principle of the present invention uses other wide usages many or specific purpose computing, communication environment or configuration to operate.
The encryption and decryption method of transfer files provided by the invention and encryption and decryption device, be mainly used in terminal equipment, as: mobile phone, computer, personal digital assistant (PersonalDigitalAssistant, PDA) etc.
To be described in detail respectively below.
Embodiment one
Refer to Fig. 1, be depicted as the encryption method of the transfer files that the embodiment of the present invention provides.
The encryption method of described transfer files, is applied in mobile terminal device, specifically comprises the steps:
In step S101, receive file waiting for transmission and file transfer instruction, in described file transfer instruction, carry key targeted customer mark;
In embodiments of the present invention, after the step receiving file waiting for transmission, also comprise: judge whether described file waiting for transmission comprises default keyword; If judge that described file waiting for transmission comprises default keyword, determine that described file waiting for transmission is the file needing encryption, then perform step S102.
But be understandable that, keyword can be " contract ", " agreement ", " important " etc., can require sets itself according to user.
Such as, after receiving file waiting for transmission, judge in described file content, whether to include " contract " two words, if included " contract ", then determine that described file waiting for transmission is the file needing encryption.At this moment, according to designated user information, obtain the eyeball information of described designated user as the key be encrypted described file waiting for transmission.
But, be understandable that, if judge not comprise " contract " two words in described file content, then need not encrypt, directly by file transfer to recipient's mobile terminal.
In step s 102, according to described key targeted customer mark, the key that described file waiting for transmission is encrypted is obtained;
In embodiments of the present invention, according to designated user information, obtain the eyeball information of described designated user as the key be encrypted described file waiting for transmission.Such as, eyeball information includes but not limited to; Iris information, sclera information etc.
In step s 103, file waiting for transmission described in described double secret key is adopted to be encrypted;
In embodiments of the present invention, adopt the eyeball information of designated user, described file waiting for transmission is encrypted.
In step S104, according to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
As from the foregoing, the present embodiment is by when transfer files, and the eyeball information according to specifying is encrypted described file, sends to recipient's mobile terminal again after encryption.Therefore, the present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.
Embodiment two
Refer to Fig. 2, be depicted as the encryption method of the transfer files that the embodiment of the present invention provides.
The encryption method of described transfer files, is applied in mobile terminal device, specifically comprises the steps:
In step s 201, receive file waiting for transmission and file transfer instruction, in described file transfer instruction, carry key targeted customer mark;
In embodiments of the present invention, after the step receiving file waiting for transmission, also comprise: judge whether described file waiting for transmission comprises default keyword; If judge that described file waiting for transmission comprises default keyword, determine that described file waiting for transmission is the file needing encryption, then perform step S202.
But, be understandable that, if judge that described file waiting for transmission does not comprise default keyword, then need not encrypt, directly by file transfer to recipient's mobile terminal.
In step S202, according to described key targeted customer mark, open the eyeball acquisition module of sender mobile terminal;
In embodiments of the present invention, according to designated user information, the user as specified is local terminal cellphone subscriber, so, opens the eyeball acquisition module of local terminal mobile phone (sender mobile terminal).
In step S203, by described eyeball acquisition module, gather the eyeball information of sender mobile terminal user;
In step S204, the eyeball information of the sender mobile terminal user collected, is encrypted described file waiting for transmission.
In embodiments of the present invention, adopt the eyeball information of local terminal cellphone subscriber, described file waiting for transmission is encrypted.
In step S205, according to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
But, be understandable that, if the user profile of specifying is preserved in the terminal in advance, so, according to described key targeted customer mark (user profile of namely specifying), from mobile terminal, directly read the eyeball information of designated user as the key be encrypted described file waiting for transmission, adopt the eyeball information of this designated user, described file waiting for transmission is encrypted.
As from the foregoing, the present embodiment, by when transfer files, is opened local terminal eyeball acquisition module, is gathered the eyeball information of this mobile phone users; According to this eyeball information, described file is encrypted, after encryption, sends to recipient's mobile terminal again.Therefore, the present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.
Embodiment three
Refer to Fig. 3, be depicted as the encryption method of the transfer files that the embodiment of the present invention provides.
The encryption method of described transfer files, is applied in mobile terminal device, specifically comprises the steps:
In step S301, receive file waiting for transmission and file transfer instruction, in described file transfer instruction, carry key targeted customer mark;
In embodiments of the present invention, after the step receiving file waiting for transmission, also comprise: judge whether described file waiting for transmission comprises default keyword; If judge that described file waiting for transmission comprises default keyword, determine that described file waiting for transmission is the file needing encryption, then perform step S302.
But, be understandable that, if judge that described file waiting for transmission does not comprise default keyword, then need not encrypt, directly by file transfer to recipient's mobile terminal.
In step s 302, according to described key targeted customer mark, the video window of sender mobile terminal is opened;
In embodiments of the present invention, when key targeted customer is recipient's mobile phone users, so by the video window of sender mobile terminal, gather the eyeball information of recipient's mobile phone users.
In step S303, gathered the eyeball information of recipient's mobile phone users by described video window;
In embodiments of the present invention, such as, eyeball information includes but not limited to; Iris information, sclera information etc.
In step s 304, the eyeball information of the recipient's mobile phone users collected, is encrypted described file waiting for transmission.
In step S305, according to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
As from the foregoing, the present embodiment, by when transfer files, opens video window, gathers the eyeball information of recipient's mobile phone users as encryption key; According to this eyeball information, described file is encrypted, after encryption, sends to recipient's mobile terminal again.Therefore, the present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.
Embodiment four
Refer to Fig. 4, be depicted as the decryption method of the transfer files that the embodiment of the present invention provides.
The decryption method of described transfer files, is applied in mobile terminal device, specifically comprises the steps:
In step S401, receive encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
In embodiments of the present invention, the encrypt file received adopts the encryption method of above-mentioned transfer files to be encrypted the file obtained.
In step S402, according to described deciphering designated user mark, obtain the key that described encrypt file is decrypted;
In step S403, adopt the key of described deciphering, described encrypt file is decrypted;
In embodiments of the present invention, adopt the key of described deciphering, after the step that described encrypt file is decrypted, also comprise: judge, within the time of presetting, to decipher failed number of times and whether exceed default threshold value; If decipher failed number of times to exceed default threshold value, then delete described encrypt file.
In step s 404, successful decryption, then open described file.
In embodiments of the present invention, after successful decryption, open described file and check for recipient user; When receiving modify instruction, do not perform the retouching operation that described modify instruction is corresponding.
But, be understandable that, if decipher unsuccessfully, then cannot open described file.
Further, if decipher unsuccessfully, then cannot open described file, and delete described encrypt file.
As from the foregoing, the present embodiment recipient mobile terminal, according to the eyeball information of specifying, is decrypted the encrypt file received, only has successful decryption, just can open file and check; If decipher unsuccessfully, then cannot open described file, and delete described encrypt file.Therefore, the present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.
Embodiment five
Refer to Fig. 5, be depicted as the decryption method of the transfer files that the embodiment of the present invention provides.
The decryption method of described transfer files, is applied in mobile terminal device, specifically comprises the steps:
In step S501, receive encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
In embodiments of the present invention, the encrypt file received adopts the encryption method of above-mentioned transfer files to be encrypted the file obtained.
In step S502, according to described deciphering designated user mark, open the eyeball acquisition module of recipient's mobile terminal;
In embodiments of the present invention, when described deciphering designated user is designated the user profile of recipient's mobile terminal, according to this user profile, open the eyeball acquisition module of recipient's mobile terminal, gather the eyeball information of recipient's mobile phone users, using the key as deciphering.
In step S503, by described eyeball acquisition module, gather the eyeball information of recipient's mobile phone users;
In step S504, the eyeball information of the recipient's mobile phone users collected, is decrypted described encrypt file.
In embodiments of the present invention, after the step that described encrypt file is decrypted, also comprise: judge, within the time of presetting, to decipher failed number of times and whether exceed default threshold value; If decipher failed number of times to exceed default threshold value, then delete described encrypt file.
In step S505, successful decryption, then open described file.
In embodiments of the present invention, after successful decryption, open described file and check for recipient user; When receiving modify instruction, do not perform the retouching operation that described modify instruction is corresponding.
But, be understandable that, if decipher unsuccessfully, then cannot open described file.
Further, if decipher unsuccessfully, then cannot open described file, and delete described encrypt file.
As from the foregoing, the present embodiment recipient mobile terminal, according to the eyeball information of specifying, is decrypted the encrypt file received, only has successful decryption, just can open file and check; If decipher unsuccessfully, then cannot open described file, and delete described encrypt file.Therefore, the present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.
Embodiment six
Refer to Fig. 6, be depicted as the decryption method of the transfer files that the embodiment of the present invention provides.
The decryption method of described transfer files, is applied in mobile terminal device, specifically comprises the steps:
In step s 601, encrypt file and the deciphering designated user mark of sender mobile terminal transmission is received;
In embodiments of the present invention, the encrypt file received adopts the encryption method of above-mentioned transfer files to be encrypted the file obtained.
In step S602, receive the eyeball information that sender mobile terminal sends, and obtain eyeball information according to deciphering designated user mark, wherein, described eyeball information is the eyeball information of sender mobile terminal user;
In embodiments of the present invention, when deciphering designated user is designated the user profile of sender mobile terminal, the eyeball information of sender mobile terminal user is so obtained, using the key as deciphering.
In step S603, adopt the eyeball information of the sender mobile terminal user got, described encrypt file is decrypted.
In embodiments of the present invention, after the step that described encrypt file is decrypted, also comprise: judge, within the time of presetting, to decipher failed number of times and whether exceed default threshold value; If decipher failed number of times to exceed default threshold value, then delete described encrypt file.
In step s 604, successful decryption, then open described file.
In embodiments of the present invention, after successful decryption, open described file and check for recipient user; When receiving modify instruction, do not perform the retouching operation that described modify instruction is corresponding.
But, be understandable that, if decipher unsuccessfully, then cannot open described file.
Further, if decipher unsuccessfully, then cannot open described file, and delete described encrypt file.
As from the foregoing, the present embodiment recipient mobile terminal, according to the eyeball information of specifying, is decrypted the encrypt file received, only has successful decryption, just can open file and check; If decipher unsuccessfully, then cannot open described file, and delete described encrypt file.Therefore, the present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.
Embodiment seven
Refer to Fig. 7, the structural representation of the encryption device of the transfer files provided for the embodiment of the present invention seven; For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.The encryption device of described transfer files comprises: receiver module 101, Key Acquisition Module 102, encrypting module 103 and transport module 104.The encryption device of described transfer files can be the unit of the software unit be built in mobile terminal, hardware cell or software and hardware combining.
Receiver module 101, for receiving file waiting for transmission and file transfer instruction, carries key targeted customer mark in described file transfer instruction;
Key Acquisition Module 102, for according to described key targeted customer mark, obtains the key be encrypted described file waiting for transmission;
Encrypting module 103, is encrypted for adopting file waiting for transmission described in described double secret key;
Transport module 104, for according to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
In embodiments of the present invention, the encryption device of described transfer files also comprises: judge module.
Namely receive file waiting for transmission and file transfer instruction at receiver module 101, after carrying key targeted customer mark in described file transfer instruction, judge whether described file waiting for transmission comprises default keyword by judge module; Key Acquisition Module, if judge that described file waiting for transmission comprises default keyword specifically for described judge module, determines that described file waiting for transmission is the file needing encryption, performs the key obtaining and be encrypted described file waiting for transmission.
Embodiment eight
Refer to Fig. 8, the structural representation of the encryption device of the transfer files provided for the embodiment of the present invention eight; For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.The encryption device of described transfer files comprises: receiver module 201, opening module 202, eyeball acquisition module 203, encrypting module 204 and transport module 205.The encryption device of described transfer files can be the unit of the software unit be built in mobile terminal, hardware cell or software and hardware combining.
Receiver module 201, for receiving file waiting for transmission and file transfer instruction, carries key targeted customer mark in described file transfer instruction;
Opening module 202, for according to described key targeted customer mark, opens the eyeball acquisition module of sender mobile terminal;
Eyeball acquisition module 203, for gathering the eyeball information of sender mobile terminal user;
Encrypting module 204, specifically for the eyeball information of sender mobile terminal user collected, is encrypted described file waiting for transmission.
Transport module 205, for according to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
Embodiment nine
Refer to Fig. 9, the structural representation of the encryption device of the transfer files provided for the embodiment of the present invention nine; For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.The encryption device of described transfer files comprises: receiver module 301, video window opening module 302, video acquisition module 303, encrypting module 304 and transport module 305.The encryption device of described transfer files can be the unit of the software unit be built in mobile terminal, hardware cell or software and hardware combining.
Receiver module 301, for receiving file waiting for transmission and file transfer instruction, carries key targeted customer mark in described file transfer instruction;
Video window opening module 302, for according to described key targeted customer mark, opens the video window of sender mobile terminal;
Video acquisition module 303, for gathering the eyeball information of recipient's mobile phone users by described video window;
Encrypting module 304, specifically for the eyeball information of recipient's mobile phone users collected, is encrypted described file waiting for transmission.
Transport module 305, for according to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
Embodiment ten
Refer to Figure 10, the structural representation of the encryption device of the transfer files provided for the embodiment of the present invention ten; For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.The encryption device of described transfer files comprises: receiver module 401, Key Acquisition Module 402, deciphering module 403 and File Open module 404.The encryption device of described transfer files can be the unit of the software unit be built in mobile terminal, hardware cell or software and hardware combining.
Receiver module 401, for receiving encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
Key Acquisition Module 402, for according to described deciphering designated user mark, obtains the key be decrypted described encrypt file;
Deciphering module 403, for adopting the key of described deciphering, is decrypted described encrypt file;
File Open module 404, for successful decryption, then opens described file.
In embodiments of the present invention, the decryption device of described transfer files also comprises: number of times judge module.
Namely when deciphering module 403 adopts encrypt file described in the double secret key of described deciphering to be decrypted; Number of times judge module, for judging, deciphers failed number of times and whether exceedes default threshold value within the time of presetting; For described number of times judge module, file erase module, judges that the failed number of times of deciphering exceedes default threshold value, then deletes described encrypt file.
In embodiments of the present invention, the decryption device of described transfer files also comprises: control module;
File Open module, after successful decryption, opens described file and checks for recipient user;
Control module, for when receiving modify instruction, controls not perform retouching operation corresponding to described modify instruction.
Embodiment 11
Refer to Figure 11, the structural representation of the encryption device of the transfer files provided for the embodiment of the present invention 11; For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.The encryption device of described transfer files comprises: receiver module 501, opening module 502, eyeball acquisition module 503, deciphering module 504 and File Open module 505.The encryption device of described transfer files can be the unit of the software unit be built in mobile terminal, hardware cell or software and hardware combining.
Receiver module 501, for receiving encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
Opening module 502, for according to described deciphering designated user mark, opens the eyeball acquisition module of recipient's mobile terminal;
Eyeball acquisition module 503, for gathering the eyeball information of recipient's mobile phone users;
Deciphering module 504, specifically for the eyeball information of recipient's mobile phone users collected, is decrypted described encrypt file.
File Open module 505, for successful decryption, then opens described file.
In embodiments of the present invention, the decryption device of described transfer files also comprises: number of times judge module.
Namely when deciphering module adopts encrypt file described in the double secret key of described deciphering to be decrypted; Number of times judge module, for judging, deciphers failed number of times and whether exceedes default threshold value within the time of presetting; For described number of times judge module, file erase module, judges that the failed number of times of deciphering exceedes default threshold value, then deletes described encrypt file.
In embodiments of the present invention, the decryption device of described transfer files also comprises: control module;
File Open module, after successful decryption, opens described file and checks for recipient user;
Control module, for when receiving modify instruction, controls not perform retouching operation corresponding to described modify instruction.
Embodiment 12
Refer to Figure 12, the structural representation of the encryption device of the transfer files provided for the embodiment of the present invention 12; For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.The encryption device of described transfer files comprises: receiver module 601, Key Acquisition Module 602, deciphering module 603 and File Open module 604.The encryption device of described transfer files can be the unit of the software unit be built in mobile terminal, hardware cell or software and hardware combining.
Receiver module 601, for receiving encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
Key Acquisition Module 602, specifically for according to described deciphering designated user mark, receive and obtain the eyeball information of sender mobile terminal transmission, wherein, described eyeball information is the eyeball information of sender mobile terminal user;
Deciphering module 603, specifically for adopting the eyeball information of the sender mobile terminal user got, is decrypted described encrypt file.
File Open module 604, for successful decryption, then opens described file.
In embodiments of the present invention, the decryption device of described transfer files also comprises: number of times judge module.
Namely when deciphering module adopts encrypt file described in the double secret key of described deciphering to be decrypted; Number of times judge module, for judging, deciphers failed number of times and whether exceedes default threshold value within the time of presetting; For described number of times judge module, file erase module, judges that the failed number of times of deciphering exceedes default threshold value, then deletes described encrypt file.
In embodiments of the present invention, the decryption device of described transfer files also comprises: control module;
File Open module, after successful decryption, opens described file and checks for recipient user;
Control module, for when receiving modify instruction, controls not perform retouching operation corresponding to described modify instruction.
The encryption and decryption method of transfer files of the present invention and encryption and decryption device, by when transfer files, eyeball information according to specifying is encrypted described file, recipient's mobile terminal is sent to again after encryption, the eyeball information that recipient's acquisition for mobile terminal is specified, the encrypt file received is decrypted, only has successful decryption, just can open file and check.Therefore, the present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.
Encryption and decryption method and the encryption and decryption device of the transfer files that the embodiment of the present invention provides belong to same design, and its specific implementation process refers to specification in full, repeats no more herein.
In sum; although the present invention discloses as above with preferred embodiment; but above preferred embodiment is also not used to limit the present invention; those of ordinary skill in the art; without departing from the spirit and scope of the present invention; all can do various change and retouching, the scope that therefore protection scope of the present invention defines with claim is as the criterion.
Claims (18)
1. an encryption method for transfer files, is characterized in that, the encryption method of described transfer files comprises the following steps:
Receive file waiting for transmission and file transfer instruction, in described file transfer instruction, carry key targeted customer mark;
According to described key targeted customer mark, obtain the key that described file waiting for transmission is encrypted;
File waiting for transmission described in described double secret key is adopted to be encrypted;
According to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
2. the encryption method of transfer files as claimed in claim 1, is characterized in that, described receive the step of file waiting for transmission after, also comprise:
Judge whether described file waiting for transmission comprises default keyword;
If judge that described file waiting for transmission comprises default keyword, determine that described file waiting for transmission is the file needing encryption, then perform the step of described acquisition to the key that described file waiting for transmission is encrypted.
3. the encryption method of transfer files as claimed in claim 1, it is characterized in that, described acquisition, to the step of the key that described file waiting for transmission is encrypted, specifically comprises:
Open the eyeball acquisition module of sender mobile terminal;
By described eyeball acquisition module, gather the eyeball information of sender mobile terminal user;
Adopt the step that described in described double secret key, file waiting for transmission is encrypted, specifically comprise:
The eyeball information of the sender mobile terminal user collected, is encrypted described file waiting for transmission.
4. the encryption method of transfer files as claimed in claim 1, it is characterized in that, described acquisition, to the step of the key that described file waiting for transmission is encrypted, specifically comprises:
Open the video window of sender mobile terminal;
The eyeball information of recipient's mobile phone users is gathered by described video window;
Adopt the step that described in described double secret key, file waiting for transmission is encrypted, specifically comprise:
The eyeball information of the recipient's mobile phone users collected, is encrypted described file waiting for transmission.
5. a decryption method for transfer files, is characterized in that, the decryption method of described transfer files comprises the following steps:
Receive encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
According to described deciphering designated user mark, obtain the key that described encrypt file is decrypted;
Adopt the key of described deciphering, described encrypt file is decrypted;
Successful decryption, then open described file.
6. the decryption method of transfer files as claimed in claim 5, it is characterized in that, when described key is the eyeball information of recipient's mobile phone users, described acquisition, to the step of the key that described encrypt file is decrypted, specifically comprises:
Open the eyeball acquisition module of recipient's mobile terminal;
By described eyeball acquisition module, gather the eyeball information of recipient's mobile phone users;
The key of the described deciphering of described employing, to the step that described encrypt file is decrypted, specifically comprises:
The eyeball information of the recipient's mobile phone users collected, is decrypted described encrypt file.
7. the decryption method of transfer files as claimed in claim 5, it is characterized in that, when described key is the eyeball information of sender mobile terminal user, described acquisition, to the step of the key that described encrypt file is decrypted, specifically comprises:
Receive and obtain sender mobile terminal send eyeball information, wherein, described eyeball information is the eyeball information of sender mobile terminal user;
The key of the described deciphering of described employing, to the step that described encrypt file is decrypted, specifically comprises:
Adopt the eyeball information of the sender mobile terminal user got, described encrypt file is decrypted.
8. the decryption method of transfer files as claimed in claim 5, is characterized in that, adopt the key of described deciphering, after the step be decrypted, also comprise described encrypt file:
Judge, within the time of presetting, to decipher failed number of times and whether exceed default threshold value;
If decipher failed number of times to exceed default threshold value, then delete described encrypt file.
9. the decryption method of transfer files as claimed in claim 5, is characterized in that described successful decryption is then opened the step of described file, specifically comprised:
After successful decryption, open described file and check for recipient user;
When receiving modify instruction, do not perform the retouching operation that described modify instruction is corresponding.
10. an encryption device for transfer files, is characterized in that, the encryption device of described transfer files comprises:
Receiver module, for receiving file waiting for transmission and file transfer instruction, carries key targeted customer mark in described file transfer instruction;
Key Acquisition Module, for according to described key targeted customer mark, obtains the key be encrypted described file waiting for transmission;
Encrypting module, is encrypted for adopting file waiting for transmission described in described double secret key;
Transport module, for according to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
The encryption device of 11. transfer files as claimed in claim 10, it is characterized in that, the encryption device of described transfer files also comprises: judge module;
Judge module, for judging whether described file waiting for transmission comprises default keyword;
Key Acquisition Module, if judge that described file waiting for transmission comprises default keyword specifically for described judge module, determines that described file waiting for transmission is the file needing encryption, performs the key obtaining and be encrypted described file waiting for transmission.
The encryption device of 12. transfer files as claimed in claim 10, it is characterized in that, described Key Acquisition Module specifically comprises: opening module and eyeball acquisition module;
Opening module, for opening the eyeball acquisition module of sender mobile terminal;
Eyeball acquisition module, for gathering the eyeball information of sender mobile terminal user;
Encrypting module, specifically for the eyeball information of sender mobile terminal user collected, is encrypted described file waiting for transmission.
The encryption device of 13. transfer files as claimed in claim 10, it is characterized in that, described Key Acquisition Module specifically comprises: video window opening module and video acquisition module;
Video window opening module, for opening the video window of sender mobile terminal;
Video acquisition module, for gathering the eyeball information of recipient's mobile phone users by described video window;
Encrypting module, specifically for the eyeball information of recipient's mobile phone users collected, is encrypted described file waiting for transmission.
The decryption device of 14. 1 kinds of transfer files, is characterized in that, the decryption device of described transfer files comprises:
Receiver module, for receiving encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
Key Acquisition Module, for according to described deciphering designated user mark, obtains the key be decrypted described encrypt file;
Deciphering module, for adopting the key of described deciphering, is decrypted described encrypt file;
File Open module, for successful decryption, then opens described file.
The decryption device of 15. transfer files as claimed in claim 14, is characterized in that, when described key is the eyeball information of recipient's mobile phone users, described Key Acquisition Module specifically comprises: opening module and eyeball acquisition module;
Opening module, for opening the eyeball acquisition module of recipient's mobile terminal;
Eyeball acquisition module, for gathering the eyeball information of recipient's mobile phone users;
Deciphering module, specifically for the eyeball information of recipient's mobile phone users collected, is decrypted described encrypt file.
The decryption device of 16. transfer files as claimed in claim 14, is characterized in that,
Key Acquisition Module, specifically for receive and obtain sender mobile terminal send eyeball information, wherein, described eyeball information is the eyeball information of sender mobile terminal user;
Deciphering module, specifically for adopting the eyeball information of the sender mobile terminal user got, is decrypted described encrypt file.
The decryption device of 17. transfer files as claimed in claim 14, it is characterized in that, the decryption device of described transfer files also comprises:
Number of times judge module, for judging, deciphers failed number of times and whether exceedes default threshold value within the time of presetting;
For described number of times judge module, file erase module, judges that the failed number of times of deciphering exceedes default threshold value, then deletes described encrypt file.
The decryption device of 18. transfer files as claimed in claim 14, it is characterized in that, the decryption device of described transfer files also comprises: control module;
File Open module, after successful decryption, opens described file and checks for recipient user;
Control module, for when receiving modify instruction, controls not perform retouching operation corresponding to described modify instruction.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510719602.7A CN105227578B (en) | 2015-10-28 | 2015-10-28 | Transmit the encryption and decryption approaches of file |
CN201810130388.5A CN108200093B (en) | 2015-10-28 | 2015-10-28 | Encryption and decryption method and encryption and decryption device for transmission file |
PCT/CN2016/091081 WO2017071324A1 (en) | 2015-10-28 | 2016-07-22 | File-transmission encryption and decryption method and encryption and decryption device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510719602.7A CN105227578B (en) | 2015-10-28 | 2015-10-28 | Transmit the encryption and decryption approaches of file |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810130388.5A Division CN108200093B (en) | 2015-10-28 | 2015-10-28 | Encryption and decryption method and encryption and decryption device for transmission file |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105227578A true CN105227578A (en) | 2016-01-06 |
CN105227578B CN105227578B (en) | 2018-02-16 |
Family
ID=54996257
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510719602.7A Expired - Fee Related CN105227578B (en) | 2015-10-28 | 2015-10-28 | Transmit the encryption and decryption approaches of file |
CN201810130388.5A Active CN108200093B (en) | 2015-10-28 | 2015-10-28 | Encryption and decryption method and encryption and decryption device for transmission file |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810130388.5A Active CN108200093B (en) | 2015-10-28 | 2015-10-28 | Encryption and decryption method and encryption and decryption device for transmission file |
Country Status (2)
Country | Link |
---|---|
CN (2) | CN105227578B (en) |
WO (1) | WO2017071324A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106170006A (en) * | 2016-09-29 | 2016-11-30 | 广州鹤互联网科技有限公司 | A kind of electronic endorsement method for managing security and system |
WO2017071324A1 (en) * | 2015-10-28 | 2017-05-04 | 广东欧珀移动通信有限公司 | File-transmission encryption and decryption method and encryption and decryption device |
CN108377319A (en) * | 2018-03-15 | 2018-08-07 | 北京顶象技术有限公司 | picture transmission method and device |
CN109218451A (en) * | 2018-11-14 | 2019-01-15 | 郑州云海信息技术有限公司 | A kind of data transmission method of distributed cluster system, device, equipment and medium |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112823349A (en) * | 2018-11-21 | 2021-05-18 | 深圳市欢太科技有限公司 | Data processing method, data processing device, electronic equipment and storage medium |
CN111464531B (en) * | 2020-03-31 | 2021-12-14 | 洛阳理工学院 | Instant confirmation type file transmission method based on multiple encryption |
WO2022198595A1 (en) * | 2021-03-25 | 2022-09-29 | 华为技术有限公司 | Encryption control method and apparatus for data transmission |
CN113486380B (en) * | 2021-07-23 | 2023-04-11 | 西安万像电子科技有限公司 | Encryption method of text file |
CN115174136B (en) * | 2022-05-23 | 2024-02-02 | 北京旷视科技有限公司 | Data acquisition and data transmission method, terminal, server and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009132977A1 (en) * | 2008-04-30 | 2009-11-05 | Thales | Reliable resource integrated in a biometric data control device ensuring inspection security and data security |
CN103414790A (en) * | 2013-08-30 | 2013-11-27 | 苏州跨界软件科技有限公司 | File transfer system based on NFC |
CN104992100A (en) * | 2015-07-15 | 2015-10-21 | 西安凯虹电子科技有限公司 | Iris dynamic encryption and decryption system and method for electronic document flowing |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001092994A2 (en) * | 2000-06-02 | 2001-12-06 | Kinetic Sciences Inc. | Method for biometric encryption of e-mail |
US20080170689A1 (en) * | 2006-08-07 | 2008-07-17 | David Boubion | Systems and methods for conducting secure wired and wireless networked telephony |
CN102710613B (en) * | 2012-05-14 | 2014-12-17 | 西安电子科技大学 | Signcryption method of biological features of a plurality of receivers |
US20140032924A1 (en) * | 2012-07-30 | 2014-01-30 | David M. Durham | Media encryption based on biometric data |
US10623400B2 (en) * | 2013-10-14 | 2020-04-14 | Greg Hauw | Method and device for credential and data protection |
CN108183972B (en) * | 2014-11-19 | 2019-08-30 | Oppo广东移动通信有限公司 | Document handling method and terminal |
CN105227578B (en) * | 2015-10-28 | 2018-02-16 | 广东欧珀移动通信有限公司 | Transmit the encryption and decryption approaches of file |
-
2015
- 2015-10-28 CN CN201510719602.7A patent/CN105227578B/en not_active Expired - Fee Related
- 2015-10-28 CN CN201810130388.5A patent/CN108200093B/en active Active
-
2016
- 2016-07-22 WO PCT/CN2016/091081 patent/WO2017071324A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009132977A1 (en) * | 2008-04-30 | 2009-11-05 | Thales | Reliable resource integrated in a biometric data control device ensuring inspection security and data security |
CN103414790A (en) * | 2013-08-30 | 2013-11-27 | 苏州跨界软件科技有限公司 | File transfer system based on NFC |
CN104992100A (en) * | 2015-07-15 | 2015-10-21 | 西安凯虹电子科技有限公司 | Iris dynamic encryption and decryption system and method for electronic document flowing |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017071324A1 (en) * | 2015-10-28 | 2017-05-04 | 广东欧珀移动通信有限公司 | File-transmission encryption and decryption method and encryption and decryption device |
CN106170006A (en) * | 2016-09-29 | 2016-11-30 | 广州鹤互联网科技有限公司 | A kind of electronic endorsement method for managing security and system |
CN108377319A (en) * | 2018-03-15 | 2018-08-07 | 北京顶象技术有限公司 | picture transmission method and device |
CN108377319B (en) * | 2018-03-15 | 2020-04-17 | 北京顶象技术有限公司 | Picture transmission method and device |
CN109218451A (en) * | 2018-11-14 | 2019-01-15 | 郑州云海信息技术有限公司 | A kind of data transmission method of distributed cluster system, device, equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN105227578B (en) | 2018-02-16 |
WO2017071324A1 (en) | 2017-05-04 |
CN108200093B (en) | 2021-08-24 |
CN108200093A (en) | 2018-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105227578A (en) | The encryption and decryption method of transfer files and encryption and decryption device | |
CN105262756A (en) | Data encryption method, data decryption method, data encryption apparatus, and data decryption apparatus | |
US10237247B2 (en) | User interface systems and methods for secure message oriented communications | |
Rayarikar et al. | SMS encryption using AES algorithm on android | |
CN109792451B (en) | Communication channel encryption, decryption and establishment method and device, memory and terminal | |
CN105260669B (en) | The transmission method and Transmission system of photo | |
CN105227302A (en) | The shared method of password and the shared system of password | |
US10462185B2 (en) | Policy-managed secure code execution and messaging for computing devices and computing device security | |
US9659189B2 (en) | Systems and methods of safeguarding user information while interacting with online service providers | |
WO2014051558A1 (en) | Shared secret identification for secure communication | |
CN105634737A (en) | Data transmission method, terminals and system thereof | |
CN104270516A (en) | Decryption method and mobile terminal | |
CN107666395A (en) | One population file management method, user terminal, group chat system | |
CN101957894B (en) | Conditional e-file authority controlling and managing system and method | |
CN103067897A (en) | Asymmetrical mobile phone short message encryption method | |
Riaz et al. | Development of a secure SMS application using advanced encryption standard (AES) on android platform | |
US20190014089A1 (en) | Data Security Protection Method and Apparatus | |
CN105827601A (en) | Data encryption application method and system of mobile device | |
Kumar et al. | Security issues in m-government | |
CN105430150A (en) | Method and device for implementing secure call | |
US20180255441A1 (en) | Portable terminal, gateway device and electronic device | |
CN105516968A (en) | Smart password key-based mobile phone data transmission method | |
Demirol et al. | An android application to secure text messages | |
CN203070303U (en) | Picture management system based on fingerprint authentication | |
CN110476392B (en) | Techniques for key ratcheting with multiple steps |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180216 |