CN105227578A - The encryption and decryption method of transfer files and encryption and decryption device - Google Patents

The encryption and decryption method of transfer files and encryption and decryption device Download PDF

Info

Publication number
CN105227578A
CN105227578A CN201510719602.7A CN201510719602A CN105227578A CN 105227578 A CN105227578 A CN 105227578A CN 201510719602 A CN201510719602 A CN 201510719602A CN 105227578 A CN105227578 A CN 105227578A
Authority
CN
China
Prior art keywords
file
key
transmission
module
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510719602.7A
Other languages
Chinese (zh)
Other versions
CN105227578B (en
Inventor
张海平
周意保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510719602.7A priority Critical patent/CN105227578B/en
Priority to CN201810130388.5A priority patent/CN108200093B/en
Publication of CN105227578A publication Critical patent/CN105227578A/en
Priority to PCT/CN2016/091081 priority patent/WO2017071324A1/en
Application granted granted Critical
Publication of CN105227578B publication Critical patent/CN105227578B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The encryption method that the invention provides a kind of transfer files comprises the following steps: receive file waiting for transmission and file transfer instruction, carries key targeted customer mark in described file transfer instruction; According to described key targeted customer mark, obtain the key that described file waiting for transmission is encrypted; File waiting for transmission described in described double secret key is adopted to be encrypted; According to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.The present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.

Description

The encryption and decryption method of transfer files and encryption and decryption device
Technical field
The present invention relates to encryption and decryption technology field, particularly relate to a kind of encryption and decryption method and encryption and decryption device of transfer files.
Background technology
Along with the development of society, the Internet and mobile Internet have become in people's life, an inseparable part, and bring various convenience with simultaneously efficiently in the Internet, the leakage of individual subscriber privacy also becomes the focus of concern.In the prior art, even if instant chat software or communication tool are not all encrypted file content itself when file transfer, as long as that is any other people gets this file and just normally can open and check, obtain content wherein.Such fail safe is very poor, if need to transmit some classified papers by instant chat software, or computer is invaded by others, and so some valuable individual privacies or classified papers may just be easy to reveal.
Therefore, there is larger safety problem in the secret file of applying Internet user in the related.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of encryption and decryption method and encryption and decryption device of transfer files, there is larger safety problem in the secret file being intended to solve applying Internet user in prior art.
For solving the problems of the technologies described above, embodiments provide following technical scheme:
The invention provides a kind of encryption method of transfer files, the encryption method of described transfer files comprises the following steps:
Receive file waiting for transmission and file transfer instruction, in described file transfer instruction, carry key targeted customer mark;
According to described key targeted customer mark, obtain the key that described file waiting for transmission is encrypted;
File waiting for transmission described in described double secret key is adopted to be encrypted;
According to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
Present invention also offers a kind of decryption method of transfer files, the decryption method of described transfer files comprises the following steps:
Receive encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
According to described deciphering designated user mark, obtain the key that described encrypt file is decrypted;
Adopt the key of described deciphering, described encrypt file is decrypted;
Successful decryption, then open described file.
Present invention also offers a kind of encryption device of transfer files, the encryption device of described transfer files comprises:
Receiver module, for receiving file waiting for transmission and file transfer instruction, carries key targeted customer mark in described file transfer instruction;
Key Acquisition Module, for according to described key targeted customer mark, obtains the key be encrypted described file waiting for transmission;
Encrypting module, is encrypted for adopting file waiting for transmission described in described double secret key;
Transport module, for according to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
Present invention also offers a kind of decryption device of transfer files, the decryption device of described transfer files comprises:
Receiver module, for receiving encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
Key Acquisition Module, for according to described deciphering designated user mark, obtains the key be decrypted described encrypt file;
Deciphering module, for adopting the key of described deciphering, is decrypted described encrypt file;
File Open module, for successful decryption, then opens described file.
Relative to prior art, the encryption and decryption method of transfer files of the present invention and encryption and decryption device, by when transfer files, eyeball information according to specifying is encrypted described file, send to recipient's mobile terminal again after encryption, the eyeball information that recipient's acquisition for mobile terminal is specified, the encrypt file received is decrypted, only have successful decryption, just can open file and check.Therefore, the present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.
Accompanying drawing explanation
Fig. 1 is the realization flow schematic diagram of the encryption method of the transfer files that the embodiment of the present invention one provides;
Fig. 2 is the realization flow schematic diagram of the encryption method of the transfer files that the embodiment of the present invention two provides;
Fig. 3 is the realization flow schematic diagram of the encryption method of the transfer files that the embodiment of the present invention three provides;
Fig. 4 is the realization flow schematic diagram of the decryption method of the transfer files that the embodiment of the present invention four provides;
Fig. 5 is the realization flow schematic diagram of the decryption method of the transfer files that the embodiment of the present invention five provides;
Fig. 6 is the realization flow schematic diagram of the decryption method of the transfer files that the embodiment of the present invention six provides;
Fig. 7 is the structural representation of the encryption device of the transfer files that the embodiment of the present invention seven provides;
Fig. 8 is the structural representation of the encryption device of the transfer files that the embodiment of the present invention eight provides;
Fig. 9 is the structural representation of the encryption device of the transfer files that the embodiment of the present invention nine provides;
Figure 10 is the structural representation of the decryption device of the transfer files that the embodiment of the present invention ten provides;
Figure 11 is the structural representation of the decryption device of the transfer files that the embodiment of the present invention 11 provides;
Figure 12 is the structural representation of the decryption device of the transfer files that the embodiment of the present invention 12 provides.
Embodiment
What please refer in accompanying drawing is graphic, and wherein identical element numbers represents identical assembly, and principle of the present invention implements to illustrate in a suitable computing environment.The following description is based on exemplified specific embodiments of the invention, and it should not be regarded as limiting the present invention not at other specific embodiment that this describes in detail.
The principle of the invention illustrates with above-mentioned word, and it is not represented as a kind of restriction, and those skilled in the art can recognize that the plurality of step of the following stated and operation also may be implemented in the middle of hardware.Principle of the present invention uses other wide usages many or specific purpose computing, communication environment or configuration to operate.
The encryption and decryption method of transfer files provided by the invention and encryption and decryption device, be mainly used in terminal equipment, as: mobile phone, computer, personal digital assistant (PersonalDigitalAssistant, PDA) etc.
To be described in detail respectively below.
Embodiment one
Refer to Fig. 1, be depicted as the encryption method of the transfer files that the embodiment of the present invention provides.
The encryption method of described transfer files, is applied in mobile terminal device, specifically comprises the steps:
In step S101, receive file waiting for transmission and file transfer instruction, in described file transfer instruction, carry key targeted customer mark;
In embodiments of the present invention, after the step receiving file waiting for transmission, also comprise: judge whether described file waiting for transmission comprises default keyword; If judge that described file waiting for transmission comprises default keyword, determine that described file waiting for transmission is the file needing encryption, then perform step S102.
But be understandable that, keyword can be " contract ", " agreement ", " important " etc., can require sets itself according to user.
Such as, after receiving file waiting for transmission, judge in described file content, whether to include " contract " two words, if included " contract ", then determine that described file waiting for transmission is the file needing encryption.At this moment, according to designated user information, obtain the eyeball information of described designated user as the key be encrypted described file waiting for transmission.
But, be understandable that, if judge not comprise " contract " two words in described file content, then need not encrypt, directly by file transfer to recipient's mobile terminal.
In step s 102, according to described key targeted customer mark, the key that described file waiting for transmission is encrypted is obtained;
In embodiments of the present invention, according to designated user information, obtain the eyeball information of described designated user as the key be encrypted described file waiting for transmission.Such as, eyeball information includes but not limited to; Iris information, sclera information etc.
In step s 103, file waiting for transmission described in described double secret key is adopted to be encrypted;
In embodiments of the present invention, adopt the eyeball information of designated user, described file waiting for transmission is encrypted.
In step S104, according to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
As from the foregoing, the present embodiment is by when transfer files, and the eyeball information according to specifying is encrypted described file, sends to recipient's mobile terminal again after encryption.Therefore, the present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.
Embodiment two
Refer to Fig. 2, be depicted as the encryption method of the transfer files that the embodiment of the present invention provides.
The encryption method of described transfer files, is applied in mobile terminal device, specifically comprises the steps:
In step s 201, receive file waiting for transmission and file transfer instruction, in described file transfer instruction, carry key targeted customer mark;
In embodiments of the present invention, after the step receiving file waiting for transmission, also comprise: judge whether described file waiting for transmission comprises default keyword; If judge that described file waiting for transmission comprises default keyword, determine that described file waiting for transmission is the file needing encryption, then perform step S202.
But, be understandable that, if judge that described file waiting for transmission does not comprise default keyword, then need not encrypt, directly by file transfer to recipient's mobile terminal.
In step S202, according to described key targeted customer mark, open the eyeball acquisition module of sender mobile terminal;
In embodiments of the present invention, according to designated user information, the user as specified is local terminal cellphone subscriber, so, opens the eyeball acquisition module of local terminal mobile phone (sender mobile terminal).
In step S203, by described eyeball acquisition module, gather the eyeball information of sender mobile terminal user;
In step S204, the eyeball information of the sender mobile terminal user collected, is encrypted described file waiting for transmission.
In embodiments of the present invention, adopt the eyeball information of local terminal cellphone subscriber, described file waiting for transmission is encrypted.
In step S205, according to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
But, be understandable that, if the user profile of specifying is preserved in the terminal in advance, so, according to described key targeted customer mark (user profile of namely specifying), from mobile terminal, directly read the eyeball information of designated user as the key be encrypted described file waiting for transmission, adopt the eyeball information of this designated user, described file waiting for transmission is encrypted.
As from the foregoing, the present embodiment, by when transfer files, is opened local terminal eyeball acquisition module, is gathered the eyeball information of this mobile phone users; According to this eyeball information, described file is encrypted, after encryption, sends to recipient's mobile terminal again.Therefore, the present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.
Embodiment three
Refer to Fig. 3, be depicted as the encryption method of the transfer files that the embodiment of the present invention provides.
The encryption method of described transfer files, is applied in mobile terminal device, specifically comprises the steps:
In step S301, receive file waiting for transmission and file transfer instruction, in described file transfer instruction, carry key targeted customer mark;
In embodiments of the present invention, after the step receiving file waiting for transmission, also comprise: judge whether described file waiting for transmission comprises default keyword; If judge that described file waiting for transmission comprises default keyword, determine that described file waiting for transmission is the file needing encryption, then perform step S302.
But, be understandable that, if judge that described file waiting for transmission does not comprise default keyword, then need not encrypt, directly by file transfer to recipient's mobile terminal.
In step s 302, according to described key targeted customer mark, the video window of sender mobile terminal is opened;
In embodiments of the present invention, when key targeted customer is recipient's mobile phone users, so by the video window of sender mobile terminal, gather the eyeball information of recipient's mobile phone users.
In step S303, gathered the eyeball information of recipient's mobile phone users by described video window;
In embodiments of the present invention, such as, eyeball information includes but not limited to; Iris information, sclera information etc.
In step s 304, the eyeball information of the recipient's mobile phone users collected, is encrypted described file waiting for transmission.
In step S305, according to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
As from the foregoing, the present embodiment, by when transfer files, opens video window, gathers the eyeball information of recipient's mobile phone users as encryption key; According to this eyeball information, described file is encrypted, after encryption, sends to recipient's mobile terminal again.Therefore, the present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.
Embodiment four
Refer to Fig. 4, be depicted as the decryption method of the transfer files that the embodiment of the present invention provides.
The decryption method of described transfer files, is applied in mobile terminal device, specifically comprises the steps:
In step S401, receive encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
In embodiments of the present invention, the encrypt file received adopts the encryption method of above-mentioned transfer files to be encrypted the file obtained.
In step S402, according to described deciphering designated user mark, obtain the key that described encrypt file is decrypted;
In step S403, adopt the key of described deciphering, described encrypt file is decrypted;
In embodiments of the present invention, adopt the key of described deciphering, after the step that described encrypt file is decrypted, also comprise: judge, within the time of presetting, to decipher failed number of times and whether exceed default threshold value; If decipher failed number of times to exceed default threshold value, then delete described encrypt file.
In step s 404, successful decryption, then open described file.
In embodiments of the present invention, after successful decryption, open described file and check for recipient user; When receiving modify instruction, do not perform the retouching operation that described modify instruction is corresponding.
But, be understandable that, if decipher unsuccessfully, then cannot open described file.
Further, if decipher unsuccessfully, then cannot open described file, and delete described encrypt file.
As from the foregoing, the present embodiment recipient mobile terminal, according to the eyeball information of specifying, is decrypted the encrypt file received, only has successful decryption, just can open file and check; If decipher unsuccessfully, then cannot open described file, and delete described encrypt file.Therefore, the present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.
Embodiment five
Refer to Fig. 5, be depicted as the decryption method of the transfer files that the embodiment of the present invention provides.
The decryption method of described transfer files, is applied in mobile terminal device, specifically comprises the steps:
In step S501, receive encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
In embodiments of the present invention, the encrypt file received adopts the encryption method of above-mentioned transfer files to be encrypted the file obtained.
In step S502, according to described deciphering designated user mark, open the eyeball acquisition module of recipient's mobile terminal;
In embodiments of the present invention, when described deciphering designated user is designated the user profile of recipient's mobile terminal, according to this user profile, open the eyeball acquisition module of recipient's mobile terminal, gather the eyeball information of recipient's mobile phone users, using the key as deciphering.
In step S503, by described eyeball acquisition module, gather the eyeball information of recipient's mobile phone users;
In step S504, the eyeball information of the recipient's mobile phone users collected, is decrypted described encrypt file.
In embodiments of the present invention, after the step that described encrypt file is decrypted, also comprise: judge, within the time of presetting, to decipher failed number of times and whether exceed default threshold value; If decipher failed number of times to exceed default threshold value, then delete described encrypt file.
In step S505, successful decryption, then open described file.
In embodiments of the present invention, after successful decryption, open described file and check for recipient user; When receiving modify instruction, do not perform the retouching operation that described modify instruction is corresponding.
But, be understandable that, if decipher unsuccessfully, then cannot open described file.
Further, if decipher unsuccessfully, then cannot open described file, and delete described encrypt file.
As from the foregoing, the present embodiment recipient mobile terminal, according to the eyeball information of specifying, is decrypted the encrypt file received, only has successful decryption, just can open file and check; If decipher unsuccessfully, then cannot open described file, and delete described encrypt file.Therefore, the present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.
Embodiment six
Refer to Fig. 6, be depicted as the decryption method of the transfer files that the embodiment of the present invention provides.
The decryption method of described transfer files, is applied in mobile terminal device, specifically comprises the steps:
In step s 601, encrypt file and the deciphering designated user mark of sender mobile terminal transmission is received;
In embodiments of the present invention, the encrypt file received adopts the encryption method of above-mentioned transfer files to be encrypted the file obtained.
In step S602, receive the eyeball information that sender mobile terminal sends, and obtain eyeball information according to deciphering designated user mark, wherein, described eyeball information is the eyeball information of sender mobile terminal user;
In embodiments of the present invention, when deciphering designated user is designated the user profile of sender mobile terminal, the eyeball information of sender mobile terminal user is so obtained, using the key as deciphering.
In step S603, adopt the eyeball information of the sender mobile terminal user got, described encrypt file is decrypted.
In embodiments of the present invention, after the step that described encrypt file is decrypted, also comprise: judge, within the time of presetting, to decipher failed number of times and whether exceed default threshold value; If decipher failed number of times to exceed default threshold value, then delete described encrypt file.
In step s 604, successful decryption, then open described file.
In embodiments of the present invention, after successful decryption, open described file and check for recipient user; When receiving modify instruction, do not perform the retouching operation that described modify instruction is corresponding.
But, be understandable that, if decipher unsuccessfully, then cannot open described file.
Further, if decipher unsuccessfully, then cannot open described file, and delete described encrypt file.
As from the foregoing, the present embodiment recipient mobile terminal, according to the eyeball information of specifying, is decrypted the encrypt file received, only has successful decryption, just can open file and check; If decipher unsuccessfully, then cannot open described file, and delete described encrypt file.Therefore, the present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.
Embodiment seven
Refer to Fig. 7, the structural representation of the encryption device of the transfer files provided for the embodiment of the present invention seven; For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.The encryption device of described transfer files comprises: receiver module 101, Key Acquisition Module 102, encrypting module 103 and transport module 104.The encryption device of described transfer files can be the unit of the software unit be built in mobile terminal, hardware cell or software and hardware combining.
Receiver module 101, for receiving file waiting for transmission and file transfer instruction, carries key targeted customer mark in described file transfer instruction;
Key Acquisition Module 102, for according to described key targeted customer mark, obtains the key be encrypted described file waiting for transmission;
Encrypting module 103, is encrypted for adopting file waiting for transmission described in described double secret key;
Transport module 104, for according to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
In embodiments of the present invention, the encryption device of described transfer files also comprises: judge module.
Namely receive file waiting for transmission and file transfer instruction at receiver module 101, after carrying key targeted customer mark in described file transfer instruction, judge whether described file waiting for transmission comprises default keyword by judge module; Key Acquisition Module, if judge that described file waiting for transmission comprises default keyword specifically for described judge module, determines that described file waiting for transmission is the file needing encryption, performs the key obtaining and be encrypted described file waiting for transmission.
Embodiment eight
Refer to Fig. 8, the structural representation of the encryption device of the transfer files provided for the embodiment of the present invention eight; For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.The encryption device of described transfer files comprises: receiver module 201, opening module 202, eyeball acquisition module 203, encrypting module 204 and transport module 205.The encryption device of described transfer files can be the unit of the software unit be built in mobile terminal, hardware cell or software and hardware combining.
Receiver module 201, for receiving file waiting for transmission and file transfer instruction, carries key targeted customer mark in described file transfer instruction;
Opening module 202, for according to described key targeted customer mark, opens the eyeball acquisition module of sender mobile terminal;
Eyeball acquisition module 203, for gathering the eyeball information of sender mobile terminal user;
Encrypting module 204, specifically for the eyeball information of sender mobile terminal user collected, is encrypted described file waiting for transmission.
Transport module 205, for according to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
Embodiment nine
Refer to Fig. 9, the structural representation of the encryption device of the transfer files provided for the embodiment of the present invention nine; For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.The encryption device of described transfer files comprises: receiver module 301, video window opening module 302, video acquisition module 303, encrypting module 304 and transport module 305.The encryption device of described transfer files can be the unit of the software unit be built in mobile terminal, hardware cell or software and hardware combining.
Receiver module 301, for receiving file waiting for transmission and file transfer instruction, carries key targeted customer mark in described file transfer instruction;
Video window opening module 302, for according to described key targeted customer mark, opens the video window of sender mobile terminal;
Video acquisition module 303, for gathering the eyeball information of recipient's mobile phone users by described video window;
Encrypting module 304, specifically for the eyeball information of recipient's mobile phone users collected, is encrypted described file waiting for transmission.
Transport module 305, for according to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
Embodiment ten
Refer to Figure 10, the structural representation of the encryption device of the transfer files provided for the embodiment of the present invention ten; For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.The encryption device of described transfer files comprises: receiver module 401, Key Acquisition Module 402, deciphering module 403 and File Open module 404.The encryption device of described transfer files can be the unit of the software unit be built in mobile terminal, hardware cell or software and hardware combining.
Receiver module 401, for receiving encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
Key Acquisition Module 402, for according to described deciphering designated user mark, obtains the key be decrypted described encrypt file;
Deciphering module 403, for adopting the key of described deciphering, is decrypted described encrypt file;
File Open module 404, for successful decryption, then opens described file.
In embodiments of the present invention, the decryption device of described transfer files also comprises: number of times judge module.
Namely when deciphering module 403 adopts encrypt file described in the double secret key of described deciphering to be decrypted; Number of times judge module, for judging, deciphers failed number of times and whether exceedes default threshold value within the time of presetting; For described number of times judge module, file erase module, judges that the failed number of times of deciphering exceedes default threshold value, then deletes described encrypt file.
In embodiments of the present invention, the decryption device of described transfer files also comprises: control module;
File Open module, after successful decryption, opens described file and checks for recipient user;
Control module, for when receiving modify instruction, controls not perform retouching operation corresponding to described modify instruction.
Embodiment 11
Refer to Figure 11, the structural representation of the encryption device of the transfer files provided for the embodiment of the present invention 11; For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.The encryption device of described transfer files comprises: receiver module 501, opening module 502, eyeball acquisition module 503, deciphering module 504 and File Open module 505.The encryption device of described transfer files can be the unit of the software unit be built in mobile terminal, hardware cell or software and hardware combining.
Receiver module 501, for receiving encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
Opening module 502, for according to described deciphering designated user mark, opens the eyeball acquisition module of recipient's mobile terminal;
Eyeball acquisition module 503, for gathering the eyeball information of recipient's mobile phone users;
Deciphering module 504, specifically for the eyeball information of recipient's mobile phone users collected, is decrypted described encrypt file.
File Open module 505, for successful decryption, then opens described file.
In embodiments of the present invention, the decryption device of described transfer files also comprises: number of times judge module.
Namely when deciphering module adopts encrypt file described in the double secret key of described deciphering to be decrypted; Number of times judge module, for judging, deciphers failed number of times and whether exceedes default threshold value within the time of presetting; For described number of times judge module, file erase module, judges that the failed number of times of deciphering exceedes default threshold value, then deletes described encrypt file.
In embodiments of the present invention, the decryption device of described transfer files also comprises: control module;
File Open module, after successful decryption, opens described file and checks for recipient user;
Control module, for when receiving modify instruction, controls not perform retouching operation corresponding to described modify instruction.
Embodiment 12
Refer to Figure 12, the structural representation of the encryption device of the transfer files provided for the embodiment of the present invention 12; For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.The encryption device of described transfer files comprises: receiver module 601, Key Acquisition Module 602, deciphering module 603 and File Open module 604.The encryption device of described transfer files can be the unit of the software unit be built in mobile terminal, hardware cell or software and hardware combining.
Receiver module 601, for receiving encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
Key Acquisition Module 602, specifically for according to described deciphering designated user mark, receive and obtain the eyeball information of sender mobile terminal transmission, wherein, described eyeball information is the eyeball information of sender mobile terminal user;
Deciphering module 603, specifically for adopting the eyeball information of the sender mobile terminal user got, is decrypted described encrypt file.
File Open module 604, for successful decryption, then opens described file.
In embodiments of the present invention, the decryption device of described transfer files also comprises: number of times judge module.
Namely when deciphering module adopts encrypt file described in the double secret key of described deciphering to be decrypted; Number of times judge module, for judging, deciphers failed number of times and whether exceedes default threshold value within the time of presetting; For described number of times judge module, file erase module, judges that the failed number of times of deciphering exceedes default threshold value, then deletes described encrypt file.
In embodiments of the present invention, the decryption device of described transfer files also comprises: control module;
File Open module, after successful decryption, opens described file and checks for recipient user;
Control module, for when receiving modify instruction, controls not perform retouching operation corresponding to described modify instruction.
The encryption and decryption method of transfer files of the present invention and encryption and decryption device, by when transfer files, eyeball information according to specifying is encrypted described file, recipient's mobile terminal is sent to again after encryption, the eyeball information that recipient's acquisition for mobile terminal is specified, the encrypt file received is decrypted, only has successful decryption, just can open file and check.Therefore, the present invention can guarantee the fail safe of Internet Transmission file, not only convenient but also quick, improves the experience of user greatly.
Encryption and decryption method and the encryption and decryption device of the transfer files that the embodiment of the present invention provides belong to same design, and its specific implementation process refers to specification in full, repeats no more herein.
In sum; although the present invention discloses as above with preferred embodiment; but above preferred embodiment is also not used to limit the present invention; those of ordinary skill in the art; without departing from the spirit and scope of the present invention; all can do various change and retouching, the scope that therefore protection scope of the present invention defines with claim is as the criterion.

Claims (18)

1. an encryption method for transfer files, is characterized in that, the encryption method of described transfer files comprises the following steps:
Receive file waiting for transmission and file transfer instruction, in described file transfer instruction, carry key targeted customer mark;
According to described key targeted customer mark, obtain the key that described file waiting for transmission is encrypted;
File waiting for transmission described in described double secret key is adopted to be encrypted;
According to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
2. the encryption method of transfer files as claimed in claim 1, is characterized in that, described receive the step of file waiting for transmission after, also comprise:
Judge whether described file waiting for transmission comprises default keyword;
If judge that described file waiting for transmission comprises default keyword, determine that described file waiting for transmission is the file needing encryption, then perform the step of described acquisition to the key that described file waiting for transmission is encrypted.
3. the encryption method of transfer files as claimed in claim 1, it is characterized in that, described acquisition, to the step of the key that described file waiting for transmission is encrypted, specifically comprises:
Open the eyeball acquisition module of sender mobile terminal;
By described eyeball acquisition module, gather the eyeball information of sender mobile terminal user;
Adopt the step that described in described double secret key, file waiting for transmission is encrypted, specifically comprise:
The eyeball information of the sender mobile terminal user collected, is encrypted described file waiting for transmission.
4. the encryption method of transfer files as claimed in claim 1, it is characterized in that, described acquisition, to the step of the key that described file waiting for transmission is encrypted, specifically comprises:
Open the video window of sender mobile terminal;
The eyeball information of recipient's mobile phone users is gathered by described video window;
Adopt the step that described in described double secret key, file waiting for transmission is encrypted, specifically comprise:
The eyeball information of the recipient's mobile phone users collected, is encrypted described file waiting for transmission.
5. a decryption method for transfer files, is characterized in that, the decryption method of described transfer files comprises the following steps:
Receive encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
According to described deciphering designated user mark, obtain the key that described encrypt file is decrypted;
Adopt the key of described deciphering, described encrypt file is decrypted;
Successful decryption, then open described file.
6. the decryption method of transfer files as claimed in claim 5, it is characterized in that, when described key is the eyeball information of recipient's mobile phone users, described acquisition, to the step of the key that described encrypt file is decrypted, specifically comprises:
Open the eyeball acquisition module of recipient's mobile terminal;
By described eyeball acquisition module, gather the eyeball information of recipient's mobile phone users;
The key of the described deciphering of described employing, to the step that described encrypt file is decrypted, specifically comprises:
The eyeball information of the recipient's mobile phone users collected, is decrypted described encrypt file.
7. the decryption method of transfer files as claimed in claim 5, it is characterized in that, when described key is the eyeball information of sender mobile terminal user, described acquisition, to the step of the key that described encrypt file is decrypted, specifically comprises:
Receive and obtain sender mobile terminal send eyeball information, wherein, described eyeball information is the eyeball information of sender mobile terminal user;
The key of the described deciphering of described employing, to the step that described encrypt file is decrypted, specifically comprises:
Adopt the eyeball information of the sender mobile terminal user got, described encrypt file is decrypted.
8. the decryption method of transfer files as claimed in claim 5, is characterized in that, adopt the key of described deciphering, after the step be decrypted, also comprise described encrypt file:
Judge, within the time of presetting, to decipher failed number of times and whether exceed default threshold value;
If decipher failed number of times to exceed default threshold value, then delete described encrypt file.
9. the decryption method of transfer files as claimed in claim 5, is characterized in that described successful decryption is then opened the step of described file, specifically comprised:
After successful decryption, open described file and check for recipient user;
When receiving modify instruction, do not perform the retouching operation that described modify instruction is corresponding.
10. an encryption device for transfer files, is characterized in that, the encryption device of described transfer files comprises:
Receiver module, for receiving file waiting for transmission and file transfer instruction, carries key targeted customer mark in described file transfer instruction;
Key Acquisition Module, for according to described key targeted customer mark, obtains the key be encrypted described file waiting for transmission;
Encrypting module, is encrypted for adopting file waiting for transmission described in described double secret key;
Transport module, for according to described file transfer instruction, by the file transfer described waiting for transmission after encryption to recipient's mobile terminal.
The encryption device of 11. transfer files as claimed in claim 10, it is characterized in that, the encryption device of described transfer files also comprises: judge module;
Judge module, for judging whether described file waiting for transmission comprises default keyword;
Key Acquisition Module, if judge that described file waiting for transmission comprises default keyword specifically for described judge module, determines that described file waiting for transmission is the file needing encryption, performs the key obtaining and be encrypted described file waiting for transmission.
The encryption device of 12. transfer files as claimed in claim 10, it is characterized in that, described Key Acquisition Module specifically comprises: opening module and eyeball acquisition module;
Opening module, for opening the eyeball acquisition module of sender mobile terminal;
Eyeball acquisition module, for gathering the eyeball information of sender mobile terminal user;
Encrypting module, specifically for the eyeball information of sender mobile terminal user collected, is encrypted described file waiting for transmission.
The encryption device of 13. transfer files as claimed in claim 10, it is characterized in that, described Key Acquisition Module specifically comprises: video window opening module and video acquisition module;
Video window opening module, for opening the video window of sender mobile terminal;
Video acquisition module, for gathering the eyeball information of recipient's mobile phone users by described video window;
Encrypting module, specifically for the eyeball information of recipient's mobile phone users collected, is encrypted described file waiting for transmission.
The decryption device of 14. 1 kinds of transfer files, is characterized in that, the decryption device of described transfer files comprises:
Receiver module, for receiving encrypt file and the deciphering designated user mark of sender mobile terminal transmission;
Key Acquisition Module, for according to described deciphering designated user mark, obtains the key be decrypted described encrypt file;
Deciphering module, for adopting the key of described deciphering, is decrypted described encrypt file;
File Open module, for successful decryption, then opens described file.
The decryption device of 15. transfer files as claimed in claim 14, is characterized in that, when described key is the eyeball information of recipient's mobile phone users, described Key Acquisition Module specifically comprises: opening module and eyeball acquisition module;
Opening module, for opening the eyeball acquisition module of recipient's mobile terminal;
Eyeball acquisition module, for gathering the eyeball information of recipient's mobile phone users;
Deciphering module, specifically for the eyeball information of recipient's mobile phone users collected, is decrypted described encrypt file.
The decryption device of 16. transfer files as claimed in claim 14, is characterized in that,
Key Acquisition Module, specifically for receive and obtain sender mobile terminal send eyeball information, wherein, described eyeball information is the eyeball information of sender mobile terminal user;
Deciphering module, specifically for adopting the eyeball information of the sender mobile terminal user got, is decrypted described encrypt file.
The decryption device of 17. transfer files as claimed in claim 14, it is characterized in that, the decryption device of described transfer files also comprises:
Number of times judge module, for judging, deciphers failed number of times and whether exceedes default threshold value within the time of presetting;
For described number of times judge module, file erase module, judges that the failed number of times of deciphering exceedes default threshold value, then deletes described encrypt file.
The decryption device of 18. transfer files as claimed in claim 14, it is characterized in that, the decryption device of described transfer files also comprises: control module;
File Open module, after successful decryption, opens described file and checks for recipient user;
Control module, for when receiving modify instruction, controls not perform retouching operation corresponding to described modify instruction.
CN201510719602.7A 2015-10-28 2015-10-28 Transmit the encryption and decryption approaches of file Expired - Fee Related CN105227578B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201510719602.7A CN105227578B (en) 2015-10-28 2015-10-28 Transmit the encryption and decryption approaches of file
CN201810130388.5A CN108200093B (en) 2015-10-28 2015-10-28 Encryption and decryption method and encryption and decryption device for transmission file
PCT/CN2016/091081 WO2017071324A1 (en) 2015-10-28 2016-07-22 File-transmission encryption and decryption method and encryption and decryption device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510719602.7A CN105227578B (en) 2015-10-28 2015-10-28 Transmit the encryption and decryption approaches of file

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201810130388.5A Division CN108200093B (en) 2015-10-28 2015-10-28 Encryption and decryption method and encryption and decryption device for transmission file

Publications (2)

Publication Number Publication Date
CN105227578A true CN105227578A (en) 2016-01-06
CN105227578B CN105227578B (en) 2018-02-16

Family

ID=54996257

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201510719602.7A Expired - Fee Related CN105227578B (en) 2015-10-28 2015-10-28 Transmit the encryption and decryption approaches of file
CN201810130388.5A Active CN108200093B (en) 2015-10-28 2015-10-28 Encryption and decryption method and encryption and decryption device for transmission file

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201810130388.5A Active CN108200093B (en) 2015-10-28 2015-10-28 Encryption and decryption method and encryption and decryption device for transmission file

Country Status (2)

Country Link
CN (2) CN105227578B (en)
WO (1) WO2017071324A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106170006A (en) * 2016-09-29 2016-11-30 广州鹤互联网科技有限公司 A kind of electronic endorsement method for managing security and system
WO2017071324A1 (en) * 2015-10-28 2017-05-04 广东欧珀移动通信有限公司 File-transmission encryption and decryption method and encryption and decryption device
CN108377319A (en) * 2018-03-15 2018-08-07 北京顶象技术有限公司 picture transmission method and device
CN109218451A (en) * 2018-11-14 2019-01-15 郑州云海信息技术有限公司 A kind of data transmission method of distributed cluster system, device, equipment and medium

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112823349A (en) * 2018-11-21 2021-05-18 深圳市欢太科技有限公司 Data processing method, data processing device, electronic equipment and storage medium
CN111464531B (en) * 2020-03-31 2021-12-14 洛阳理工学院 Instant confirmation type file transmission method based on multiple encryption
WO2022198595A1 (en) * 2021-03-25 2022-09-29 华为技术有限公司 Encryption control method and apparatus for data transmission
CN113486380B (en) * 2021-07-23 2023-04-11 西安万像电子科技有限公司 Encryption method of text file
CN115174136B (en) * 2022-05-23 2024-02-02 北京旷视科技有限公司 Data acquisition and data transmission method, terminal, server and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009132977A1 (en) * 2008-04-30 2009-11-05 Thales Reliable resource integrated in a biometric data control device ensuring inspection security and data security
CN103414790A (en) * 2013-08-30 2013-11-27 苏州跨界软件科技有限公司 File transfer system based on NFC
CN104992100A (en) * 2015-07-15 2015-10-21 西安凯虹电子科技有限公司 Iris dynamic encryption and decryption system and method for electronic document flowing

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001092994A2 (en) * 2000-06-02 2001-12-06 Kinetic Sciences Inc. Method for biometric encryption of e-mail
US20080170689A1 (en) * 2006-08-07 2008-07-17 David Boubion Systems and methods for conducting secure wired and wireless networked telephony
CN102710613B (en) * 2012-05-14 2014-12-17 西安电子科技大学 Signcryption method of biological features of a plurality of receivers
US20140032924A1 (en) * 2012-07-30 2014-01-30 David M. Durham Media encryption based on biometric data
US10623400B2 (en) * 2013-10-14 2020-04-14 Greg Hauw Method and device for credential and data protection
CN108183972B (en) * 2014-11-19 2019-08-30 Oppo广东移动通信有限公司 Document handling method and terminal
CN105227578B (en) * 2015-10-28 2018-02-16 广东欧珀移动通信有限公司 Transmit the encryption and decryption approaches of file

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009132977A1 (en) * 2008-04-30 2009-11-05 Thales Reliable resource integrated in a biometric data control device ensuring inspection security and data security
CN103414790A (en) * 2013-08-30 2013-11-27 苏州跨界软件科技有限公司 File transfer system based on NFC
CN104992100A (en) * 2015-07-15 2015-10-21 西安凯虹电子科技有限公司 Iris dynamic encryption and decryption system and method for electronic document flowing

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017071324A1 (en) * 2015-10-28 2017-05-04 广东欧珀移动通信有限公司 File-transmission encryption and decryption method and encryption and decryption device
CN106170006A (en) * 2016-09-29 2016-11-30 广州鹤互联网科技有限公司 A kind of electronic endorsement method for managing security and system
CN108377319A (en) * 2018-03-15 2018-08-07 北京顶象技术有限公司 picture transmission method and device
CN108377319B (en) * 2018-03-15 2020-04-17 北京顶象技术有限公司 Picture transmission method and device
CN109218451A (en) * 2018-11-14 2019-01-15 郑州云海信息技术有限公司 A kind of data transmission method of distributed cluster system, device, equipment and medium

Also Published As

Publication number Publication date
CN105227578B (en) 2018-02-16
WO2017071324A1 (en) 2017-05-04
CN108200093B (en) 2021-08-24
CN108200093A (en) 2018-06-22

Similar Documents

Publication Publication Date Title
CN105227578A (en) The encryption and decryption method of transfer files and encryption and decryption device
CN105262756A (en) Data encryption method, data decryption method, data encryption apparatus, and data decryption apparatus
US10237247B2 (en) User interface systems and methods for secure message oriented communications
Rayarikar et al. SMS encryption using AES algorithm on android
CN109792451B (en) Communication channel encryption, decryption and establishment method and device, memory and terminal
CN105260669B (en) The transmission method and Transmission system of photo
CN105227302A (en) The shared method of password and the shared system of password
US10462185B2 (en) Policy-managed secure code execution and messaging for computing devices and computing device security
US9659189B2 (en) Systems and methods of safeguarding user information while interacting with online service providers
WO2014051558A1 (en) Shared secret identification for secure communication
CN105634737A (en) Data transmission method, terminals and system thereof
CN104270516A (en) Decryption method and mobile terminal
CN107666395A (en) One population file management method, user terminal, group chat system
CN101957894B (en) Conditional e-file authority controlling and managing system and method
CN103067897A (en) Asymmetrical mobile phone short message encryption method
Riaz et al. Development of a secure SMS application using advanced encryption standard (AES) on android platform
US20190014089A1 (en) Data Security Protection Method and Apparatus
CN105827601A (en) Data encryption application method and system of mobile device
Kumar et al. Security issues in m-government
CN105430150A (en) Method and device for implementing secure call
US20180255441A1 (en) Portable terminal, gateway device and electronic device
CN105516968A (en) Smart password key-based mobile phone data transmission method
Demirol et al. An android application to secure text messages
CN203070303U (en) Picture management system based on fingerprint authentication
CN110476392B (en) Techniques for key ratcheting with multiple steps

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180216