CN105610775A - Decryption method and system thereof, encryption method and system thereof, and mobile terminal - Google Patents

Decryption method and system thereof, encryption method and system thereof, and mobile terminal Download PDF

Info

Publication number
CN105610775A
CN105610775A CN201510611790.1A CN201510611790A CN105610775A CN 105610775 A CN105610775 A CN 105610775A CN 201510611790 A CN201510611790 A CN 201510611790A CN 105610775 A CN105610775 A CN 105610775A
Authority
CN
China
Prior art keywords
identification information
equipment identification
default
equipment
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510611790.1A
Other languages
Chinese (zh)
Inventor
董志伟
胡小琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510611790.1A priority Critical patent/CN105610775A/en
Publication of CN105610775A publication Critical patent/CN105610775A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The invention provides a decryption method and a system thereof, an encryption method and a system thereof, and a mobile terminal. The decryption method comprises the following steps of when the mobile terminal and communication equipment establishes connection, acquiring equipment identification information of the communication equipment; determining whether the equipment identification information matches with preset equipment identification information; when the equipment identification information is determined to match with the preset equipment identification information, carrying out decryption processing on a preset process so as to recover a usage authority of a user to a preset process. Through the technical scheme of the invention, manual operation of the user is avoided, decryption and encryption operation processes are simplified and a usage experience of the user is improved. Simultaneously, according to a user need, automatic encryption is realized so that personal privacy information leakage of the user is avoided.

Description

Decryption method and system thereof, encryption method and system thereof and mobile terminal
Technical field
The present invention relates to technical field of mobile terminals, in particular to a kind of decryption method, oneDecryption system, a kind of encryption method, a kind of encryption system and a kind of mobile terminal.
Background technology
In correlation technique, after some process of mobile terminal is encrypted, user is to the process of encryptingWhen content is checked, need to the process content of encrypting be decrypted and just can be checked afterwards.
For example, user carries out screen locking to terminal or certain application program is encrypted, at terminal standbyAfter screen locking or again enter this application, user needs first be decrypted it, in can checkingHold, operate more loaded down with trivial detailsly, affect user's experience, if but terminal or certain application program are not enteredRow is encrypted, and anyone can both directly consult the information on user terminal, and this situation easily causes againIndividual subscriber privacy information leaks.
Therefore, how to design a kind of encipherment scheme and corresponding decrypt scheme with implementation process business fromMoving encryption and decryption become technical problem urgently to be resolved hurrily.
Summary of the invention
The present invention based on above-mentioned technical problem one of at least, has proposed a kind of new decrypt scheme just,Realize deciphering automatically by the equipment identification information of the communication equipment that is connected with mobile terminal, avoided useFamily manual operation, has simplified whole operating process, has promoted user's experience, the present invention simultaneouslyAlso propose a kind of new encipherment scheme, can need to realize automatic encryption according to user, thereby avoidThe leakage of individual subscriber privacy information.
In view of this, the present invention proposes a kind of decryption method, comprising: at described mobile terminal and logicalWhen letter equipment connects, obtain the equipment identification information of described communication equipment; Judge described equipment markWhether knowledge information mates with default equipment identification information; Judging described equipment identification information and described pre-If when equipment identification information coupling, default process is decrypted to processing, to recover user to described pre-If the rights of using of process.
In this technical scheme, by obtaining the device identification of the communication equipment being connected with mobile terminalInformation, and whether judgment device identification information mate with default equipment identification information, at determining apparatus markWhen knowledge information is mated with default equipment identification information, default process is decrypted to processing, to recover useThe rights of using of family to default process, make it possible to realize deciphering automatically according to equipment identification information, keep awayExempt from user's manual operation, simplified whole operating process, promoted user's experience.
Particularly, in the time that this communication equipment is the router in user family, in the time that user goes back home, useMobile terminal and the router at family connect, now by obtaining the device identification letter of this routerBreath, and judge whether this equipment identification information mates with default equipment identification information, and confirming couplingTime, automatically the password arranging being decrypted, whole process is without user's manual operation, and is different fromPrior art: if user wants to check the information in mobile terminal, what just must manually be decrypted is loaded down with trivial detailsOperation.
In technique scheme, preferably, also comprise: the equipment mark of pre-stored designated communication equipmentKnowledge information, using as described default equipment identification information; And set up described default equipment identification informationWith the mapping relations of described default process, and store described mapping relations.
In this technical scheme, by the equipment identification information of pre-stored designated communication equipment, using asDefault equipment identification information, and set up the mapping relations of presetting equipment identification information and default process,And Storage Mapping relation, provide necessary guarantor for follow-up according to the default process of the automatic deciphering of equipment identification informationCard. Wherein, communication equipment can arrange according to user's request, can be the road that user relatively trustsBy device, can be and intimate other peoples' of customer relationship mobile terminal can be also the electricity in user familyBrain etc., above-mentioned communication equipment can pass through WI-FI, or by bluetooth, or by USB interface with moveMoving terminal is connected.
In technique scheme, preferably, judging described equipment identification information and described establishingWhen standby identification information coupling, default process is decrypted to processing, with recover user to described preset intoThe rights of using of journey, specifically comprise the following steps: judging described equipment identification information and described defaultWhen equipment identification information coupling, whether prompting user confirms deciphering; And receiving described confirmation solutionAfter close instruction, carry out the decryption processing to described default process.
In this technical scheme, whether confirm deciphering by prompting user, and receiving the confirmation solutionAfter close instruction, carry out the decryption processing to default process, user can be come as the case may beDetermine whether automatically deciphering, ensured user's privacy information safety (particularly moving eventually as userWhen end can be deciphered automatically, and user feels can cause privacy information to be spied on after deciphering), furtherEnsured user's data security.
According to a second aspect of the invention, propose a kind of encryption method, having comprised: described eventually mobileWhen end connects with communication equipment, obtain the equipment identification information of described communication equipment; Described in judgementWhether equipment identification information mates with default equipment identification information; Judge described equipment identification information withWhen described default equipment identification information does not mate, default process is encrypted, to stop userTo the rights of using of described default process.
In this technical scheme, by obtaining the device identification of the communication equipment being connected with mobile terminalInformation, and whether judgment device identification information mate with default equipment identification information, at determining apparatus markWhen knowledge information is not mated with default equipment identification information, default process is encrypted, to stopThe rights of using of user to described default process, make it possible to realize and automatically adding according to equipment identification informationClose, thus the leakage of individual subscriber privacy information avoided.
Particularly, in the time that this communication equipment is the router in user family, in the time that user goes back home, moveMoving terminal can be decrypted the password arranging automatically, once and user is away from home, in user's movementTerminal is obtained less than the equipment identification information mating with default identification information, can again establish user immediatelyFixed default process is encrypted, and is different from prior art: once user cancels default processEncipherment protection, is encrypted protection to default process again if think, just must re-start setting.
In technique scheme, preferably, also comprise: the equipment mark of pre-stored designated communication equipmentKnowledge information, using as described default equipment identification information; And set up described default equipment identification informationWith the mapping relations of described default process, and store described mapping relations.
In this technical scheme, by the equipment identification information of pre-stored designated communication equipment, using asDefault equipment identification information, and set up the mapping relations of presetting equipment identification information and default process,And Storage Mapping relation, provide necessary guarantor for follow-up according to the automatic process of presetting of encrypting of equipment identification informationCard. Wherein, communication equipment can arrange according to user's request, can be the road that user relatively trustsBy device, can be and intimate other peoples' of customer relationship mobile terminal can be also the electricity in user familyBrain etc., above-mentioned communication equipment can pass through WI-FI, or by bluetooth, or by USB interface with moveMoving terminal is connected.
According to a third aspect of the invention we, propose a kind of decryption system, having comprised: acquiring unit, useIn in the time that described mobile terminal and communication equipment connect, the device identification of obtaining described communication equipmentInformation; Judging unit, for judge described equipment identification information whether with default equipment identification informationJoin; Decryption unit, for judging described equipment identification information and described default equipment identification informationTiming, is decrypted processing to default process, to recover the right to use of user to described default processLimit.
In this technical scheme, by obtaining the device identification of the communication equipment being connected with mobile terminalInformation, and whether judgment device identification information mate with default equipment identification information, at determining apparatus markWhen knowledge information is mated with default equipment identification information, default process is decrypted to processing, to recover useThe rights of using of family to default process, make it possible to realize deciphering automatically according to equipment identification information, keep awayExempt from user's manual operation, simplified whole operating process, promoted user's experience.
Particularly, in the time that this communication equipment is the router in user family, in the time that user goes back home, useMobile terminal and the router at family connect, now by obtaining the device identification letter of this routerBreath, and judge whether this equipment identification information mates with default equipment identification information, and confirming couplingTime, automatically the password arranging being decrypted, whole process is without user's manual operation, and is different fromPrior art: if user wants to check the information in mobile terminal, what just must manually be decrypted is loaded down with trivial detailsOperation.
In technique scheme, preferably, also comprise: memory cell, specify logical for pre-storedThe equipment identification information of letter equipment, using as described default equipment identification information; And set up unit,For setting up the mapping relations of described default equipment identification information and described default process, and described in storageMapping relations.
In this technical scheme, by the equipment identification information of pre-stored designated communication equipment, using asDefault equipment identification information, and set up the mapping relations of presetting equipment identification information and default process,And Storage Mapping relation, provide necessary guarantor for follow-up according to the default process of the automatic deciphering of equipment identification informationCard. Wherein, communication equipment can arrange according to user's request, can be the road that user relatively trustsBy device, can be and intimate other peoples' of customer relationship mobile terminal can be also the electricity in user familyBrain etc., above-mentioned communication equipment can pass through WI-FI, or by bluetooth, or by USB interface and movementTerminal is connected.
In technique scheme, preferably, described decryption unit also comprises: Tip element, forIn the time judging that described equipment identification information mates with described default equipment identification information, whether prompting userConfirm deciphering; And described decryption unit specifically for: in the instruction that receives described confirmation decipheringAfter, carry out the decryption processing to described default process.
In this technical scheme, whether confirm deciphering by prompting user, and receiving the confirmation solutionAfter close instruction, carry out the decryption processing to default process, user can be come as the case may beDetermine whether automatically deciphering, ensured user's privacy information safety (particularly moving eventually as userWhen end can be deciphered automatically, and user feels can cause privacy information to be spied on after deciphering), furtherEnsured user's data security.
According to a forth aspect of the invention, propose a kind of encryption system, having comprised: acquiring unit, useIn in the time that described mobile terminal and communication equipment connect, the device identification of obtaining described communication equipmentInformation; Judging unit, for judge described equipment identification information whether with default equipment identification informationJoin; Ciphering unit, for judging described equipment identification information and described default equipment identification information notWhen coupling, default process is encrypted, to stop the right to use of user to described default processLimit.
In this technical scheme, by obtaining the device identification of the communication equipment being connected with mobile terminalInformation, and whether judgment device identification information mate with default equipment identification information, at determining apparatus markWhen knowledge information is not mated with default equipment identification information, default process is encrypted, to stopThe rights of using of user to described default process, make it possible to realize and automatically adding according to equipment identification informationClose, thus the leakage of individual subscriber privacy information avoided.
Particularly, in the time that this communication equipment is the router in user family, in the time that user goes back home, moveMoving terminal can be decrypted the password arranging automatically, once and user is away from home, in user's movementTerminal is obtained less than the equipment identification information mating with default identification information, can again establish user immediatelyFixed default process is encrypted, and is different from prior art: once user cancels default processEncipherment protection, is encrypted protection to default process again if think, just must re-start setting.
In technique scheme, preferably, also comprise: memory cell, specify logical for pre-storedThe equipment identification information of letter equipment, using as described default equipment identification information; And set up unit,For setting up the mapping relations of described default equipment identification information and described default process, and described in storageMapping relations.
In this technical scheme, by the equipment identification information of pre-stored designated communication equipment, using asDefault equipment identification information, and set up the mapping relations of presetting equipment identification information and default process,And Storage Mapping relation, provide necessary guarantor for follow-up according to the automatic process of presetting of encrypting of equipment identification informationCard. Wherein, communication equipment can arrange according to user's request, can be the road that user relatively trustsBy device, can be and intimate other peoples' of customer relationship mobile terminal can be also the electricity in user familyBrain etc., above-mentioned communication can be passed through WI-FI, or by bluetooth, or by USB interface and userMobile terminal is connected.
According to a fifth aspect of the invention, propose a kind of mobile terminal, having comprised: as above-mentioned any oneDecryption system described in technical scheme and/or the system of the encryption described in above-mentioned any one technical schemeSystem. Therefore, this mobile terminal has with the decryption system described in above-mentioned any one technical scheme and addsThe technique effect that close system is identical, does not repeat them here.
By above technical scheme, by the equipment identification information of the communication equipment that is connected with mobile terminalRealize deciphering automatically, avoided user's manual operation, simplified whole operating process, promoted userExperience, simultaneously can also need to realize automatic encryption according to user, thereby avoid userThe leakage of people's privacy information.
Brief description of the drawings
Fig. 1 shows the schematic flow diagram of decryption method according to an embodiment of the invention;
Fig. 2 shows the schematic flow diagram of encryption method according to an embodiment of the invention;
Fig. 3 shows the schematic block diagram of decryption system according to an embodiment of the invention;
Fig. 4 shows the schematic block diagram of encryption system according to an embodiment of the invention;
Fig. 5 shows the schematic block diagram of mobile terminal according to an embodiment of the invention;
Fig. 6 shows the schematic block diagram of encrypt-decrypt system according to an embodiment of the invention;
Fig. 7 shows the exemplary flow of encrypt-decrypt process according to an embodiment of the inventionFigure;
Fig. 8 A to Fig. 8 E shows the schematic diagram of terminal interface according to an embodiment of the invention.
Detailed description of the invention
In order more clearly to understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with attachedFigure and detailed description of the invention are further described in detail the present invention. It should be noted that, notIn the situation of conflict, the feature in the application's embodiment and embodiment can combine mutually.
Set forth in the following description a lot of details so that fully understand the present invention, still,The present invention can also adopt other to be different from other modes described here and implement, therefore, and the present inventionProtection domain be not subject to the restriction of following public specific embodiment.
Fig. 1 shows the schematic flow diagram of decryption method according to an embodiment of the invention.
As shown in Figure 1, decryption method according to an embodiment of the invention, comprising: step 102,When described mobile terminal and communication equipment connect, obtain the device identification letter of described communication equipmentBreath; Step 104, judges whether described equipment identification information mates with default equipment identification information; StepRapid 106, in the time judging that described equipment identification information mates with described default equipment identification information, in advanceIf process is decrypted processing, to recover the rights of using of user to described default process.
In this technical scheme, by obtaining the device identification of the communication equipment being connected with mobile terminalInformation, and whether judgment device identification information mate with default equipment identification information, at determining apparatus markWhen knowledge information is mated with default equipment identification information, default process is decrypted to processing, to recover useThe rights of using of family to default process, make it possible to realize deciphering automatically according to equipment identification information, keep awayExempt from user's manual operation, simplified whole operating process, promoted user's experience.
Particularly, in the time that this communication equipment is the router in user family, in the time that user goes back home, useMobile terminal and the router at family connect, now by obtaining the device identification letter of this routerBreath, and judge whether this equipment identification information mates with default equipment identification information, and confirming couplingTime, automatically the password arranging being decrypted, whole process is without user's manual operation, and is different fromPrior art: if user wants to check the information in mobile terminal, what just must manually be decrypted is loaded down with trivial detailsOperation.
In technique scheme, preferably, also comprise: the equipment mark of pre-stored designated communication equipmentKnowledge information, using as described default equipment identification information; And set up described default equipment identification informationWith the mapping relations of described default process, and store described mapping relations.
In this technical scheme, by the equipment identification information of pre-stored designated communication equipment, using asDefault equipment identification information, and set up the mapping relations of presetting equipment identification information and default process,And Storage Mapping relation, provide necessary guarantor for follow-up according to the default process of the automatic deciphering of equipment identification informationCard. Wherein, communication equipment can arrange according to user's request, can be the road that user relatively trustsBy device, can be and intimate other peoples' of customer relationship mobile terminal can be also the electricity in user familyBrain etc., above-mentioned communication equipment can pass through WI-FI, or by bluetooth, or by USB interface with moveMoving terminal is connected.
In technique scheme, preferably, judging described equipment identification information and described establishingWhen standby identification information coupling, default process is decrypted to processing, with recover user to described preset intoThe rights of using of journey, specifically comprise the following steps: judging described equipment identification information and described defaultWhen equipment identification information coupling, whether prompting user confirms deciphering; And receiving described confirmation solutionAfter close instruction, carry out the decryption processing to described default process.
In this technical scheme, whether confirm deciphering by prompting user, and receiving the confirmation solutionAfter close instruction, carry out the decryption processing to default process, user can be come as the case may beDetermine whether automatically deciphering, ensured user's privacy information safety (particularly moving eventually as userWhen end can be deciphered automatically, and user feels can cause privacy information to be spied on after deciphering).
Fig. 2 shows the schematic flow diagram of encryption method according to an embodiment of the invention.
As shown in Figure 2, encryption method according to an embodiment of the invention, comprising: step 202,When described mobile terminal and communication equipment connect, obtain the device identification letter of described communication equipmentBreath; Step 204, judges whether described equipment identification information mates with default equipment identification information; StepRapid 206, in the time judging that described equipment identification information does not mate with described default equipment identification information, rightDefault process is encrypted, to stop the rights of using of user to described default process.
In this technical scheme, by obtaining the device identification of the communication equipment being connected with mobile terminalInformation, and whether judgment device identification information mate with default equipment identification information, at determining apparatus markWhen knowledge information is not mated with default equipment identification information, default process is encrypted, to stopThe rights of using of user to described default process, make it possible to realize and automatically adding according to equipment identification informationClose, thus the leakage of individual subscriber privacy information avoided.
Particularly, in the time that this communication equipment is the router in user family, in the time that user goes back home, moveMoving terminal can be decrypted the password arranging automatically, once and user is away from home, in user's movementTerminal is obtained less than the equipment identification information mating with default identification information, can again establish user immediatelyFixed default process is encrypted, and is different from prior art: once user cancels default processEncipherment protection, is encrypted protection to default process again if think, just must re-start setting.
In technique scheme, preferably, also comprise: the equipment mark of pre-stored designated communication equipmentKnowledge information, using as described default equipment identification information; And set up described default equipment identification informationWith the mapping relations of described default process, and store described mapping relations.
In this technical scheme, by the equipment identification information of pre-stored designated communication equipment, using asDefault equipment identification information, and set up the mapping relations of presetting equipment identification information and default process,And Storage Mapping relation, provide necessary guarantor for follow-up according to the automatic process of presetting of encrypting of equipment identification informationCard. Wherein, communication equipment can arrange according to user's request, can be the road that user relatively trustsBy device, can be and intimate other peoples' of customer relationship mobile terminal can be also the electricity in user familyBrain etc., above-mentioned communication equipment can pass through WI-FI, or by bluetooth, or by USB interface with moveMoving terminal is connected.
Fig. 3 shows the schematic block diagram of decryption system according to an embodiment of the invention.
As shown in Figure 3, decryption system 300 according to an embodiment of the invention, comprising: acquiring unit302, in the time that described mobile terminal and communication equipment connect, obtain described communication equipmentEquipment identification information; Judging unit 304, for judge described equipment identification information whether with establishStandby identification information coupling; Decryption unit 306, for judging described equipment identification information and described pre-If when equipment identification information coupling, default process is decrypted to processing, to recover user to described pre-If the rights of using of process.
In this technical scheme, by obtaining the device identification of the communication equipment being connected with mobile terminalInformation, and whether judgment device identification information mate with default equipment identification information, at determining apparatus markWhen knowledge information is mated with default equipment identification information, default process is decrypted to processing, to recover useThe rights of using of family to default process, make it possible to realize deciphering automatically according to equipment identification information, keep awayExempt from user's manual operation, simplified whole operating process, promoted user's experience.
Particularly, in the time that this communication equipment is the router in user family, in the time that user goes back home, useMobile terminal and the router at family connect, now by obtaining the device identification letter of this routerBreath, and judge whether this equipment identification information mates with default equipment identification information, and confirming couplingTime, automatically the password arranging being decrypted, whole process is without user's manual operation, and is different fromPrior art: if user wants to check the information in mobile terminal, what just must manually be decrypted is loaded down with trivial detailsOperation.
In technique scheme, preferably, also comprise: memory cell 308, refers to for pre-storedDetermine the equipment identification information of communication equipment, using as described default equipment identification information; And set up singleUnit 310, for setting up the mapping relations of described default equipment identification information and described default process, andStore described mapping relations.
In this technical scheme, by the equipment identification information of pre-stored designated communication equipment, using asDefault equipment identification information, and set up the mapping relations of presetting equipment identification information and default process,And Storage Mapping relation, provide necessary guarantor for follow-up according to the default process of the automatic deciphering of equipment identification informationCard. Wherein, communication equipment can arrange according to user's request, can be the road that user relatively trustsBy device, can be and intimate other peoples' of customer relationship mobile terminal can be also the electricity in user familyBrain etc., these equipment or by WI-FI, or by bluetooth, or moving by USB interface and userMoving terminal is connected.
In technique scheme, preferably, described decryption unit 306 also comprises: Tip element3062, in the time judging that described equipment identification information mates with described default equipment identification information, carryShow whether user confirms deciphering; And described decryption unit 306 specifically for: receive described reallyRecognize after the instruction of deciphering, carry out the decryption processing to described default process.
In this technical scheme, whether confirm deciphering by prompting user, and receiving the confirmation solutionAfter close instruction, carry out the decryption processing to default process, user can be come as the case may beDetermine whether automatically deciphering, ensured user's privacy information safety (particularly moving eventually as userWhen end can be deciphered automatically, and user feels can cause privacy information to be spied on after deciphering).
Fig. 4 shows the schematic block diagram of encryption system according to an embodiment of the invention.
As shown in Figure 4, encryption system 400 according to an embodiment of the invention, comprising: acquiring unit402, in the time that described mobile terminal and communication equipment connect, obtain described communication equipmentEquipment identification information; Judging unit 404, for judge described equipment identification information whether with establishStandby identification information coupling; Ciphering unit 406, for judging described equipment identification information and described pre-If when equipment identification information does not mate, default process is encrypted, to stop user to describedThe rights of using of default process.
In this technical scheme, by obtaining the device identification of the communication equipment being connected with mobile terminalInformation, and whether judgment device identification information mate with default equipment identification information, at determining apparatus markWhen knowledge information is not mated with default equipment identification information, default process is encrypted, to stopThe rights of using of user to described default process, make it possible to realize and automatically adding according to equipment identification informationClose, thus the leakage of individual subscriber privacy information avoided.
Particularly, in the time that this communication equipment is the router in user family, in the time that user goes back home, moveMoving terminal can be decrypted the password arranging automatically, once and user is away from home, in user's movementTerminal is obtained less than the equipment identification information mating with default identification information, can again establish user immediatelyFixed default process is encrypted, and is different from prior art: once user cancels default processEncipherment protection, is encrypted protection to default process again if think, just must re-start setting.
In technique scheme, preferably, also comprise: memory cell 408, refers to for pre-storedDetermine the equipment identification information of communication equipment, using as described default equipment identification information; And set up singleUnit 410, for setting up the mapping relations of described default equipment identification information and described default process, andStore described mapping relations.
In this technical scheme, by the equipment identification information of pre-stored designated communication equipment, using asDefault equipment identification information, and set up the mapping relations of presetting equipment identification information and default process,And Storage Mapping relation, provide necessary guarantor for follow-up according to the automatic process of presetting of encrypting of equipment identification informationCard. Wherein, communication equipment can arrange according to user's request, can be the road that user relatively trustsBy device, can be and intimate other peoples' of customer relationship mobile terminal can be also the electricity in user familyBrain etc., above-mentioned communication equipment can pass through WI-FI, or by bluetooth, or by USB interface and movementTerminal is connected.
Fig. 5 shows the schematic block diagram of mobile terminal according to an embodiment of the invention.
As shown in Figure 5, mobile terminal 500 according to an embodiment of the invention, comprising: as Fig. 3 instituteThe decryption system 300 showing and encryption system 400 as shown in Figure 4. Therefore, this mobile terminal 300Have identical with the decryption system 300 shown in Fig. 3 and/or encryption system as shown in Figure 4 400Technique effect, does not repeat them here.
Below in conjunction with Fig. 6, Fig. 7, Fig. 8 A to Fig. 8 E to technical scheme of the present invention furtherlyBright.
As shown in Figure 6, in the present embodiment, intelligent encrypting and deciphering system 600 comprises: data module602, identification module 604, processing module 606.
Wherein, data module 602 is mainly used in the facilities of recording user, by the heat for decipheringThe information recording of some communication equipment, to data decryption table, specifically comprises:
(1) storage user's the pattern that arranges, as user selects to enter after intelligent encryption and decryption pattern, willUser arranges in data writing table, to start this intelligent encryption and decryption scheme;
(2) operation of recording user, recording user select connect be decrypted facility information (asWI-FI title and address, bluetooth device name and address etc.).
Identification module 604 is mainly that the information of the focus communication equipment for identifying current terminal connection isNo being kept in data decryption table:
(1) in the time connecting miscellaneous equipment, read its information, and by these facility informations and the guarantor that readExist the data in data decryption table to contrast;
(2) after contrast is passed through, think that current environment is trusted, this result feedback is given and processed mouldPiece is decrypted;
(3) detect that current each trusted devices connects after disconnection, gives result feedback to process mould equallyPiece is encrypted.
The result that processing module 606 is mainly used in drawing according to identification module 604 is carried out encryption and decryption behaviourDo, specifically comprise:
(1) user's operation is written in database, using these data as the data of processingSource.
(2) result drawing according to authentication module 604 is carried out encryption and decryption operation (as differentiated to terminalGo out while connection with the equipment in data decryption table, the lock of terminal is removed, when learning and deciphering numberWhile disconnection according to the equipment in table, the lock of terminal is added).
Enter after intelligent encryption-decryption mode, mobile terminal detects the current deciphering number that whether connectedAccording to the equipment arranging in table, as connected after the equipment in above-mentioned data decryption table, to default processBe decrypted processing, in the time that the equipment of preserving in sense terminals and decrypted list disconnects communication connection, rightDefault process is encrypted, and reaches the object that is user-friendly to and protects terminal data safety.
As shown in Figure 7, the groundwork flow process of the intelligent encrypting and deciphering system 600 of the present embodiment, bagDraw together:
Step 702, user's input or setting enter intelligent encryption and decryption pattern;
Step 704, records user's configuration information in data decryption table by data module;
Step 706, differentiates by identification module whether the facility information getting is stored in data decryptionIn table, if so, perform step 708; Otherwise execution step 710;
Step 708, carries out decryption oprerations by processing module;
Step 710, carries out cryptographic operation by processing module.
Illustrate further by following scene:
Scene one: deciphering automatically when user terminal is connected to the WI-FI of family or specifies bluetooth equipmentTerminal locking screen interface.
As shown in Figure 8 A, in the time not being connected to the WI-FI of family or specifying bluetooth equipment, endIn screen lock state.
As shown in Figure 8 B, terminal is connecting WI-FI equipment and by after authentication, and terminal will connectWI-FI facility information be kept at facility information in data decryption table and differentiate and pass through after, automatically carry outThe locking of screen.
As shown in Figure 8 C, terminal is after connecting bluetooth equipment authentication and passing through, and terminal is by the indigo plant connectingTooth facility information be kept at facility information in data decryption table and mate and pass through after, automatically carry out screenRelease
Scene two: deciphering automatically when user terminal is connected to the WI-FI of family or specifies bluetooth equipmentApplication program (as micro-letter) in terminal.
Initial phase as shown in Fig. 8 D, user is encrypted to micro-letter application.
As shown in 8E, terminal is protected in WI-FI equipment and bluetooth equipment information that connection detectedExist in data decryption table, be automatically decrypted operation to application.
The present embodiment selects WI-FI or bluetooth equipment for deciphering (to be not limited to this by userTwo kinds of connected modes), then the information of these equipment is written in data decryption table, when terminal againAfter equipment connection success in inferior and these data decryption tables, automatically to the finger in terminal or application programDetermine process and be decrypted operation, and with data decryption table in equipment while disconnecting, automatic againAppointment process in terminal or application program is encrypted to operation, is in or specific thereby realizedPlace is user-friendly to, and can protect again secure user data at other local re-encrypted.
More than be described with reference to the accompanying drawings technical scheme of the present invention, technical scheme of the present invention proposesA kind of new decrypt scheme, real by the equipment identification information of the communication equipment that is connected with mobile terminalNow deciphering automatically, has avoided user's manual operation, has simplified whole operating process, has promoted user'sExperience the invention allows for a kind of new encipherment scheme simultaneously, can need reality according to userNow automatically encrypt, thereby avoided the leakage of individual subscriber privacy information.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, forThose skilled in the art, the present invention can have various modifications and variations. All in essence of the present inventionWithin god and principle, any amendment of doing, be equal to replacement, improvement etc., all should be included in the present inventionProtection domain within.

Claims (11)

1. a decryption method, for mobile terminal, described mobile terminal can be connected to communication and establishStandby, it is characterized in that, comprising:
In the time that described mobile terminal and communication equipment connect, obtain the equipment mark of described communication equipmentKnowledge information;
Judge whether described equipment identification information mates with default equipment identification information;
Judging that described equipment identification information is while mating with described default equipment identification information, to preset intoJourney is decrypted processing, to recover the rights of using of user to described default process.
2. decryption method according to claim 1, is characterized in that, also comprises:
The equipment identification information of pre-stored designated communication equipment, to believe as described default device identificationBreath; And
Set up the mapping relations of described default equipment identification information and described default process, and described in storageMapping relations.
3. decryption method according to claim 1 and 2, is characterized in that, described in judgingWhen equipment identification information mates with described default equipment identification information, default process is decrypted to placeReason, to recover the rights of using of user to described default process, specifically comprises the following steps:
In the time judging that described equipment identification information mates with described default equipment identification information, prompting userWhether confirmation is deciphered;
And receiving after the instruction of described confirmation deciphering, carry out deciphering place to described default processReason.
4. an encryption method, for mobile terminal, described mobile terminal can be connected to communication and establishStandby, it is characterized in that, comprising:
In the time that described mobile terminal and communication equipment connect, obtain the equipment mark of described communication equipmentKnowledge information;
Judge whether described equipment identification information mates with default equipment identification information;
In the time judging that described equipment identification information does not mate with described default equipment identification information, to defaultProcess is encrypted, to stop the rights of using of user to described default process.
5. encryption method according to claim 4, is characterized in that, also comprises:
The equipment identification information of pre-stored designated communication equipment, to believe as described default device identificationBreath; And
Set up the mapping relations of described default equipment identification information and described default process, and described in storageMapping relations.
6. a decryption system, for mobile terminal, described mobile terminal can be connected to communication and establishStandby, it is characterized in that, comprising:
Acquiring unit, in the time that described mobile terminal and communication equipment connect, obtains described logicalThe equipment identification information of letter equipment;
Judging unit, for judge described equipment identification information whether with default equipment identification informationJoin;
Decryption unit, for judging described equipment identification information and described default equipment identification informationTiming, is decrypted processing to default process, to recover the right to use of user to described default processLimit.
7. decryption system according to claim 6, is characterized in that, also comprises:
Memory cell, for the equipment identification information of pre-stored designated communication equipment, using as described pre-If equipment identification information; And
Set up unit, close for the mapping of setting up described default equipment identification information and described default processSystem, and store described mapping relations.
8. according to the decryption system described in claim 6 or 7, it is characterized in that, described deciphering is singleUnit also comprises:
Tip element, for judging described equipment identification information and described default equipment identification informationTiming, whether prompting user confirms deciphering;
And described decryption unit specifically for: receiving after the instruction of described confirmation deciphering, carry outTo the decryption processing of described default process.
9. an encryption system, for mobile terminal, described mobile terminal can be connected to communication and establishStandby, it is characterized in that, comprising:
Acquiring unit, in the time that described mobile terminal and communication equipment connect, obtains described logicalThe equipment identification information of letter equipment;
Judging unit, for judge described equipment identification information whether with default equipment identification informationJoin;
Ciphering unit, for judging described equipment identification information and described default equipment identification information notWhen coupling, default process is encrypted, to stop the right to use of user to described default processLimit.
10. encryption system according to claim 9, is characterized in that, also comprises:
Memory cell, for the equipment identification information of pre-stored designated communication equipment, using as described pre-If equipment identification information; And
Set up unit, close for the mapping of setting up described default equipment identification information and described default processSystem, and store described mapping relations.
11. 1 kinds of mobile terminals, described mobile terminal can be connected to communication equipment, it is characterized in that,Comprise: the decryption system as described in any one in claim 6 to 8 and/or as claim 9 orEncryption system described in 10.
CN201510611790.1A 2015-09-23 2015-09-23 Decryption method and system thereof, encryption method and system thereof, and mobile terminal Pending CN105610775A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510611790.1A CN105610775A (en) 2015-09-23 2015-09-23 Decryption method and system thereof, encryption method and system thereof, and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510611790.1A CN105610775A (en) 2015-09-23 2015-09-23 Decryption method and system thereof, encryption method and system thereof, and mobile terminal

Publications (1)

Publication Number Publication Date
CN105610775A true CN105610775A (en) 2016-05-25

Family

ID=55990315

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510611790.1A Pending CN105610775A (en) 2015-09-23 2015-09-23 Decryption method and system thereof, encryption method and system thereof, and mobile terminal

Country Status (1)

Country Link
CN (1) CN105610775A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106412227A (en) * 2016-06-16 2017-02-15 北京小米移动软件有限公司 Anti-lost alarm method and device and device for anti-lost alarm
CN112187750A (en) * 2020-09-17 2021-01-05 李春梅 Information encryption method and system based on Internet

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103347133A (en) * 2013-07-15 2013-10-09 上海果壳电子有限公司 Method for achieving mobile phone automatic unlocking and answering calls by identity ring
CN103369511A (en) * 2012-03-28 2013-10-23 宇龙计算机通信科技(深圳)有限公司 WiFi network-based unlocking or locking method and communication terminal
CN103533676A (en) * 2013-10-09 2014-01-22 中国联合网络通信集团有限公司 Mobile terminal unlocking method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103369511A (en) * 2012-03-28 2013-10-23 宇龙计算机通信科技(深圳)有限公司 WiFi network-based unlocking or locking method and communication terminal
CN103347133A (en) * 2013-07-15 2013-10-09 上海果壳电子有限公司 Method for achieving mobile phone automatic unlocking and answering calls by identity ring
CN103533676A (en) * 2013-10-09 2014-01-22 中国联合网络通信集团有限公司 Mobile terminal unlocking method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106412227A (en) * 2016-06-16 2017-02-15 北京小米移动软件有限公司 Anti-lost alarm method and device and device for anti-lost alarm
CN112187750A (en) * 2020-09-17 2021-01-05 李春梅 Information encryption method and system based on Internet
CN112187750B (en) * 2020-09-17 2022-09-20 深圳小步奔跑科技有限公司 Information encryption method and system based on Internet

Similar Documents

Publication Publication Date Title
CN105050081B (en) Method, device and system for connecting network access device to wireless network access point
US8832783B2 (en) System and method for performing secure communications
US8918633B2 (en) Information processing device, information processing system, and program
CN104662870A (en) Data security management system
US20160321459A1 (en) Method for accessing a data memory of a cloud computer system
CN101282218B (en) Method for ciphering and deciphering host computer and pickaback plane of split type terminal
CN102867157B (en) Mobile terminal and data guard method
CN104244237A (en) Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set
CN103037370A (en) Portable storage device and identity authentication method
WO2016045189A1 (en) Data reading/writing method of dual-system terminal and dual-system terminal
KR101809974B1 (en) A system for security certification generating authentication key combinating multi-user element and a method thereof
US9276748B2 (en) Data-encrypting method and decrypting method for a mobile phone
US20160315915A1 (en) Method for accessing a data memory of a cloud computer system using a modified domain name system (dns)
EP2840818B1 (en) Method and device for information security management of mobile terminal, and mobile terminal
CN105790962A (en) Conference document obtaining method, apparatus, and system
CN101171860B (en) Security method and device for managing access to multimedia contents
CN101296349A (en) Video file enciphering/deciphering system and method
CN104144411A (en) Encryption and decryption terminal and encryption and decryption method applied to encryption terminal and decryption terminal
CN102202057B (en) System and method for safely dumping data of mobile memory
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
WO2007142072A1 (en) Terminal device and data managing system using the same
WO2017120745A1 (en) Method, device, and system for processing profile
CN105610775A (en) Decryption method and system thereof, encryption method and system thereof, and mobile terminal
CN103164661A (en) Device and method used for managing data in terminal
CN101137973A (en) Method and apparatus for backing up and restoring domain information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160525