CN106067875A - Intelligent terminal's encryption method and system - Google Patents

Intelligent terminal's encryption method and system Download PDF

Info

Publication number
CN106067875A
CN106067875A CN201610352593.7A CN201610352593A CN106067875A CN 106067875 A CN106067875 A CN 106067875A CN 201610352593 A CN201610352593 A CN 201610352593A CN 106067875 A CN106067875 A CN 106067875A
Authority
CN
China
Prior art keywords
key
terminal
encrypted
default object
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610352593.7A
Other languages
Chinese (zh)
Other versions
CN106067875B (en
Inventor
黄师广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201610352593.7A priority Critical patent/CN106067875B/en
Publication of CN106067875A publication Critical patent/CN106067875A/en
Application granted granted Critical
Publication of CN106067875B publication Critical patent/CN106067875B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention provides a kind of intelligent terminal's encryption method and system, first terminal sends key request to the second terminal, key request is carried the information of default object, second terminal inquires about the key being encrypted default object information according to key request, the key inquired is returned to first terminal, the key that first terminal returns according to the second terminal is encrypted, thus realizes collaborative encryption between multiple terminals.

Description

Intelligent terminal's encryption method and system
Technical field
The present invention relates to intelligent terminal's technical field, particularly relate to intelligent terminal's encryption method and system.
Background technology
Encryption, is to change original information data with certain special algorithm so that even if undelegated user obtains The information encrypted, but because of the method not knowing deciphering, the content of information still cannot be understood.
In order to ensure the security and privacy of data, encryption technology is used widely, such as, have password in intelligent terminal Encryption, encrypting fingerprint etc..Along with being encrypted in polytype terminal application and the increasing of terminal type, ciphering process frequently The most loaded down with trivial details.
At present, when need to many station terminals be encrypted, need manually each terminal to be encrypted operation by platform, whole Ciphering process is complicated, and the most station terminals cannot realize the most collaborative encryption.
Summary of the invention
Based on this, it is necessary to the problem that cannot automatically work in coordination with encryption for multiple terminals, it is provided that a kind of intelligent terminal side of encryption Method and system, it is achieved the collaborative encryption in multiple terminals.
A kind of intelligent terminal's encryption method, is applied to first terminal, including step:
Receive the encrypted instruction of the default object to first terminal;
Send key request to the second terminal, and carry the information of default object;
Receiving the key that the second terminal returns, key is the key that default object is encrypted by the second terminal;
Response encrypted instruction, is encrypted according to the default object of the double secret key first terminal of the second terminal return.
A kind of intelligent terminal's encryption method, is applied to the second terminal, including step:
Receive the key request that first terminal sends, key request is carried the information of the default object of encryption;
The key that default object is encrypted by the information inquiry according to default object;
The key that default object is encrypted inquired is returned, so that first terminal is preset object to first terminal Encrypt according to key.
A kind of intelligent terminal's encryption system, is applied to first terminal, including:
Encrypted instruction receiver module, for receiving the encrypted instruction of the default object to first terminal;
Key request sending module, for sending key request to the second terminal, and carries the information of default object;
Key reception module, for receiving the key that the second terminal returns, key is that default object is carried out by the second terminal The key of encryption;
Response encrypting module, be used for responding encrypted instruction, according to second terminal return double secret key first terminal preset Object is encrypted.
A kind of intelligent terminal's encryption system, is applied to the second terminal, including:
Key request receiver module, for receiving the key request that first terminal sends, carries encryption in key request Preset the information of object;
Key enquiry module, for the key being encrypted default object according to the information inquiry presetting object;
Key sending module, for returning the key that default object is encrypted inquired to first terminal, so that First terminal is preset object encrypt according to key.
Above-mentioned intelligent terminal's encryption method and system, first terminal sends key request to the second terminal, in key request Carrying the information of default object, the second terminal inquires about, according to key request, the key that is encrypted default object information, to the One terminal returns the key inquired, and the key that first terminal returns according to the second terminal is encrypted, thus realizes terminal association With encryption.
Accompanying drawing explanation
Fig. 1 is the time diagram of intelligent terminal's encryption method in an embodiment;
Fig. 2 is the schematic flow sheet of intelligent terminal's encryption method in an embodiment;
Fig. 3 is the schematic flow sheet of intelligent terminal's encryption method in another embodiment;
Fig. 4 to Fig. 5 is to describe the interface schematic diagram of intelligent terminal's encryption method in an example;
Fig. 6 is the structural representation of intelligent terminal's encryption system in an embodiment;
Fig. 7 is the structural representation of intelligent terminal's encryption system in another embodiment.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, right The present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, not For limiting the present invention.
Use an instantiation below, and combine sequential chart as shown in Figure 1 and be discussed in detail wherein in an example, on State the data exchange process of intelligent terminal's encryption method.
Step 1: first terminal receives the encrypted instruction of the default object to first terminal.
Step 2: first terminal responds above-mentioned encrypted instruction, generates key request, wherein, carries default in CIPHERING REQUEST The information of object, first terminal sends key request to the second terminal.
Step 3: the second terminal receives and parses through the key request from first terminal, identifies and needs the default right of encryption As, inquire about the key that default object information is encrypted afterwards.
Step 4: the second terminal returns the key inquired to first terminal.
Step 5: first terminal receives from the key of the second terminal, and preset object according to this double secret key and complete encryption.
When encrypting multiple stage intelligent terminal, repeat the above steps 1-step 5 efficient, convenient can realize multiple stage intelligence eventually End encryption.
As in figure 2 it is shown, a kind of intelligent terminal's encryption method, it is applied to first terminal, including step:
S120: receive the encrypted instruction of the default object to first terminal.
Encrypted instruction to the default object of first terminal can be outside input to the instruction of first terminal can also be The encrypted instruction that first terminal response user operation automatically generates.In this encrypted instruction, record there is a need to the default right of encryption As, specifically, default object can include at least on screen, screen in object, application program and the document of display Kind.Such as, when first terminal screen is encrypted by needs, what step S120 received is the encrypted instruction to screen;When Needing when in first terminal, document is encrypted, what step S120 received is the encrypted instruction to document;When needs while When being encrypted the screen of first terminal and application program, what step S120 received is to screen and the application journey specified The encrypted instruction of sequence.
S140: send key request to the second terminal, and carry the information of default object.
First terminal, after receiving the encrypted instruction of default object, sends key request to the second terminal, at key Request carries the information of above-mentioned default object.Such as when default object is screen, first terminal sends to the second terminal Key request in carry the information of screen;When default object is application program, first terminal sends to the second terminal Key request carries the information of application program, non-essential, the information of application program can include application program title, The data such as the store path in first terminal.
S160: receiving the key that the second terminal returns, key is the key that default object is encrypted by the second terminal.
First terminal receives the key that the second terminal returns, and carries the second terminal and enter above-mentioned default object in this key The key of row encryption.Such as when default object is screen, the key received here is second terminal screen to the second terminal The key that curtain is encrypted;When default object is X document, the key received here is that the second terminal is to X in the second terminal The key that document is encrypted.Specifically, key can include at least one in fingerprint key and numeric keypad key, when When key is fingerprint key, the fingerprint key returned for the second terminal received here;When key is numeric keypad key, Here the numeric keypad key returned for the second terminal received.
S180: response encrypted instruction, is encrypted according to the default object of the double secret key first terminal of the second terminal return.
Encrypted instruction in first terminal response of step S120, the double secret key according to receiving in step S160 presets object It is encrypted.Such as when default object is screen, respond first terminal screen encrypted instruction here, anti-according to the second terminal The screen of the double secret key first terminal of feedback is encrypted (screen locking).
Multiple instantiation will be used below, the concrete scheme of above-mentioned intelligent terminal encryption method will be discussed in detail.
Embodiment one, default object is screen, and key is fingerprint key.
User operates on first terminal, selects to lock screen, and first terminal receives screen locking and instructs, and first Terminal triggers and generates key request, carries screen message in key request, and first terminal sends key request to the second terminal, Receiving the fingerprint key that the second terminal returns, this fingerprint key is the fingerprint key that screen is encrypted by the second terminal, first Terminal response screen locks instruction, encrypts screen according to this fingerprint key.
Embodiment two, default object is document X, and key is numeric keypad key.
User operates on first terminal, selects to be encrypted X document in first terminal, and first terminal receives X document Encrypted instruction, first terminal triggers and generates key request, carries X document information in key request, and first terminal sends key Asking to the second terminal, receive the numeric keypad key that the second terminal returns, this numeric keypad key is that the second terminal is to X document The numeric keypad key being encrypted, first terminal response X file encryption instruction, add according to this numeric keypad double secret key X document Close.
Embodiment three, default object is the object M and application program N of display on screen, and key is by fingerprint key and numeral Keyboard key two parts form.
User operates on first terminal, selects to be encrypted the object M and application program N of display on screen, first Terminal receives object M and the application program N encrypted instruction of display on screen, and first terminal triggers and generates key request, and key please Object M and the application program N information carrying display on screen, first terminal transmission key request is asked to the second terminal, to connect Receiving the key of fingerprint+numeric keypad combination that the second terminal returns, the key of this fingerprint+numeric keypad combination is the second terminal pair The key that is encrypted of object M and application program N of display on screen, in first terminal response screen display object M and should With program N encrypted instruction, add according to the object M and application program N of display on the double secret key screen of this fingerprint+numeric keypad combination Close.
As it is shown on figure 3, a kind of intelligent terminal's encryption method, it is applied to the second terminal, including step:
S220: receive the key request that first terminal sends, carry the information of the default object of encryption in key request.
Second terminal receives the key request that first terminal sends over, and carrying first terminal in this key request please Seek the information of the default object of encryption.Specifically, default object can include the object of display on screen, screen, application journey At least one in sequence and document.Such as, when first terminal needs to be encrypted screen, it is close that the second terminal receives Key request i.e. carries the information of screen;When first terminal needs to be encrypted document, it is close that the second terminal receives I.e. carrying the information of document in key request, specifically, the information of document can include document title, and document is at first terminal The data such as middle store path and document security classification.
S240: the key default object being encrypted according to the information inquiry of default object.
Second terminal information based on the default object obtained in step S220, it is close that default object is encrypted by inquiry Key.Specifically, at least one during key can include fingerprint key and numeric keypad key.When key is fingerprint key Time, the fingerprint key that default object is encrypted by the second terminal according to the information inquiry presetting object;When key is numeral keys During dish key, the second terminal presets, according to the information inquiry presetting object, the numeric keypad key that object is encrypted;Work as key During for fingerprint+numeric keypad combination key, the second terminal presets, according to the information inquiry presetting object, the finger that object is encrypted Stricture of vagina+numeric keypad combination key.
S260: return the key that default object is encrypted inquired to first terminal, so that pre-in first terminal If object is encrypted according to key.
Second terminal returns the key being encrypted default object of inquiry in step S240 to first terminal, so that the One terminal is preset object encrypt according to key.Specifically, when default object is screen, and key is fingerprint key, at this In, the second terminal returns the fingerprint key being encrypted screen inquired to first terminal, so that the screen of first terminal It is encrypted according to this fingerprint key;When default object is document X, and key is numeric keypad key, here, the second terminal The numeric keypad key that document X is encrypted inquired is returned, so that the screen of first terminal is according to being somebody's turn to do to first terminal Numeric keypad key is encrypted.
Multiple instantiation will be used below, the concrete scheme of above-mentioned intelligent terminal encryption method will be discussed in detail.
Embodiment one, default object is screen, and key is fingerprint key.
Second terminal receives the key request that first terminal sends, and carries the information of screen in this key request, the The fingerprint key that screen is encrypted by two terminals according to the information inquiry of screen, when inquiring this fingerprint key, second eventually The fingerprint key that screen is encrypted by end transmission is to first terminal, so that screen is carried out according to this fingerprint key in first terminal Encryption.
Embodiment two, default object is document X, and key is numeric keypad key.
Second terminal receives the key request that first terminal sends, and carries the information of document X in this key request, the The numeric keypad key that screen is encrypted by two terminals according to the information inquiry of document X, when inquiring this numeric keypad key Time, the numeric keypad key that document X is encrypted by the second terminal transmission is to first terminal, so that document X root in first terminal It is encrypted according to this numeric keypad key.
Embodiment three, default object is the object M and application program N of display on screen, and key is by fingerprint key and numeral Keyboard key two parts form.
Second terminal receives the key request that first terminal sends, and carries on screen the right of display in this key request As M and the information of application program N, the second terminal according to the information inquiry of the object M and application program N of display on screen to screen The key of the fingerprint that the object M and application program N of upper display is encrypted+numeric keypad combination, when inquiring this fingerprint+numeral During the key of keyboard combination, the second terminal sends the key of this fingerprint+numeric keypad combination to first terminal, so that first terminal On middle screen, the object M and application program N of display are encrypted according to the key of this fingerprint+numeric keypad combination.
Above-mentioned intelligent terminal's encryption method, first terminal sends key request to the second terminal, carries pre-in key request If the information of object, the second terminal inquires about the key being encrypted default object information according to key request, to first terminal Returning the key inquired, the key that first terminal returns according to the second terminal is encrypted, thus realizes assisting between multiple terminals With encryption.
Non-essential, above-mentioned first terminal and the second terminal are to log in the different terminals of same account.Such as first terminal With smart mobile phone and the panel computer that the second terminal can respectively be logged in same subscriber account, or it is logged in same subscriber account Number smart mobile phone and desktop computer etc..
Another instantiation will be used below, and combination interface schematic diagram 4 and Fig. 5 will be discussed in detail above-mentioned intelligent terminal encryption The concrete scheme of method.
In a certain application scenarios, need by fingerprint key, the screen of first terminal to be encrypted in this application scenarios, I.e. presetting object is screen, and key is fingerprint key.As shown in Figure 4, before performing encryption, first terminal screen unencryption, The screen of the second terminal completes encrypting fingerprint by finger A.As it is shown in figure 5, when performing first terminal encryption, user is (at Fig. 5 Middle finger B illustrates) operate on first terminal, the screen of first terminal is locked, first terminal receives screen and locks Instruction, first terminal triggers and generates key request, carries screen message in key request, and first terminal sends key request extremely Second terminal, the second terminal receives key request, and the key of query screen encryption is (with in finger A signal historical operation the in Fig. 4 Two terminal screen encrypting fingerprint processes), the fingerprint key sent a query to first terminal, first terminal receives the second terminal and returns The fingerprint key returned, response screen locks instruction, encrypts screen according to this fingerprint key.
As shown in Figure 6, the present invention also provides for a kind of intelligent terminal's encryption system, is applied to first terminal, including:
Encrypted instruction receiver module 120, for receiving the encrypted instruction of the default object to first terminal.
Key request sending module 140, for sending key request to the second terminal, and carries the information of default object.
Key reception module 160, for receiving the key that the second terminal returns, key is that default object is entered by the second terminal The key of row encryption.
Response encrypting module 180, is used for responding encrypted instruction, double secret key first terminal pre-returned according to the second terminal If object is encrypted.
Wherein in an embodiment, default object includes object, application program and the document of display on screen, screen In at least one.
Wherein in an embodiment, key includes at least one in fingerprint key and numeric keypad key.
As it is shown in fig. 7, the present invention also provides for a kind of intelligent terminal's encryption system, it is applied to the second terminal, including:
Key request receiver module 220, for receiving the key request that first terminal sends, carries encryption in key request The information of default object.
Key enquiry module 240, for the key being encrypted default object according to the information inquiry presetting object.
Key sending module 260, for returning the key that default object is encrypted inquired to first terminal, with Make that first terminal is preset object to encrypt according to key.
Above-mentioned intelligent terminal's encryption system, first terminal sends key request to the second terminal, carries pre-in key request If the information of object, the second terminal inquires about the key being encrypted default object information according to key request, to first terminal Returning the key inquired, the key that first terminal returns according to the second terminal is encrypted, thus realizes assisting between multiple terminals With encryption.
Embodiment described above only have expressed the several embodiments of the present invention, and it describes more concrete and detailed, but also Can not therefore be construed as limiting the scope of the patent.It should be pointed out that, come for those of ordinary skill in the art Saying, without departing from the inventive concept of the premise, it is also possible to make some deformation and improvement, these broadly fall into the protection of the present invention Scope.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.

Claims (12)

1. intelligent terminal's encryption method, is applied to first terminal, it is characterised in that include step:
Receive the encrypted instruction of the default object to described first terminal;
Send key request to the second terminal, and carry the information of described default object;
Receiving the key that the second terminal returns, described key is the key that described default object is encrypted by the second terminal;
Respond described encrypted instruction, enter according to the described default object of first terminal described in the double secret key that described second terminal returns Row encryption.
Intelligent terminal's encryption method the most according to claim 1, it is characterised in that described default object includes screen, screen At least one in object, application program and the document of display on curtain.
Intelligent terminal's encryption method the most according to claim 1, it is characterised in that described key includes fingerprint key sum At least one in word keyboard key.
4. intelligent terminal's encryption method, is applied to the second terminal, it is characterised in that include step:
Receive the key request that first terminal sends, described key request is carried the information of the default object of encryption;
The key that described default object is encrypted by the information inquiry according to described default object;
The key that described default object is encrypted inquired is returned to described first terminal, so that in described first terminal Described default object is encrypted according to described key.
Intelligent terminal's encryption method the most according to claim 4, it is characterised in that described default object includes screen, screen At least one in object, application program and the document of display on curtain.
Intelligent terminal's encryption method the most according to claim 4, it is characterised in that described key includes fingerprint key sum At least one in word keyboard key.
7. intelligent terminal's encryption system, is applied to first terminal, it is characterised in that including:
Encrypted instruction receiver module, for receiving the encrypted instruction of the default object to described first terminal;
Key request sending module, for sending key request to the second terminal, and carries the information of described default object;
Key reception module, for receiving the key that the second terminal returns, described key is that the second terminal is to described default object The key being encrypted;
Response encrypting module, is used for responding described encrypted instruction, according to described in the double secret key that described second terminal returns first eventually The described default object of end is encrypted.
Intelligent terminal's encryption system the most according to claim 7, it is characterised in that described default object includes screen, screen At least one in object, application program and the document of display on curtain.
Intelligent terminal's encryption system the most according to claim 7, it is characterised in that described key includes fingerprint key sum At least one in word keyboard key.
10. intelligent terminal's encryption system, is applied to the second terminal, it is characterised in that including:
Key request receiver module, for receiving the key request that first terminal sends, carries encryption in described key request Preset the information of object;
Key enquiry module, for the key being encrypted described default object according to the information inquiry of described default object;
Key sending module, for returning the key that described default object is encrypted inquired to described first terminal, Encrypt so that presetting object described in described first terminal according to described key.
11. intelligent terminal's encryption systems according to claim 10, it is characterised in that described default object include screen, At least one in object, application program and the document of display on screen.
12. intelligent terminal's encryption systems according to claim 10, it is characterised in that described key include fingerprint key and At least one in numeric keypad key.
CN201610352593.7A 2016-05-24 2016-05-24 Intelligent terminal encryption method and system Active CN106067875B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610352593.7A CN106067875B (en) 2016-05-24 2016-05-24 Intelligent terminal encryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610352593.7A CN106067875B (en) 2016-05-24 2016-05-24 Intelligent terminal encryption method and system

Publications (2)

Publication Number Publication Date
CN106067875A true CN106067875A (en) 2016-11-02
CN106067875B CN106067875B (en) 2020-04-17

Family

ID=57420199

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610352593.7A Active CN106067875B (en) 2016-05-24 2016-05-24 Intelligent terminal encryption method and system

Country Status (1)

Country Link
CN (1) CN106067875B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106817377A (en) * 2017-03-27 2017-06-09 努比亚技术有限公司 A kind of data encryption device, decryption device and method

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100290627A1 (en) * 2008-02-29 2010-11-18 Mitsubishi Electric Corporation Key management server, terminal, key sharing system, key delivery program, key reception program, key delivery method, and key reception method
CN101911581A (en) * 2007-11-30 2010-12-08 三星电子株式会社 Method and system for secure communication in near field communication network
CN101997678A (en) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 Password acquisition method and terminal
CN102930188A (en) * 2012-10-12 2013-02-13 中兴通讯股份有限公司南京分公司 Screen unlocking method and device as well as terminal
CN104426649A (en) * 2013-08-22 2015-03-18 中国电信股份有限公司 Automatic secret key synchronization method and system, and secret key management platform
CN104834868A (en) * 2015-04-28 2015-08-12 一铂有限公司 Electronic data protection method, device and terminal equipment
CN104850801A (en) * 2015-06-09 2015-08-19 广东欧珀移动通信有限公司 File encryption method and file encryption device
CN105022965A (en) * 2015-07-14 2015-11-04 广东欧珀移动通信有限公司 Data encryption method and apparatus
CN105262756A (en) * 2015-10-28 2016-01-20 广东欧珀移动通信有限公司 Data encryption method, data decryption method, data encryption apparatus, and data decryption apparatus
CN105429949A (en) * 2015-10-28 2016-03-23 广东欧珀移动通信有限公司 Cipher pushing method and pushing system
CN106888183A (en) * 2015-12-15 2017-06-23 阿里巴巴集团控股有限公司 Data encryption, decryption, the method and apparatus and system of key request treatment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101911581A (en) * 2007-11-30 2010-12-08 三星电子株式会社 Method and system for secure communication in near field communication network
US20100290627A1 (en) * 2008-02-29 2010-11-18 Mitsubishi Electric Corporation Key management server, terminal, key sharing system, key delivery program, key reception program, key delivery method, and key reception method
CN101997678A (en) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 Password acquisition method and terminal
CN102930188A (en) * 2012-10-12 2013-02-13 中兴通讯股份有限公司南京分公司 Screen unlocking method and device as well as terminal
CN104426649A (en) * 2013-08-22 2015-03-18 中国电信股份有限公司 Automatic secret key synchronization method and system, and secret key management platform
CN104834868A (en) * 2015-04-28 2015-08-12 一铂有限公司 Electronic data protection method, device and terminal equipment
CN104850801A (en) * 2015-06-09 2015-08-19 广东欧珀移动通信有限公司 File encryption method and file encryption device
CN105022965A (en) * 2015-07-14 2015-11-04 广东欧珀移动通信有限公司 Data encryption method and apparatus
CN105262756A (en) * 2015-10-28 2016-01-20 广东欧珀移动通信有限公司 Data encryption method, data decryption method, data encryption apparatus, and data decryption apparatus
CN105429949A (en) * 2015-10-28 2016-03-23 广东欧珀移动通信有限公司 Cipher pushing method and pushing system
CN106888183A (en) * 2015-12-15 2017-06-23 阿里巴巴集团控股有限公司 Data encryption, decryption, the method and apparatus and system of key request treatment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106817377A (en) * 2017-03-27 2017-06-09 努比亚技术有限公司 A kind of data encryption device, decryption device and method

Also Published As

Publication number Publication date
CN106067875B (en) 2020-04-17

Similar Documents

Publication Publication Date Title
US20200084621A1 (en) Wireless network connection method, apparatus, and system
US10231123B2 (en) Bluetooth low energy (BLE) communication between a mobile device and a vehicle
CN110704860A (en) Longitudinal federal learning method, device and system for improving safety and storage medium
CN107241339B (en) Identity authentication method, identity authentication device and storage medium
US7509130B2 (en) Method for locking and releasing a camera in a portable terminal
US9497191B2 (en) Multiple user authentications on a communications device
US20100250939A1 (en) System and method of handling encrypted backup data
CN104144049A (en) Encryption communication method, system and device
EP2127292A1 (en) Secure extranet access to collaborative activities in a collaborative computing environment
GB2585170A (en) Oblivious pseudorandom function in a key management system
CN104507080A (en) File processing method and terminal
CN104966007A (en) Multi-user login method and apparatus
CN104573548A (en) Information encryption and decryption methods and devices and terminal
CN104270516B (en) Decryption method and mobile terminal
CN105101183A (en) Method and system for protecting private contents at mobile terminal
US11652640B2 (en) Systems and methods for out-of-band authenticity verification of mobile applications
CN112287372A (en) Method and apparatus for protecting clipboard privacy
US20220272511A1 (en) Subscription data management method and apparatus
US20120166801A1 (en) Mutual authentication system and method for mobile terminals
CN107305710B (en) Safe vehicle access control method and system
US10666644B2 (en) Enterprise key and password management system
CN111818466B (en) Information sending and receiving method and device, electronic equipment and readable storage medium
CN105022965A (en) Data encryption method and apparatus
CN113424490A (en) Secure password generation and management using NFC and contactless smart cards
CN112702412A (en) Batch multi-dimensional switch money box control system, control method, equipment and medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant