CN106067875B - Intelligent terminal encryption method and system - Google Patents

Intelligent terminal encryption method and system Download PDF

Info

Publication number
CN106067875B
CN106067875B CN201610352593.7A CN201610352593A CN106067875B CN 106067875 B CN106067875 B CN 106067875B CN 201610352593 A CN201610352593 A CN 201610352593A CN 106067875 B CN106067875 B CN 106067875B
Authority
CN
China
Prior art keywords
key
intelligent terminal
terminal
preset object
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610352593.7A
Other languages
Chinese (zh)
Other versions
CN106067875A (en
Inventor
黄师广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201610352593.7A priority Critical patent/CN106067875B/en
Publication of CN106067875A publication Critical patent/CN106067875A/en
Application granted granted Critical
Publication of CN106067875B publication Critical patent/CN106067875B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides an intelligent terminal encryption method and system.A first terminal sends a key request to a second terminal, the key request carries information of a preset object, the second terminal inquires a key for encrypting the information of the preset object according to the key request, the inquired key is returned to the first terminal, and the first terminal encrypts according to the key returned by the second terminal, so that the cooperative encryption among multiple terminals is realized.

Description

Intelligent terminal encryption method and system
Technical Field
The invention relates to the technical field of intelligent terminals, in particular to an intelligent terminal encryption method and system.
Background
Encryption is to change the original information data by a special algorithm, so that even if an unauthorized user obtains the encrypted information, the content of the information cannot be known because the unauthorized user does not know the decryption method.
In order to ensure the security and privacy of data, encryption technologies are widely used, for example, in an intelligent terminal, there are password encryption, fingerprint encryption, and the like. As encryption is applied to various types of terminals and the types of terminals increase, frequent encryption processes are very cumbersome.
At present, when a plurality of terminals need to be encrypted, each terminal needs to be manually encrypted one by one, and the whole encryption process is complex, namely, the plurality of terminals cannot realize automatic collaborative encryption.
Disclosure of Invention
Therefore, it is necessary to provide an intelligent terminal encryption method and system for realizing multi-terminal collaborative encryption aiming at the problem that multi-terminal cannot automatically collaboratively encrypt.
An intelligent terminal encryption method is applied to a first terminal and comprises the following steps:
receiving an encryption instruction of a preset object of a first terminal;
sending a key request to a second terminal, wherein the key request carries information of a preset object;
receiving a key returned by the second terminal, wherein the key is a key used by the second terminal for encrypting the preset object;
and responding to the encryption instruction, and encrypting the preset object of the first terminal according to the key returned by the second terminal.
An intelligent terminal encryption method is applied to a second terminal and comprises the following steps:
receiving a key request sent by a first terminal, wherein the key request carries information of an encrypted preset object;
inquiring a key for encrypting the preset object according to the information of the preset object;
and returning the inquired key for encrypting the preset object to the first terminal so that the preset object in the first terminal is encrypted according to the key.
An intelligent terminal encryption system is applied to a first terminal and comprises:
the encryption instruction receiving module is used for receiving an encryption instruction of a preset object of the first terminal;
the key request sending module is used for sending a key request to the second terminal and carrying information of a preset object;
the key receiving module is used for receiving a key returned by the second terminal, wherein the key is used for encrypting the preset object by the second terminal;
and the response encryption module is used for responding to the encryption instruction and encrypting the preset object of the first terminal according to the key returned by the second terminal.
An intelligent terminal encryption system is applied to a second terminal and comprises:
the key request receiving module is used for receiving a key request sent by the first terminal, wherein the key request carries information of an encrypted preset object;
the key inquiry module is used for inquiring a key for encrypting the preset object according to the information of the preset object;
and the key sending module is used for returning the inquired key for encrypting the preset object to the first terminal so as to encrypt the preset object in the first terminal according to the key.
According to the intelligent terminal encryption method and system, the first terminal sends the key request to the second terminal, the key request carries the information of the preset object, the second terminal inquires the key for encrypting the information of the preset object according to the key request, the inquired key is returned to the first terminal, and the first terminal encrypts according to the key returned by the second terminal, so that terminal collaborative encryption is achieved.
Drawings
FIG. 1 is a timing diagram illustrating an encryption method for an intelligent terminal according to an embodiment;
FIG. 2 is a flowchart illustrating an encryption method for an intelligent terminal according to an embodiment;
fig. 3 is a schematic flowchart of an encryption method of an intelligent terminal in another embodiment;
fig. 4 to 5 are schematic interface diagrams illustrating an encryption method of an intelligent terminal according to an example;
FIG. 6 is a block diagram of an embodiment of an intelligent terminal encryption system;
fig. 7 is a schematic structural diagram of an encryption system of an intelligent terminal in another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
A specific example is adopted below, and a detailed description is given in conjunction with a timing chart shown in fig. 1 to describe in detail a data interaction process of the above-mentioned encryption method for an intelligent terminal in one example.
Step 1: the first terminal receives an encryption instruction of a preset object of the first terminal.
Step 2: and the first terminal responds to the encryption instruction to generate a key request, wherein the encryption request carries information of the preset object, and the first terminal sends the key request to the second terminal.
And step 3: the second terminal receives and analyzes the key request from the first terminal, identifies the preset object needing to be encrypted, and then inquires the key for encrypting the preset object information.
And 4, step 4: and the second terminal returns the inquired key to the first terminal.
And 5: and the first terminal receives the key from the second terminal and encrypts the preset object according to the key.
When a plurality of intelligent terminals are encrypted, the encryption of the plurality of intelligent terminals can be efficiently and conveniently realized by repeating the steps 1 to 5.
As shown in fig. 2, an intelligent terminal encryption method applied to a first terminal includes the steps of:
s120: and receiving an encryption instruction of a preset object of the first terminal.
The encryption instruction for the preset object of the first terminal may be an instruction externally input to the first terminal or an encryption instruction automatically generated by the first terminal in response to a user operation. A preset object to be encrypted is recorded in the encryption instruction, and specifically, the preset object may include at least one of a screen, an object displayed on the screen, an application program, and a document. For example, when the first terminal screen needs to be encrypted, step S120 receives an encryption instruction for the screen; when the document in the first terminal needs to be encrypted, step S120 receives an encryption instruction for the document; when it is required to encrypt both the screen and the application of the first terminal, step S120 receives an encryption instruction for the screen and the designated application.
S140: and sending a key request to the second terminal, and carrying the information of the preset object.
After receiving an encryption instruction of a preset object, a first terminal sends a key request to a second terminal, wherein the key request carries information of the preset object. For example, when the preset object is a screen, a key request sent by the first terminal to the second terminal carries information of the screen; when the preset object is an application, the key request sent by the first terminal to the second terminal carries information of the application, and optionally, the information of the application may include data such as a name of the application, a storage path in the first terminal, and the like.
S160: and receiving a key returned by the second terminal, wherein the key is a key used by the second terminal for encrypting the preset object.
And the first terminal receives a secret key returned by the second terminal, wherein the secret key carries a secret key used by the second terminal for encrypting the preset object. For example, when the preset object is a screen, the received key is a key for the second terminal to encrypt the screen of the second terminal; and when the preset object is an X document, the received key is a key for the second terminal to encrypt the X document in the second terminal. Specifically, the key may include at least one of a fingerprint key and a keypad key, and when the key is the fingerprint key, the received fingerprint key is returned by the second terminal; when the key is the key of the numeric keyboard, the received key is the key of the numeric keyboard returned by the second terminal.
S180: and responding to the encryption instruction, and encrypting the preset object of the first terminal according to the key returned by the second terminal.
The first terminal encrypts the preset object according to the key received in step S160 in response to the encryption instruction in step S120. For example, when the preset object is a screen, here, in response to an encryption instruction for the screen of the first terminal, the screen of the first terminal is encrypted (screen locking) according to the key fed back by the second terminal.
The following describes in detail a specific scheme of the above-mentioned encryption method for the intelligent terminal by using a plurality of specific examples.
In the first embodiment, the preset object is a screen, and the key is a fingerprint key.
The method comprises the steps that a user operates on a first terminal, the screen is selected to be locked, the first terminal receives a screen locking instruction, the first terminal triggers a key generation request, the key request carries screen information, the first terminal sends the key request to a second terminal, receives a fingerprint key returned by the second terminal, the fingerprint key is a fingerprint key used by the second terminal for encrypting the screen, and the first terminal responds to the screen locking instruction and encrypts the screen according to the fingerprint key.
In the second embodiment, the preset object is a document X, and the key is a numeric keypad key.
The method comprises the steps that a user operates on a first terminal, an X document in the first terminal is selected to be encrypted, the first terminal receives an X document encryption instruction, the first terminal triggers a key generation request, the key request carries X document information, the first terminal sends the key request to a second terminal, a numeric keyboard key returned by the second terminal is received, the numeric keyboard key is the numeric keyboard key used by the second terminal for encrypting the X document, the first terminal responds to the X document encryption instruction, and the X document is encrypted according to the numeric keyboard key.
In the third embodiment, the preset objects are an object M and an application program N displayed on a screen, and the key is composed of a fingerprint key and a numeric keyboard key.
The method comprises the steps that a user operates on a first terminal, an object M and an application program N displayed on a screen are selected to be encrypted, the first terminal receives an encryption instruction of the object M and the application program N displayed on the screen, the first terminal triggers and generates a key request, the key request carries information of the object M and the application program N displayed on the screen, the first terminal sends the key request to a second terminal, a key of a fingerprint and numeric keyboard combination returned by the second terminal is received, the key of the fingerprint and numeric keyboard combination is a key for the second terminal to encrypt the object M and the application program N displayed on the screen, the first terminal responds to the encryption instruction of the object M and the application program N displayed on the screen, and the object M and the application program N displayed on the screen are encrypted according to the key of the fingerprint and numeric keyboard combination.
As shown in fig. 3, an intelligent terminal encryption method applied to a second terminal includes the steps of:
s220: and receiving a key request sent by the first terminal, wherein the key request carries the information of the encrypted preset object.
And the second terminal receives a key request sent by the first terminal, wherein the key request carries the information of the preset object requested to be encrypted by the first terminal. Specifically, the preset object may include at least one of a screen, an object displayed on the screen, an application, and a document. For example, when a first terminal needs to encrypt a screen, a key request received by a second terminal carries information of the screen; when the first terminal needs to encrypt the document, the key request received by the second terminal carries information of the document, specifically, the information of the document may include data such as a document name, a document storage path in the first terminal, and a document security level.
S240: and inquiring a key for encrypting the preset object according to the information of the preset object.
The second terminal inquires a key for encrypting the preset object based on the information of the preset object obtained in step S220. In particular, the key may include at least one of a fingerprint key and a numeric keyboard key. When the key is a fingerprint key, the second terminal inquires the fingerprint key for encrypting the preset object according to the information of the preset object; when the key is a digital keyboard key, the second terminal inquires the digital keyboard key encrypted by the preset object according to the information of the preset object; and when the key is the fingerprint and numeric keyboard combined key, the second terminal inquires the fingerprint and numeric keyboard combined key encrypted by the preset object according to the information of the preset object.
S260: and returning the inquired key for encrypting the preset object to the first terminal so that the preset object in the first terminal is encrypted according to the key.
The second terminal returns the key for encrypting the preset object queried in step S240 to the first terminal, so that the preset object in the first terminal is encrypted according to the key. Specifically, when the preset object is a screen and the key is a fingerprint key, the second terminal returns the queried fingerprint key for encrypting the screen to the first terminal, so that the screen of the first terminal is encrypted according to the fingerprint key; when the preset object is a document X and the key is a numeric keyboard key, the second terminal returns the queried numeric keyboard key for encrypting the document X to the first terminal, so that the screen of the first terminal is encrypted according to the numeric keyboard key.
The following describes in detail a specific scheme of the above-mentioned encryption method for the intelligent terminal by using a plurality of specific examples.
In the first embodiment, the preset object is a screen, and the key is a fingerprint key.
The second terminal receives a key request sent by the first terminal, the key request carries screen information, the second terminal inquires a fingerprint key for encrypting the screen according to the screen information, and when the fingerprint key is inquired, the second terminal sends the fingerprint key for encrypting the screen to the first terminal so that the screen in the first terminal is encrypted according to the fingerprint key.
In the second embodiment, the preset object is a document X, and the key is a numeric keypad key.
The second terminal receives a key request sent by the first terminal, the key request carries information of a document X, the second terminal inquires a numeric keyboard key for encrypting a screen according to the information of the document X, and when the numeric keyboard key is inquired, the second terminal sends the numeric keyboard key for encrypting the document X to the first terminal so that the document X in the first terminal is encrypted according to the numeric keyboard key.
In the third embodiment, the preset objects are an object M and an application program N displayed on a screen, and the key is composed of a fingerprint key and a numeric keyboard key.
The second terminal receives a key request sent by the first terminal, the key request carries information of an object M and an application program N displayed on a screen, the second terminal inquires a key of a fingerprint and numeric keyboard combination for encrypting the object M and the application program N displayed on the screen according to the information of the object M and the application program N displayed on the screen, and when the key of the fingerprint and numeric keyboard combination is inquired, the second terminal sends the key of the fingerprint and numeric keyboard combination to the first terminal, so that the object M and the application program N displayed on the screen in the first terminal are encrypted according to the key of the fingerprint and numeric keyboard combination.
According to the intelligent terminal encryption method, the first terminal sends the key request to the second terminal, the key request carries the information of the preset object, the second terminal inquires the key for encrypting the information of the preset object according to the key request, the inquired key is returned to the first terminal, and the first terminal encrypts according to the key returned by the second terminal, so that the cooperative encryption among multiple terminals is realized.
Optionally, the first terminal and the second terminal are different terminals that log in the same account. For example, the first terminal and the second terminal may be a smart phone and a tablet computer that log in with the same user account, or a smart phone and a desktop computer that log in with the same user account, respectively.
Another embodiment will be adopted below, and a detailed description will be given of a specific scheme of the above-mentioned encryption method for the intelligent terminal in conjunction with the interface schematic diagram 4 and fig. 5.
In a certain application scenario, the screen of the first terminal needs to be encrypted by the fingerprint key in the application scenario, that is, the preset object is the screen, and the key is the fingerprint key. As shown in fig. 4, before encryption is performed, the first terminal screen is not encrypted, and the second terminal screen completes fingerprint encryption by the finger a. As shown in fig. 5, when a first terminal encryption is executed, a user (indicated by a finger B in fig. 5) operates on the first terminal to lock a screen of the first terminal, the first terminal receives a screen locking instruction, the first terminal triggers a key generation request, the key request carries screen information, the first terminal sends the key request to a second terminal, the second terminal receives the key request, inquires a key for the screen encryption (indicated by a finger a in fig. 4 as a second terminal screen fingerprint encryption process in a history operation), sends the inquired fingerprint key to the first terminal, the first terminal receives a fingerprint key returned by the second terminal, responds to the screen locking instruction, and encrypts the screen according to the fingerprint key.
As shown in fig. 6, the present invention further provides an intelligent terminal encryption system, applied to a first terminal, including:
the encryption instruction receiving module 120 is configured to receive an encryption instruction for a preset object of the first terminal.
And a key request sending module 140, configured to send a key request to the second terminal, and carry information of the preset object.
The key receiving module 160 is configured to receive a key returned by the second terminal, where the key is a key used by the second terminal to encrypt the preset object.
And the response encryption module 180 is configured to respond to the encryption instruction and encrypt the preset object of the first terminal according to the key returned by the second terminal.
In one embodiment, the preset object includes at least one of a screen, an object displayed on the screen, an application, and a document.
In one embodiment, the key comprises at least one of a fingerprint key and a numeric keyboard key.
As shown in fig. 7, the present invention further provides an intelligent terminal encryption system, which is applied to a second terminal, and includes:
the key request receiving module 220 is configured to receive a key request sent by the first terminal, where the key request carries information of the encrypted preset object.
And a key inquiry module 240 configured to inquire a key for encrypting the preset object according to the information of the preset object.
The key sending module 260 is configured to return the queried key for encrypting the preset object to the first terminal, so that the preset object in the first terminal is encrypted according to the key.
According to the intelligent terminal encryption system, the first terminal sends the key request to the second terminal, the key request carries the information of the preset object, the second terminal inquires the key for encrypting the information of the preset object according to the key request, the inquired key is returned to the first terminal, and the first terminal encrypts the information according to the key returned by the second terminal, so that the multi-terminal cooperative encryption is realized.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (12)

1. An intelligent terminal collaborative encryption method is applied to a first intelligent terminal and is characterized by comprising the following steps:
receiving an encryption instruction of a preset object of the first intelligent terminal;
sending a key request to a second intelligent terminal, wherein the key request carries information of the preset object, and the first intelligent terminal and the second intelligent terminal are different terminals for logging in the same account;
receiving a key returned by the second intelligent terminal, wherein the key is a key which is obtained by the second intelligent terminal encrypting the preset object in the second intelligent terminal in advance before the encryption method is executed;
and responding to the encryption instruction, and encrypting the preset object of the first intelligent terminal according to the key returned by the second intelligent terminal.
2. The cooperative encryption method for intelligent terminals according to claim 1, wherein the preset object comprises at least one of a screen, an object displayed on the screen, an application program, and a document.
3. The cooperative encryption method for smart terminals according to claim 1, wherein the key includes at least one of a fingerprint key and a keypad key.
4. An intelligent terminal collaborative encryption method is applied to a second intelligent terminal and is characterized by comprising the following steps:
receiving a key request sent by a first intelligent terminal, wherein the key request carries encrypted preset object information, and the first intelligent terminal and a second intelligent terminal are different terminals logging in the same account;
inquiring a key for encrypting the preset object according to the information of the preset object, wherein the key is a key for encrypting the preset object in a second intelligent terminal in advance by the second intelligent terminal before the encryption method is executed;
and returning the inquired key for encrypting the preset object to the first intelligent terminal so that the preset object in the first intelligent terminal is encrypted according to the key.
5. The cooperative encryption method for intelligent terminals according to claim 4, wherein the preset object comprises at least one of a screen, an object displayed on the screen, an application program, and a document.
6. The cooperative encryption method for smart terminals according to claim 4, wherein the key includes at least one of a fingerprint key and a keypad key.
7. The utility model provides an intelligent terminal encryption system in coordination, is applied to first intelligent terminal, its characterized in that includes:
the encryption instruction receiving module is used for receiving an encryption instruction of a preset object of the first intelligent terminal;
the key request sending module is used for sending a key request to a second intelligent terminal and carrying the information of the preset object, and the first intelligent terminal and the second intelligent terminal are different terminals for logging in the same account;
the key receiving module is used for receiving a key returned by the second intelligent terminal, wherein the key is a key which is obtained by the second intelligent terminal encrypting the preset object in the second intelligent terminal in advance before the encryption method is executed;
and the response encryption module is used for responding to the encryption instruction and encrypting the preset object of the first intelligent terminal according to the key returned by the second intelligent terminal.
8. The intelligent terminal collaborative encryption system according to claim 7, wherein the preset object includes at least one of a screen, an object displayed on the screen, an application, and a document.
9. The smart terminal collaborative encryption system according to claim 7, wherein the key includes at least one of a fingerprint key and a numeric keyboard key.
10. The utility model provides an intelligent terminal encryption system in coordination, is applied to second intelligent terminal, its characterized in that includes:
the key request receiving module is used for receiving a key request sent by a first intelligent terminal, the key request carries encrypted preset object information, and the first intelligent terminal and a second intelligent terminal are different terminals for logging in the same account;
the key inquiry module is used for inquiring a key for encrypting the preset object according to the information of the preset object, wherein the key is used for encrypting the preset object in the second intelligent terminal in advance by the second intelligent terminal before the encryption method is executed;
and the key sending module is used for returning the inquired key for encrypting the preset object to the first intelligent terminal so as to encrypt the preset object in the first intelligent terminal according to the key.
11. The intelligent terminal collaborative encryption system according to claim 10, wherein the preset object includes at least one of a screen, an object displayed on the screen, an application, and a document.
12. The smart terminal collaborative encryption system according to claim 10, wherein the key includes at least one of a fingerprint key and a numeric keypad key.
CN201610352593.7A 2016-05-24 2016-05-24 Intelligent terminal encryption method and system Active CN106067875B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610352593.7A CN106067875B (en) 2016-05-24 2016-05-24 Intelligent terminal encryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610352593.7A CN106067875B (en) 2016-05-24 2016-05-24 Intelligent terminal encryption method and system

Publications (2)

Publication Number Publication Date
CN106067875A CN106067875A (en) 2016-11-02
CN106067875B true CN106067875B (en) 2020-04-17

Family

ID=57420199

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610352593.7A Active CN106067875B (en) 2016-05-24 2016-05-24 Intelligent terminal encryption method and system

Country Status (1)

Country Link
CN (1) CN106067875B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106817377A (en) * 2017-03-27 2017-06-09 努比亚技术有限公司 A kind of data encryption device, decryption device and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104426649A (en) * 2013-08-22 2015-03-18 中国电信股份有限公司 Automatic secret key synchronization method and system, and secret key management platform
CN104834868A (en) * 2015-04-28 2015-08-12 一铂有限公司 Electronic data protection method, device and terminal equipment
CN104850801A (en) * 2015-06-09 2015-08-19 广东欧珀移动通信有限公司 File encryption method and file encryption device
CN106888183A (en) * 2015-12-15 2017-06-23 阿里巴巴集团控股有限公司 Data encryption, decryption, the method and apparatus and system of key request treatment

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101547696B1 (en) * 2007-11-30 2015-08-26 삼성전자주식회사 Method and system for secure communication in near field communication network
JP5241818B2 (en) * 2008-02-29 2013-07-17 三菱電機株式会社 Terminal
CN101997678A (en) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 Password acquisition method and terminal
CN102930188A (en) * 2012-10-12 2013-02-13 中兴通讯股份有限公司南京分公司 Screen unlocking method and device as well as terminal
CN105022965B (en) * 2015-07-14 2019-09-06 Oppo广东移动通信有限公司 A kind of data ciphering method and device
CN105262756B (en) * 2015-10-28 2017-07-18 广东欧珀移动通信有限公司 The encryption and decryption approaches and encryption and decryption devices of data
CN105429949B (en) * 2015-10-28 2017-11-28 广东欧珀移动通信有限公司 The method for pushing and supplying system of password

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104426649A (en) * 2013-08-22 2015-03-18 中国电信股份有限公司 Automatic secret key synchronization method and system, and secret key management platform
CN104834868A (en) * 2015-04-28 2015-08-12 一铂有限公司 Electronic data protection method, device and terminal equipment
CN104850801A (en) * 2015-06-09 2015-08-19 广东欧珀移动通信有限公司 File encryption method and file encryption device
CN106888183A (en) * 2015-12-15 2017-06-23 阿里巴巴集团控股有限公司 Data encryption, decryption, the method and apparatus and system of key request treatment

Also Published As

Publication number Publication date
CN106067875A (en) 2016-11-02

Similar Documents

Publication Publication Date Title
US10972908B2 (en) Wireless network connection method, apparatus, and system
CN113364760A (en) Data encryption processing method and device, computer equipment and storage medium
CN111565107B (en) Key processing method and device based on cloud service platform and computer equipment
CN110311787B (en) Authorization management method, system, device and computer readable storage medium
CN110166423B (en) User credit determination method, device and system and data processing method
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN105577379A (en) Information processing method and apparatus thereof
CN104507080A (en) File processing method and terminal
CN204360381U (en) mobile device
CN104243149A (en) Encrypting and decrypting method, device and server
CN111178884A (en) Information processing method, device, equipment and readable storage medium
CN107528690A (en) A kind of symmetrical encryption and decryption method and systems of SM4 for accelerating platform based on isomery
CN104424409A (en) Application unlocking method and device
CN104573548A (en) Information encryption and decryption methods and devices and terminal
CN112070516A (en) Product tracing method and device and block chain system
CN104994095A (en) Equipment authentication method, clients, server and system
CN104144174B (en) Protect method, user equipment and the server of privacy of user data
CN114417309A (en) Bidirectional identity authentication method, device, equipment and storage medium
CN105743860A (en) Method and device for converting characters
CN105022965A (en) Data encryption method and apparatus
CN106067875B (en) Intelligent terminal encryption method and system
CN103685239A (en) Real-time encryption and decryption system and real-time encryption and decryption method for mobile products
CN111818466A (en) Information sending and receiving method and device, electronic equipment and readable storage medium
CN115208630B (en) Block chain-based data acquisition method and system and block chain system
CN114866317B (en) Multi-party data security calculation method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant