CN106295379A - Encrypt input method and device, deciphering input method and device and relevant device - Google Patents
Encrypt input method and device, deciphering input method and device and relevant device Download PDFInfo
- Publication number
- CN106295379A CN106295379A CN201610772590.9A CN201610772590A CN106295379A CN 106295379 A CN106295379 A CN 106295379A CN 201610772590 A CN201610772590 A CN 201610772590A CN 106295379 A CN106295379 A CN 106295379A
- Authority
- CN
- China
- Prior art keywords
- urtext
- ciphertext
- server
- character
- sent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention provides a kind of and encrypts input method, corresponding device and mobile terminal, corresponding server, and terminal obtains encrypted instruction, according to encrypted instruction, the urtext of output is sent to server;Terminal receives the ciphertext of server feedback, and ciphertext is associated with urtext;Urtext is replaced to ciphertext by terminal.The urtext of terminal output can be encrypted by server, and finally replaces to ciphertext, and what information was transmitted during transmission (such as instant messaging etc.) is ciphertext, from without revealing urtext, improves the safety of information;Owing to server stores the urtext being associated with ciphertext, thus the recipient of information can get, by server, the urtext being associated with ciphertext.Additionally provide and a kind of decipher input method, corresponding device and mobile terminal, corresponding server.
Description
Technical field
The present invention relates to input method technique field, specifically, the present invention relates to a kind of encryption input method and device and phase
The mobile terminal answered, a kind of decipher input method and device and corresponding mobile terminal, a kind of ciphertext for input method output
The server of deciphering, the server of a kind of urtext encryption for input method output.
Background technology
Input method refers to the coded method for various symbols input computer or other equipment (such as mobile phone) being used, example
Such as GB2312 coding, GBK coding, BIG5 coding, Unicode coding, UTF-8 coding etc., Input Method Editor (Input
Method Editor, IME) it is the software realizing word input, also having person is input method software, input method platform, input method
Framework or input method system.
Owing to the coding of input method is wide variety of, in message transmitting procedure, if information is intercepted, obtain correspondence
Coding after, information just can be decrypted and reveal.Such as, when using instant chat software to chat, chat messages exists
If transmitting procedure is intercepted, then can cause the leakage of chat messages.Therefore, traditional input method safety has much room for improvement.
Summary of the invention
The purpose of the present invention is intended at least solve the highest technology of one of above-mentioned technological deficiency, particularly safety and lacks
Fall into.
First aspect, provides one encryption input method, comprises the steps: in the embodiment of the present invention
Obtain encrypted instruction, according to encrypted instruction, the urtext of output is sent to server;
Receiving the ciphertext of server feedback, ciphertext is associated with urtext;
Urtext is replaced to ciphertext.
In a possible design, ciphertext includes:
The character code corresponding to text message that is different with urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to text message;Non-coding character is as hiding mark
Know, it is impossible to be encoded recognition rule identification.
In a possible design, text message is from the text database of setting in server.
In a possible design, text message is to determine at random from the text database set.
In a possible design, text database includes at least one in poem, proverb, Chinese idiom, popular word.
In a possible design, each word, phrase or the character in text message is divided by the mapping ruler set
Word, phrase or the character of order the most corresponding with urtext map mutually.
In a possible design, the mapping ruler of setting includes: languages or part of speech are same or like.
In a possible design, multiple non-coding characters with the form of scattered form or entirety according to the row set
Cloth regular array before the character code corresponding to text message, between or afterwards.
In a possible design, non-coding character is from the character database of setting in server.
In a possible design, non-coding character is to determine at random from the character database set.
Second aspect, provides one deciphering input method, comprises the steps: in the embodiment of the present invention
Ciphertext is obtained from third party application;
Receiving and deciphering instructs, and according to decryption instructions, ciphertext is sent to server;
Receive the urtext of server feedback, export urtext;Urtext is associated with ciphertext.
In a possible design, ciphertext includes:
The character code corresponding to text message that is different with urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to text message;Non-coding character is as hiding mark
Know, it is impossible to be encoded recognition rule identification.
In a possible design, text message is from the text database of setting in server.
In a possible design, text message is to determine at random from the text database set.
In a possible design, text database includes at least one in poem, proverb, Chinese idiom, popular word.
In a possible design, each word, phrase or the character in text message is divided by the mapping ruler set
Word, phrase or the character of order the most corresponding with urtext map mutually.
In a possible design, the mapping ruler of setting includes: languages or part of speech are same or like.
In a possible design, multiple non-coding characters with the form of scattered form or entirety according to the row set
Cloth regular array before the character code corresponding to text message, between or afterwards.
In a possible design, non-coding character is from the character database of setting in server.
In a possible design, non-coding character is to determine at random from the character database set.
The third aspect, the side of the urtext encryption providing a kind of server to be input method output in the embodiment of the present invention
Method, comprises the steps:
Receive the urtext sent by terminal;
The ciphertext being associated with urtext is determined according to urtext;
Ciphertext is sent to terminal.
In a possible design, determine that the ciphertext being associated with urtext includes according to urtext as follows
Step:
Determine the character code corresponding to text message that is different with urtext and that associate, and determine multiple non-encoded word
Symbol;Multiple non-coding characters are as hiding mark, it is impossible to be encoded recognition rule identification;
Set up the character code corresponding to text message, hide contacting, by text message between mark and urtext
Corresponding character code and hiding mark composition ciphertext.
Fourth aspect, the side of the ciphertext deciphering providing a kind of server to be input method output in the embodiment of the present invention
Method, comprises the steps:
Receive the ciphertext sent by terminal;
The urtext being associated with ciphertext is determined according to ciphertext;
Urtext is sent to terminal.
In a possible design, determine that the urtext being associated with ciphertext includes according to ciphertext as follows
Step:
It is decoded ciphertext obtaining the character code corresponding to text message and multiple non-coding character;Multiple non-
Code character is as hiding mark, it is impossible to be encoded recognition rule identification;
Determine the urtext homogeneously associated with the character code corresponding to text message, hiding mark.
5th aspect, provides one encryption input equipment in the embodiment of the present invention, including:
First encrypting module, is used for obtaining encrypted instruction, is sent to service by the urtext of output according to encrypted instruction
Device;
First receiver module, for receiving the ciphertext of server feedback, ciphertext is associated with urtext;
First replacement module, for replacing to ciphertext by urtext.
In a possible design, ciphertext includes:
The character code corresponding to text message that is different with urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to text message;Non-coding character is as hiding mark
Know, it is impossible to be encoded recognition rule identification.
In a possible design, text message is from the text database of setting in server.
In a possible design, text message is to determine at random from the text database set.
In a possible design, text database includes at least one in poem, proverb, Chinese idiom, popular word.
In a possible design, each word, phrase or the character in text message is divided by the mapping ruler set
Word, phrase or the character of order the most corresponding with urtext map mutually.
In a possible design, the mapping ruler of setting includes: languages or part of speech are same or like.
In a possible design, multiple non-coding characters with the form of scattered form or entirety according to the row set
Cloth regular array before the character code corresponding to text message, between or afterwards.
In a possible design, non-coding character is from the character database of setting in server.
In a possible design, non-coding character is to determine at random from the character database set.
6th aspect, provides one deciphering input equipment in the embodiment of the present invention, including:
First acquisition module, for obtaining ciphertext from third party application;
First deciphering module, instructs for receiving and deciphering, according to decryption instructions, ciphertext is sent to server;
First receiver module, for receiving the urtext of server feedback, exports urtext;Urtext and encryption
Text is associated.
In a possible design, ciphertext includes:
The character code corresponding to text message that is different with urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to text message;Non-coding character is as hiding mark
Know, it is impossible to be encoded recognition rule identification.
In a possible design, text message is from the text database of setting in server.
In a possible design, text message is to determine at random from the text database set.
In a possible design, text database includes at least one in poem, proverb, Chinese idiom, popular word.
In a possible design, each word, phrase or the character in text message is divided by the mapping ruler set
Word, phrase or the character of order the most corresponding with urtext map mutually.
In a possible design, the mapping ruler of setting includes: languages or part of speech are same or like.
In a possible design, multiple non-coding characters with the form of scattered form or entirety according to the row set
Cloth regular array before the character code corresponding to text message, between or afterwards.
In a possible design, non-coding character is from the character database of setting in server.
In a possible design, non-coding character is to determine at random from the character database set.
7th aspect, provides the server of a kind of urtext encryption for input method output, bag in the embodiment of the present invention
Include:
Second receiver module, for receiving the urtext sent by terminal;
Second encrypting module, for determining, according to urtext, the ciphertext being associated with urtext;
Second sending module, for being sent to terminal by ciphertext.
In a possible design, the second encrypting module is used for:
Determine the character code corresponding to text message that is different with urtext and that associate, and determine multiple non-encoded word
Symbol;Multiple non-coding characters are as hiding mark, it is impossible to be encoded recognition rule identification;
Set up the character code corresponding to text message, hide contacting, by text message between mark and urtext
Corresponding character code and hiding mark composition ciphertext.
Eighth aspect, provides the server of a kind of ciphertext deciphering for input method output, bag in the embodiment of the present invention
Include:
Second receiver module, for receiving the ciphertext sent by terminal;
Second deciphering module, for determining, according to ciphertext, the urtext being associated with ciphertext;
Second sending module, for being sent to terminal by urtext.
In a possible design, the second deciphering module is used for:
It is decoded ciphertext obtaining the character code corresponding to text message and multiple non-coding character;Multiple non-
Code character is as hiding mark, it is impossible to be encoded recognition rule identification;
Determine the urtext homogeneously associated with the character code corresponding to text message, hiding mark.
9th aspect, provides a kind of mobile terminal in the embodiment of the present invention, comprising:
Touch-sensitive display;
One or more processors;
Memorizer;
One or more application programs, wherein one or more application programs be stored in memorizer and be configured to by
One or more processors perform, and one or more programs are configured to:
Obtain encrypted instruction, according to encrypted instruction, the urtext of output is sent to server;
Receiving the ciphertext of server feedback, ciphertext is associated with urtext;
Urtext is replaced to ciphertext.
In a possible design, ciphertext includes:
The character code corresponding to text message that is different with urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to text message;Non-coding character is as hiding mark
Know, it is impossible to be encoded recognition rule identification.
In a possible design, text message is from the text database of setting in server.
In a possible design, text message is to determine at random from the text database set.
In a possible design, text database includes at least one in poem, proverb, Chinese idiom, popular word.
In a possible design, each word, phrase or the character in text message is divided by the mapping ruler set
Word, phrase or the character of order the most corresponding with urtext map mutually.
In a possible design, the mapping ruler of setting includes: languages or part of speech are same or like.
In a possible design, multiple non-coding characters with the form of scattered form or entirety according to the row set
Cloth regular array before the character code corresponding to text message, between or afterwards.
In a possible design, non-coding character is from the character database of setting in server.
In a possible design, non-coding character is to determine at random from the character database set.
Tenth aspect, provides a kind of mobile terminal in the embodiment of the present invention, comprising:
Touch-sensitive display;
One or more processors;
Memorizer;
One or more application programs, wherein one or more application programs be stored in memorizer and be configured to by
One or more processors perform, and one or more programs are configured to:
Ciphertext is obtained from third party application;
Receiving and deciphering instructs, and according to decryption instructions, ciphertext is sent to server;
Receive the urtext of server feedback, export urtext;Urtext is associated with ciphertext.
In a possible design, ciphertext includes:
The character code corresponding to text message that is different with urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to text message;Non-coding character is as hiding mark
Know, it is impossible to be encoded recognition rule identification.
In a possible design, text message is from the text database of setting in server.
In a possible design, text message is to determine at random from the text database set.
In a possible design, text database includes at least one in poem, proverb, Chinese idiom, popular word.
In a possible design, each word, phrase or the character in text message is divided by the mapping ruler set
Word, phrase or the character of order the most corresponding with urtext map mutually.
In a possible design, the mapping ruler of setting includes: languages or part of speech are same or like.
In a possible design, multiple non-coding characters with the form of scattered form or entirety according to the row set
Cloth regular array before the character code corresponding to text message, between or afterwards.
In a possible design, non-coding character is from the character database of setting in server.
In a possible design, non-coding character is to determine at random from the character database set.
Above-mentioned encryption input method, corresponding device and mobile terminal, corresponding server, terminal obtains encrypted instruction,
According to encrypted instruction, the urtext of output is sent to server;Terminal receives the ciphertext of server feedback, adds ciphertext
This is associated with urtext;Urtext is replaced to ciphertext by terminal.The urtext of terminal output can be by clothes
Business device is encrypted, and finally replaces to ciphertext, and what information was transmitted during transmission (such as instant messaging etc.) is to add
Ciphertext originally, from without revealing urtext, improves the safety of information;Owing to server stores relevant to ciphertext
The urtext of connection, thus the recipient of information can get, by server, the urtext being associated with ciphertext.
Above-mentioned deciphering input method, corresponding device and mobile terminal, corresponding server, from third party application
Obtain ciphertext;Receiving and deciphering instructs, and according to decryption instructions, ciphertext is sent to server;Receive server feedback
Urtext, exports urtext;Urtext is associated with ciphertext.Owing to server stores relevant to ciphertext
The urtext of connection, first information receiver receives ciphertext, may then pass through server and gets and ciphertext phase
The urtext of association, thus realize the communication for information of secret, safety is high.
Aspect and advantage that the present invention adds will part be given in the following description, and these will become from the following description
Obtain substantially, or recognized by the practice of the present invention.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, in embodiment being described below required for make
Accompanying drawing be briefly described, it should be apparent that, below describe in accompanying drawing be only some embodiments of the present invention, for
From the point of view of those skilled in the art, on the premise of not paying creative work, it is also possible to obtain the attached of other according to these accompanying drawings
Figure.
Fig. 1 is the encryption input method flow chart of an embodiment;
Fig. 2 be the server of an embodiment be input method output urtext encryption method flow diagram;
Fig. 3 is the encryption input equipment module map of an embodiment;
Fig. 4 is the server module figure of the urtext encryption for input method output of an embodiment;
Fig. 5 is the deciphering input method flow chart of an embodiment;
Fig. 6 be the server of an embodiment be input method output ciphertext deciphering method flow diagram;
Fig. 7 is the deciphering input equipment module map of an embodiment;
Fig. 8 is the server module figure of the ciphertext deciphering for input method output of an embodiment;
Fig. 9 is illustrated that the block diagram of the part-structure of the mobile phone relevant to the mobile terminal of embodiment of the present invention offer.
Detailed description of the invention
In order to make those skilled in the art be more fully understood that the present invention program, below in conjunction with in the embodiment of the present invention
Accompanying drawing, is clearly and completely described the technical scheme in the embodiment of the present invention.
In some flow processs of description in description and claims of this specification and above-mentioned accompanying drawing, contain according to
Particular order occur multiple operations, but it should be clearly understood that these operation can not according to its occur in this article suitable
Sequence performs or executed in parallel, the sequence number of operation such as 101,102 etc., is only used for distinguishing each different operation, sequence number
Itself does not represent any execution sequence.It addition, these flow processs can include more or less of operation, and these operations can
To perform in order or executed in parallel.It should be noted that " first ", " second " herein etc. describe, it is for distinguishing not
Message together, equipment, module etc., do not represent sequencing, and not limiting " first " and " second " is different types.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative used herein " ", "
Individual ", " described " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that use in the description of the present invention arranges
Diction " including " refers to there is described feature, integer, step, operation, element and/or assembly, but it is not excluded that existence or adds
Other features one or more, integer, step, operation, element, assembly and/or their group.It should be understood that when we claim unit
Part is " connected " or during " coupled " to another element, and it can be directly connected or coupled to other elements, or can also exist
Intermediary element.Additionally, " connection " used herein or " coupling " can include wireless connections or wireless couple.Used herein arrange
Diction "and/or" includes that one or more list the whole of item or any cell being associated combines with whole.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, and all terms used herein (include technology art
Language and scientific terminology), have with the those of ordinary skill in art of the present invention be commonly understood by identical meaning.Also should
Be understood by, those terms defined in such as general dictionary, it should be understood that have with in the context of prior art
The meaning that meaning is consistent, and unless by specific definitions as here, otherwise will not use idealization or the most formal implication
Explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal unit " had both included wireless communication
The equipment of number receptor, it only possesses the equipment of wireless signal receiver of non-emissive ability, includes again receiving and launching hardware
Equipment, its have can on bidirectional communication link, perform two-way communication reception and launch hardware equipment.This equipment
May include that honeycomb or other communication equipments, it has single line display or multi-line display or does not has multi-line to show
The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), it can
Process with combine voice, data, fax and/or its communication ability;PDA (Personal Digital Assistant, individual
Digital assistants), it can include the access of radio frequency receiver, pager, the Internet/intranet, web browser, notepad, day
Go through and/or GPS (Global Positioning System, global positioning system) receptor;Conventional laptop and/or palm
Type computer or other equipment, its have and/or include the conventional laptop of radio frequency receiver and/or palmtop computer or its
His equipment." terminal " used herein above, " terminal unit " can be portable, can transport, be arranged on the vehicles (aviation,
Sea-freight and/or land) in, or be suitable for and/or be configured at local runtime, and/or with distribution form, operate in the earth
And/or any other position operation in space." terminal " used herein above, " terminal unit " can also is that communication terminal, on
Network termination, music/video playback terminal, such as, can be PDA, MID (Mobile Internet Device, mobile Internet
Equipment) and/or there is the mobile phone of music/video playing function, it is also possible to it is the equipment such as intelligent television, Set Top Box.
Those skilled in the art of the present technique are appreciated that remote network devices used herein above, and it includes but not limited to meter
The cloud that calculation machine, network host, single network server, multiple webserver collection or multiple server are constituted.Here, Yun Youji
A large amount of computers or the webserver in cloud computing (Cloud Computing) are constituted, and wherein, cloud computing is Distributed Calculation
One, the super virtual machine being made up of a group loosely-coupled computer collection.In embodiments of the invention, far-end
Can realize communicating by any communication mode between the network equipment, terminal unit with WNS server, include but not limited to, based on
The mobile communication of 3GPP, LTE, WIMAX, based on TCP/IP, the computer network communication of udp protocol and based on bluetooth, infrared
The low coverage wireless transmission method of transmission standard.
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on
Embodiment in the present invention, the every other enforcement that those skilled in the art are obtained under not making creative work premise
Example, broadly falls into the scope of protection of the invention.
Encryption input method which will be described and deciphering input method can apply in Input Method Editor, and it is corresponding
Device, mobile terminal can apply in all input terminals, such as computer, panel computer, mobile phone etc. intelligent terminal.
Fig. 1 is the encryption input method flow chart of an embodiment.
The embodiment of the present invention provides one encryption input method, comprises the steps:
Step S110: obtain encrypted instruction, according to encrypted instruction, the urtext of output is sent to server.
User, can be by being encrypted operation with to the urtext inputted when IME carries out input operation to IME
It is encrypted.Such as, IME provides " encryption " button, and user is encrypted by clicking on this button.
For IME, terminal system will provide corresponding Keyboard Message to IME, IME again to key according to KeyEvent
Dish message coding generates corresponding urtext and exports, and output here can be that output is to third party application
(such as instant communication software), it is also possible to be in IME, carry out display output.For Windows system and Android system,
That provide Keyboard Message is all input method manager (Input Method Manager, IMM).Described coding, can include
GB2312 coding, GBK coding, BIG5 coding, Unicode coding, UTF-8 coding etc. character encoding forms.
After IME obtains encrypted instruction, sent by remote communication interface according to the urtext that encrypted instruction outputs it
To server.Such as it is connected with the Internet by wap protocol, and is sent to be in the server of networking state.
Fig. 2 be the server of an embodiment be input method output urtext encryption method flow diagram.Original literary composition
Originally after being sent to server, urtext is encrypted by server, and below describing a kind of server is input method output
The method of urtext encryption, it comprises the steps S210~step S230:
Step S210: receive the urtext sent by terminal.
Step S220: determine the ciphertext being associated with urtext according to urtext.
The encryption character of ciphertext is for urtext, and it can be only different with urtext
Text message, it is also possible to be the text message being accompanied with and hiding mark.Such as, if urtext is " today is on night duty ", and
Ciphertext is " bright moon light before bed " this text message, then, for information acquisition person, information acquisition person only obtains
" bright moon light before bed " this text message, in this case it is not apparent that the urtext " today is on night duty " of its correspondence.
But, for server, although the urtext that server receives is diversified, but it is not excluded that
The situation that multiple urtext are all the same.Such as utilizing in instant communication software chat process, numerous users may can send out
Go out identical chat messages, such as " today is on night duty " such chat messages, then server receives a plurality of " today is on night duty "
Such urtext, the most corresponding a plurality of ciphertext, it is probably equally between these ciphertexts, it is also possible to no
The same, server easily may cause confusion when user is decrypted.
In order to avoid unnecessary trouble, server needs to be identified ciphertext being identified with convenient service device
And differentiation.Therefore, ciphertext includes text message that is different with urtext and that associate and hides mark.So-called different, i.e.
Urtext and text message are different on content of text.If above-mentioned text message and hidden from the perspective of coding
Hide mark, then ciphertext includes: and character code text message corresponding to that associate different with urtext;And it is attached to literary composition
Multiple non-coding characters on character code corresponding to this information;Non-coding character is as hiding mark, it is impossible to be encoded knowing
Not rule identifies, namely non-coding character can be understood as not possessing the character encoding specific format in fact, thus can not be had
Effect identifies.
By Unicode encode as a example by, if urtext be " today is on night duty ", correspondence Unicode be encoded to "
20170;天;值;夜;班;”.“今;”“天;”“值;”“&#
22812;”“班;" it is the coding of the specific format of 5 Chinese text in " today is on night duty " respectively.And in ciphertext
And the text message that associate different with urtext be " bright moon light before bed ", Unicode corresponding to text information is encoded to
“床;前;明;月;光;”.Visible, urtext and the text envelope in ciphertext
Breath is different on content of text, thereby increases and it is possible to be the most different, i.e. 5 words in text are the most different.
In order to realize that ciphertext is identified and distinguished between, need to enclose on the coding of text message and hide mark.By
There is its specific form in coding, thus the character that major part does not meets form will not be identified and show.Continue above-mentioned
Example, encloses on the coding of text information after hiding mark, becomes “ 床;19491001前;&#
26126;月;光;", wherein, it is clipped in “ 床;" and “ 前;" the two coding between character
" 19491001 " are exactly to hide mark.Certainly, hiding mark can be numeral, letter, symbol etc. character.
Above-mentioned hiding mark is to be arranged between character code with overall form.It practice, multiple non-encoded word
The therefore mark that symbol is constituted can be arranged in text message with the form of scattered form or entirety according to the arranging rule set
Before corresponding character code, between or afterwards.Continue above-mentioned example, if hiding mark is scattered form, then at this
Enclose on the coding of text message after hiding mark, become “ 床;1949前;1001明;&#
26376;光;", wherein, it is clipped in “ 床;" and “ 前;" the two coding between character " 1949 ", with
And it is clipped in “ 前;" and “ 明;" the two coding between character " 1001 ", together constitute hide mark
" 19491001 ", it is scattered being arranged between character code.Certainly, hiding mark can also is that and is arranged in text message
Before or after corresponding character code, do not repeat them here.
Certainly, it is not excluded that also can enclose other interference character on the coding of text information.Such as hide mark
For " 19491001 ", interference character be " abcdefgh ", disturb character can also with the form of scattered form or entirety according to
Set arranging rule be arranged in the character code corresponding to text message before, between or afterwards.The volume of such as ciphertext
Code can become: “ 床;19491001前;abcdefgh明;月;光;", or “ &#
24202;1a9b4c9d1e0f0g1h前;明;月;光;", interference character identifies phase with hiding
Interfix disorderly, can only know during the character string in face code " 1a9b4c9d1e0f0g1h " in subsequent decryption procedure identification by server
The other character with extraction odd bits, thus obtain hiding mark 19491001.The arrangement form of interference character can be varied,
As long as subsequent server can identify according to the rule set hides mark and interference character, it is not repeated herein.
Therefore, ciphertext includes the character code corresponding to text message that is different with urtext and that associate, and
The multiple non-coding characters being attached on the character code corresponding to text message.Non-coding character is as hiding mark, it is impossible to quilt
Code identification rule identification, namely non-coding character can be understood as not possessing the character of coding specific format in fact, thus not
Can be effectively recognized.
After server obtains urtext, need to determine for this urtext or the text message of Choice encryption text, make
Must be associated, there are mapping relations.For example, it is possible to set a text data
Storehouse, includes substantial amounts of text message, such as poem, proverb, Chinese idiom, popular word etc. in text data base.Then service
Device can select text message therein as the text message of ciphertext in the text database of this setting.
When server is the text message that urtext determines ciphertext, can determine at random, it is also possible to be logical
Cross what the mapping ruler set determined.After determining, it is equivalent to establish the text envelope of urtext and ciphertext
Association between breath, server will store the incidence relation between them.
When determining at random, if such as urtext is " today is on night duty, stays out and has a meal ";And text database has
Substantial amounts of poem, which includes " bright moon light before bed " and " flower falls to knowing how many ";At the text message determining ciphertext at random
Time, " bright moon light before bed " text message as ciphertext may be have selected at random.Certainly, owing to " today is on night duty, does not returns
Family has a meal " include two subordinate sentences, every subordinate sentence can also a corresponding text message, determine " bright moon before bed the most at random
Light, flower falls to knowing how many " as the text message of ciphertext, wherein " bright moon light before bed " correspondence " today is on night duty ", " Hua Luozhi
How much " correspondence " is stayed out and is had a meal ".If i.e. have more than one subordinate sentence in urtext, each subordinate sentence can correspond to
Article one, respective ciphertext.
When being determined by the mapping ruler set, each word, phrase or the character in text message is by reflecting of setting
Word, phrase or the character of penetrating rule order corresponding with urtext respectively map mutually.The most in certain embodiments, setting
Mapping ruler includes: languages or part of speech are same or like.If such as urtext is " today is on night duty, stays out and has a meal ";
And text database has substantial amounts of vocabulary, and such as verb, noun, adjective etc., which includes " last night " " flying " " white
Cloud " " climbing the mountain " " sleep " etc. vocabulary;When determining the text message of ciphertext at random, may have selected that " last night flies at random
White clouds, sleep of not climbing the mountain " as the text message of ciphertext.Visible, " last night " " flying " " white clouds " " climbing the mountain " " sleep " difference
Corresponding " today " " value " " night shift " " going home " " having a meal ", languages are all Chinese, and part of speech is the most same or similar.
Server, specifically can be by following when determining, according to urtext, the ciphertext being associated with urtext
Step 1~step 2 realize:
Step 1: determine the character code corresponding to text message that is different with urtext and that associate, and determine multiple non-
Code character;Multiple non-coding characters are as hiding mark, it is impossible to be encoded recognition rule identification.Server determining at random or
When being determined the text message of ciphertext by the mapping ruler set, just establish between urtext and text information
Contact.Rather than code character, can pass through the character database set in the server determines, determine the most at random.?
In this character database, include such as the character such as numeral, letter, symbol.If input method coding is Unicode coding, for
Avoid the character string that stochastic generation is consistent with coded format, character database can not include " & " and/or " # ".
Step 2: set up the character code corresponding to text message, hide contacting, by literary composition between mark and urtext
Character code corresponding to this information and hiding mark composition ciphertext.Such as urtext is " today is on night duty ", encryption
Text message in text is " bright moon light before bed ", and hiding in ciphertext is designated " 19491001 ", then ciphertext pair
The Unicode answered is encoded to “ 床;19491001前;明;月;光;”.
Step S230: ciphertext is sent to terminal.After server determines ciphertext, will by remote communication interface
Ciphertext is sent to above-mentioned terminal.
So far, server is that the method for the urtext encryption of input method output is described, and then continues to describe above-mentioned
Encryption input method.After step S110, perform step S120.
Step S120: receive the ciphertext of server feedback.Ciphertext is associated with urtext.Ciphertext with
Association between urtext is carried out by server side, server side just store ciphertext and urtext it
Between incidence relation, strengthen terminal information security.
Step S130: urtext is replaced to ciphertext.Input Method Editor is by straight for the urtext in input frame
Taking over and change ciphertext into, from the user point of view, the text message of the encrypted text of urtext substituted for, such as by original
Text " today is on night duty " replaces to text message " bright moon light before bed ";And with from the point of view of machine angle, the text envelope of ciphertext
The coding of breath, with hiding mark, will encode “ 今;天;值;夜;班;" replace
Change coding “ 床 into;19491001前;明;月;光;”.Then, receiving user's
After transmission instruction, ciphertext is transmitted.Such as in instant communication process, user clicks on " transmission " button will add ciphertext
This is sent by instant communication software.
Above-mentioned encryption input method, an object lesson is: user selects to have exported in instant communication software input frame
Chat messages and click on " encryption " button, chat messages is encrypted by server, and returns the ciphertext after encryption, defeated
Enter method editing machine ciphertext replaces above-mentioned chat messages and shows in the input frame of instant communication software.
So far, encryption input method is described.
Fig. 3 is the encryption input equipment module map of an embodiment.Corresponding above-mentioned encryption input method, below describes one
Encryption input equipment, comprising: the first encrypting module the 110, first receiver module 120 and the first replacement module 130.First encryption
Module 110 is used for obtaining encrypted instruction, according to encrypted instruction, the urtext of output is sent to server;First receiver module
120 for receiving the ciphertext of server feedback, and ciphertext is associated with urtext;First replacement module 130 is used for
Urtext is replaced to ciphertext.This encryption input equipment correspond to above-mentioned encryption input method, intermodule worked
Journey is referred to above-mentioned encryption input method, does not repeats them here.
Fig. 4 is the server module figure of the urtext encryption for input method output of an embodiment.Corresponding above-mentioned
Server is the method for the urtext encryption of input method output, below describes a kind of urtext encryption for input method output
Server, comprising: second receiver module the 210, second encrypting module the 220, second sending module 230.Second receiver module
210 for receiving the urtext sent by terminal;Second encrypting module 220 is for determining and urtext according to urtext
The ciphertext being associated;Second sending module 230 is for being sent to terminal by ciphertext.In certain embodiments, second
Encrypting module 220 is used for: determines the character code corresponding to text message that is different with urtext and that associate, and determines multiple
Non-coding character;Multiple non-coding characters are as hiding mark, it is impossible to be encoded recognition rule identification;Set up text message institute right
The character code answered, hide contacting between mark and urtext, by the character code corresponding to text message with hide mark
Know composition ciphertext.This server correspond to the method for the urtext encryption that above-mentioned server is input method output, mould
Work process between block is referred to the method for the urtext encryption that above-mentioned server is input method output, the most superfluous at this
State.
Fig. 5 is the deciphering input method flow chart of an embodiment.Corresponding above-mentioned encryption input method, describes one below and solves
Close input method, for being decrypted ciphertext described above.A kind of deciphering input method, comprises the steps:
Step S310: obtain ciphertext from third party application.Third party application can be instant messaging
Software, such as wechat, QQ etc..User can be by replicating the acquisition of information ciphertext in third party application, such as
Copying chat message from wechat, QQ and obtain ciphertext, these chat messages both can be this terminal send chat
It message, it is also possible to be the chat messages of this terminal reception.
Step S320: receiving and deciphering instructs, and according to decryption instructions, ciphertext is sent to server.User gets and adds
Ciphertext is after this, operation to be decrypted, such as, click on " deciphering " button so that terminal generation decryption instructions, then terminal according to
The ciphertext got is sent to server by decryption instructions, allows server be decrypted.
Fig. 6 be the server of an embodiment be input method output ciphertext deciphering method flow diagram, below retouch
The method stating the ciphertext deciphering that a kind of server is input method output, it comprises the steps S410~step S430:
Step S410: receive the ciphertext sent by terminal.
Step S420: determine the urtext being associated with ciphertext according to ciphertext.Encrypt defeated from the description above
Understanding during entering method, server storage has the incidence relation before ciphertext and urtext, therefore can be according to adding
Ciphertext originally determines corresponding urtext.
Server, when determining, according to ciphertext, the urtext being associated with ciphertext, specifically can include as follows
Step S1~step S2 realize:
Step S1: be decoded ciphertext obtaining the character code corresponding to text message and multiple non-encoded word
Symbol.Plurality of non-coding character is as hiding mark, it is impossible to be encoded recognition rule identification, is not to say that and can not be identified,
Server can be identified according to decipherment algorithm.Here text message is exactly the text message in ciphertext, namely clothes
Business device needs the character code of isolated text message, hiding mark from ciphertext.
With Unicode above coding example go on to say, the Unicode that ciphertext is corresponding be encoded to ";
19491001前;明;月;光;", the text message of ciphertext is " bright moon light before bed ", adds
Hiding in this of ciphertext is designated " 19491001 ".Owing to coding has its specific form, thus server can identify this
The coding of form;And hide mark arranging rule server encryption when and know, therefore can also recognize.When
So, even if ciphertext is accompanied by interference character described above, owing to the arranging rule server of interference character is also known
Road, naturally it is also possible to recognize these interference characters.
Step S2: determine the urtext homogeneously associated with the character code corresponding to text message, hiding mark.Example
As, the incidence relation stored by server, obtain urtext " today is on night duty " and coding “ 今 thereof;&#
22825;值;夜;班;”.
Step S430: urtext is sent to terminal.After server gets urtext, deciphering obtained is original
Text is sent to above-mentioned terminal by remote communication interface.
So far, server is that the method for the ciphertext deciphering of input method output is described, and then continues to describe above-mentioned
Deciphering input method.After step S320, perform step S330.
Step S330: receive the urtext of server feedback, exports urtext.Urtext is relevant to ciphertext
Connection.Associating between urtext with ciphertext is carried out by server side, and server side just stores original literary composition
Incidence relation between this and ciphertext, strengthens the information security of terminal.During output urtext, can be in input method
The input frame of editing machine or the input frame of third party software export.
Above-mentioned deciphering input method, an object lesson is: user replicates the chat messages of instant communication software and clicks on " solution
Close " button, chat messages is decrypted by server, and returns the urtext after deciphering, and Input Method Editor is by original literary composition
This display is in the input frame of instant communication software.
So far, deciphering input method is described.
Fig. 7 is the deciphering input equipment module map of an embodiment.Corresponding above-mentioned deciphering input method, below describes one
Deciphering input equipment, comprising: the first acquisition module the 310, first deciphering module 320 and the first receiver module 330.
First acquisition module 310 is for obtaining ciphertext from third party application;First deciphering module 320 is used for
Receiving and deciphering instructs, and according to decryption instructions, ciphertext is sent to server;First receiver module 330 is used for receiving server
The urtext of feedback, exports urtext;Urtext is associated with ciphertext.This deciphering input equipment correspond to above-mentioned
Encryption input method, the work process of intermodule is referred to above-mentioned deciphering input method, does not repeats them here.
Fig. 8 is the server module figure of the ciphertext deciphering for input method output of an embodiment.Corresponding above-mentioned
Server is the method for the ciphertext deciphering of input method output, below describes a kind of urtext encryption for input method output
Server, comprising: the second receiver module the 410, second encrypting module 420 and the second sending module 430.
Second receiver module 410 is for receiving the urtext sent by terminal;Second encrypting module 420 is for according to former
Beginning text determines the ciphertext being associated with urtext;Second sending module 430 is for being sent to terminal by ciphertext.
In certain embodiments, the second encrypting module 420 is used for: determine corresponding to text message that is different with urtext and that associate
Character code, and determine multiple non-coding character;Multiple non-coding characters are as hiding mark, it is impossible to be encoded recognition rule and know
Not;Set up the character code corresponding to text message, hide contacting, corresponding to text message between mark and urtext
Character code and hide mark composition ciphertext.This server correspond to above-mentioned server be input method output add ciphertext
The method of this deciphering, the work process of intermodule is referred to the method for the ciphertext deciphering of above-mentioned input method output,
This repeats no more.
The embodiment of the present invention additionally provides mobile terminal, as it is shown in figure 9, for convenience of description, illustrate only and the present invention
The part that embodiment is relevant, concrete ins and outs do not disclose, and refer to embodiment of the present invention method part.This mobile terminal can
Think and include mobile phone, panel computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point
Of Sales, point-of-sale terminal), the arbitrarily terminal unit such as vehicle-mounted computer, as a example by mobile terminal is as mobile phone:
Fig. 9 is illustrated that the block diagram of the part-structure of the mobile phone relevant to the mobile terminal of embodiment of the present invention offer.Ginseng
Examining Fig. 9, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 1510, memorizer 1520, input block 1530, display
Unit 1540, sensor 1550, voicefrequency circuit 1560, Wireless Fidelity (wireless-fidelity, Wi-Fi) module 1570, place
The reason parts such as device 1580 and power supply 1590.It will be understood by those skilled in the art that the not structure of the handset structure shown in Fig. 9
The restriction of mobile phone in pairs, can include that ratio illustrates more or less of parts, or combine some parts, or different parts
Arrange.
Below in conjunction with Fig. 9 each component parts of mobile phone carried out concrete introduction:
RF circuit 1510 can be used for receiving and sending messages or in communication process, the reception of signal and transmission, especially, by base station
After downlink information receives, process to processor 1580;It addition, be sent to base station by designing up data.Generally, RF circuit
1510 include but not limited to antenna, at least one amplifier, transceiver, bonder, low-noise amplifier (Low Noise
Amplifier, LNA), duplexer etc..Additionally, RF circuit 1510 can also be led to network and other equipment by radio communication
Letter.Above-mentioned radio communication can use arbitrary communication standard or agreement, includes but not limited to global system for mobile communications (Global
System of Mobile communication, GSM), general packet radio service (General Packet Radio
Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA
(Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution,
LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memorizer 1520 can be used for storing software program and module, and processor 1580 is stored in memorizer by operation
The software program of 1520 and module, thus perform the application of various functions and the data process of mobile phone.Memorizer 1520 can be led
Including storage program area and storage data field, wherein, needed for storage program area can store operating system, at least one function
Application program (such as sound-playing function, image player function etc.) etc.;Storage data field can store the use institute according to mobile phone
The data (such as voice data, phone directory etc.) etc. created.Additionally, memorizer 1520 can include that high random access stores
Device, it is also possible to include nonvolatile memory, for example, at least one disk memory, flush memory device or other volatibility are solid
State memory device.
Input block 1530 can be used for receiving numeral or the character information of input, and produce with the user setup of mobile phone with
And function controls relevant key signals input.Specifically, input block 1530 can include contact panel 1531 and other inputs
Equipment 1532.Contact panel 1531, also referred to as touch screen, can collect user thereon or neighbouring touch operation (such as user
Use any applicable object such as finger, stylus or adnexa behaviour on contact panel 1531 or near contact panel 1531
Make), and drive corresponding attachment means according to formula set in advance.Optionally, contact panel 1531 can include touching detection
Device and two parts of touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
It is converted into contact coordinate, then gives processor 1580, and order that processor 1580 sends can be received and performed.Additionally,
The polytypes such as resistance-type, condenser type, infrared ray and surface acoustic wave can be used to realize contact panel 1531.Except touch surface
Plate 1531, input block 1530 can also include other input equipments 1532.Specifically, other input equipments 1532 can include
But it is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
One or more.
Display unit 1540 can be used for each of the information that inputted by user of display or the information being supplied to user and mobile phone
Plant menu.Display unit 1540 can include display floater 1541, optionally, can use liquid crystal display (Liquid
Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED)
Configure display floater 1541.Further, contact panel 1531 can cover display floater 1541, when contact panel 1531 detects
Arrive thereon or after neighbouring touch operation, send processor 1580 to determine the type of touch event, with preprocessor
1580 provide corresponding visual output according to the type of touch event on display floater 1541.Although in fig .9, contact panel
1531 with display floater 1541 be to realize input and the input function of mobile phone as two independent parts, but some reality
Execute in example, can be by integrated to contact panel 1531 and display floater 1541 and realize input and the output function of mobile phone.
Mobile phone may also include at least one sensor 1550, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor can include ambient light sensor and proximity transducer, and wherein, ambient light sensor can be according to ambient light
Light and shade regulate the brightness of display floater 1541, proximity transducer can cut out display floater when mobile phone moves in one's ear
1541 and/or backlight.As the one of motion sensor, accelerometer sensor can detect (generally three axles) in all directions and add
The size of speed, can detect that size and the direction of gravity time static, can be used for identifying application (the such as horizontal/vertical screen of mobile phone attitude
Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;As for mobile phone also
Other sensors such as configurable gyroscope, barometer, drimeter, thermometer, infrared ray sensor, do not repeat them here.
Voicefrequency circuit 1560, speaker 1561, microphone 1562 can provide the audio interface between user and mobile phone.Audio frequency
The signal of telecommunication after the voice data conversion that circuit 1560 can will receive, is transferred to speaker 1561, speaker 1561 changes
Export for acoustical signal;On the other hand, the acoustical signal of collection is converted to the signal of telecommunication by microphone 1562, by voicefrequency circuit 1560
Voice data is converted to after reception, then after voice data output processor 1580 is processed, through RF circuit 1510 to be sent to ratio
Such as another mobile phone, or voice data is exported to memorizer 1520 to process further.
Wi-Fi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics by Wi-Fi module 1570
Mail, browsing webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 9 illustrates
Wi-Fi module 1570, but it is understood that, it is also not belonging to must be configured into of mobile phone, can exist as required completely
Omit in the scope of the essence not changing invention.
Processor 1580 is the control centre of mobile phone, utilizes various interface and the various piece of the whole mobile phone of connection,
It is stored in the software program in memorizer 1520 and/or module by running or performing, and calls and be stored in memorizer 1520
Interior data, perform the various functions of mobile phone and process data, thus mobile phone is carried out integral monitoring.Optionally, processor
1580 can include one or more processing unit;Preferably, processor 1580 can integrated application processor and modulation /demodulation process
Device, wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor is mainly located
Reason radio communication.It is understood that above-mentioned modem processor can not also be integrated in processor 1580.
Mobile phone also includes the power supply 1590 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply
Management system is logically contiguous with processor 1580, thus realizes management charging, electric discharge and power consumption pipe by power-supply management system
The functions such as reason.
Although not shown, mobile phone can also include photographic head, bluetooth module etc., does not repeats them here.
In embodiments of the present invention, the processor 1580 included by this terminal also has following functions: obtain encrypted instruction,
According to encrypted instruction, the urtext of output is sent to server.Receive server feedback ciphertext, ciphertext with
Urtext is associated.Urtext is replaced to ciphertext.Namely processor 1580 possesses the encryption input that execution is above-mentioned
The function of method.
Or, in embodiments of the present invention, the processor 1580 included by this terminal also has following functions: from third party
Application program obtains ciphertext;Receiving and deciphering instructs, and according to decryption instructions, ciphertext is sent to server;Receive clothes
The urtext of business device feedback, exports urtext;Urtext is associated with ciphertext.Namely processor 1580 possesses and holds
The function of the deciphering input method that row is above-mentioned.
Certainly, in actual realization, processor 1580 possesses the function performing above-mentioned encryption input method, also possesses and holds
The function of the deciphering input method that row is above-mentioned.It is defeated that usual this mobile terminal can be that computer, panel computer, mobile phone etc. are loaded with
Enter the intelligent terminal of method editing machine.
Above-mentioned encryption input method, corresponding device and mobile terminal, corresponding server, terminal obtains encrypted instruction,
According to encrypted instruction, the urtext of output is sent to server;Terminal receives the ciphertext of server feedback, adds ciphertext
This is associated with urtext;Urtext is replaced to ciphertext by terminal.The urtext of terminal output can be by clothes
Business device is encrypted, and finally replaces to ciphertext, and what information was transmitted during transmission (such as instant messaging etc.) is to add
Ciphertext originally, from without revealing urtext, improves the safety of information;Owing to server stores relevant to ciphertext
The urtext of connection, thus the recipient of information can get, by server, the urtext being associated with ciphertext.
Above-mentioned deciphering input method, corresponding device and mobile terminal, corresponding server, from third party application
Obtain ciphertext;Receiving and deciphering instructs, and according to decryption instructions, ciphertext is sent to server;Receive server feedback
Urtext, exports urtext;Urtext is associated with ciphertext.Owing to server stores relevant to ciphertext
The urtext of connection, first information receiver receives ciphertext, may then pass through server and gets and ciphertext phase
The urtext of association, thus realize the communication for information of secret, safety is high.
The invention discloses following scheme:
A1, a kind of encryption input method, comprise the steps:
Obtain encrypted instruction, according to described encrypted instruction, the urtext of output is sent to server;
Receiving the ciphertext of server feedback, described ciphertext is associated with described urtext;
Described urtext is replaced to described ciphertext.
A2, input method as described in A1, described ciphertext includes:
The character code corresponding to text message that is different with described urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to described text message;Described non-coding character conduct
Hide mark, it is impossible to be encoded recognition rule identification.
A3, input method as described in A2, described text message is from the text database set in described server.
A4, input method as described in A3, described text message is to determine at random from the text database of described setting.
A5, input method as described in A4, described text database includes at least in poem, proverb, Chinese idiom, popular word
Kind.
A6, input method as described in A3, each word, phrase or the character in described text message is advised by the mapping set
Word, phrase or the character of order corresponding with described urtext maps mutually the most respectively.
A7, input method as described in A6, the mapping ruler of described setting includes: languages or part of speech are same or like.
A8, input method as described in A2, the plurality of non-coding character with the form of scattered form or entirety according to setting
Before fixed arranging rule is arranged in the character code corresponding to described text message, between or afterwards.
A9, input method as described in A2, described non-coding character is from the character database set in described server.
A10, input method as described in A9, described non-coding character is to determine at random from the character database of described setting
's.
B11, a kind of deciphering input method, comprise the steps:
Ciphertext is obtained from third party application;
Receiving and deciphering instructs, and according to described decryption instructions, described ciphertext is sent to server;
Receive the urtext of server feedback, export described urtext;Described urtext and described ciphertext
It is associated.
B12, input method as described in B11, described ciphertext includes:
The character code corresponding to text message that is different with described urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to described text message;Described non-coding character conduct
Hide mark, it is impossible to be encoded recognition rule identification.
B13, input method as described in B12, described text message is from the text database set in described server.
B14, input method as described in B13, described text message is to determine at random from the text database of described setting
's.
B15, input method as described in B14, described text database includes in poem, proverb, Chinese idiom, popular word at least
A kind of.
B16, input method as described in B13, each word, phrase or the character in described text message is by the mapping set
Word, phrase or the character of rule order corresponding with described urtext respectively map mutually.
B17, input method as described in B16, the mapping ruler of described setting includes: languages or part of speech are same or like.
B18, input method as described in B12, the plurality of non-coding character with the form of scattered form or entirety according to
Set arranging rule be arranged in the character code corresponding to described text message before, between or afterwards.
B19, input method as described in B12, described non-coding character is from the character database set in described server.
B20, input method as described in B19, described non-coding character be from the character database of described setting random really
Fixed.
C21, a kind of server are the method for the urtext encryption of input method output, comprise the steps:
Receive the urtext sent by terminal;
The ciphertext being associated with described urtext is determined according to described urtext;
Described ciphertext is sent to described terminal.
C22, method as described in C21, determine according to described urtext and add ciphertext with described urtext is associated
Originally comprise the steps:
Determine the character code corresponding to text message that is different with described urtext and that associate, and determine multiple non-volume
Code character;The plurality of non-coding character is as hiding mark, it is impossible to be encoded recognition rule identification;
Set up the character code corresponding to described text message, connection between described hiding mark and described urtext
System, forms described ciphertext by the character code corresponding to described text message and described hiding mark.
D23, a kind of server are the method for the ciphertext deciphering of input method output, comprise the steps:
Receive the ciphertext sent by terminal;
The urtext being associated with described ciphertext is determined according to described ciphertext;
Described urtext is sent to described terminal.
D24, method as described in D23, determine the original literary composition being associated with described ciphertext according to described ciphertext
Originally comprise the steps:
It is decoded described ciphertext obtaining the character code corresponding to text message and multiple non-coding character;Institute
State multiple non-coding character as hiding mark, it is impossible to be encoded recognition rule identification;
Determine the urtext homogeneously associated with the character code corresponding to described text message, hiding mark.
D25, a kind of encryption input equipment, including:
First encrypting module, is used for obtaining encrypted instruction, the urtext of output is sent to according to described encrypted instruction
Server;
First receiver module, for receiving the ciphertext of server feedback, described ciphertext and described urtext
It is associated;
First replacement module, for replacing to described ciphertext by described urtext.
D26, input equipment as described in D25, described ciphertext includes:
The character code corresponding to text message that is different with described urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to described text message;Described non-coding character conduct
Hide mark, it is impossible to be encoded recognition rule identification.
D27, input equipment as described in D26, described text message is from the text database set in described server.
D28, input equipment as described in D27, described text message be from the text database of described setting random really
Fixed.
D29, input equipment as described in D28, described text database includes in poem, proverb, Chinese idiom, popular word extremely
Few one.
D30, input equipment as described in D27, each word, phrase or the character in described text message is by reflecting of setting
Word, phrase or the character of penetrating rule order corresponding with described urtext respectively map mutually.
D31, input equipment as described in D30, the mapping ruler of described setting includes: languages or part of speech are same or like.
D32, input equipment as described in D26, the plurality of non-coding character is with the form root of scattered form or entirety
According to set arranging rule be arranged in the character code corresponding to described text message before, between or afterwards.
D33, input equipment as described in D26, described non-coding character is from the character data set in described server
Storehouse.
D34, input equipment as described in D33, described non-coding character is random from the character database of described setting
Determine.
E35, a kind of deciphering input equipment, including:
First acquisition module, for obtaining ciphertext from third party application;
First deciphering module, instructs for receiving and deciphering, is sent to take by described ciphertext according to described decryption instructions
Business device;
First receiver module, for receiving the urtext of server feedback, exports described urtext;Described original literary composition
This is associated with described ciphertext.
E36, input equipment as described in E35, described ciphertext includes:
The character code corresponding to text message that is different with described urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to described text message;Described non-coding character conduct
Hide mark, it is impossible to be encoded recognition rule identification.
E37, input equipment as described in E36, described text message is from the text database set in described server.
E38, input equipment as described in E37, described text message be from the text database of described setting random really
Fixed.
E39, input equipment as described in E38, described text database includes in poem, proverb, Chinese idiom, popular word extremely
Few one.
E40, input equipment as described in E37, each word, phrase or the character in described text message is by reflecting of setting
Word, phrase or the character of penetrating rule order corresponding with described urtext respectively map mutually.
E41, input equipment as described in E40, the mapping ruler of described setting includes: languages or part of speech are same or like.
E42, input equipment as described in E36, the plurality of non-coding character is with the form root of scattered form or entirety
According to set arranging rule be arranged in the character code corresponding to described text message before, between or afterwards.
E43, input equipment as described in E36, described non-coding character is from the character data set in described server
Storehouse.
E44, input equipment as described in E43, described non-coding character is random from the character database of described setting
Determine.
F45, the server of a kind of urtext encryption for input method output, including:
Second receiver module, for receiving the urtext sent by terminal;
Second encrypting module, for determining, according to described urtext, the ciphertext being associated with described urtext;
Second sending module, for being sent to described terminal by described ciphertext.
F46, server as described in F45, described second encrypting module is used for:
Determine the character code corresponding to text message that is different with described urtext and that associate, and determine multiple non-volume
Code character;The plurality of non-coding character is as hiding mark, it is impossible to be encoded recognition rule identification;
Set up the character code corresponding to described text message, connection between described hiding mark and described urtext
System, forms described ciphertext by the character code corresponding to described text message and described hiding mark.
F47, the server of a kind of ciphertext deciphering for input method output, including:
Second receiver module, for receiving the ciphertext sent by terminal;
Second deciphering module, for determining, according to described ciphertext, the urtext being associated with described ciphertext;
Second sending module, for being sent to described terminal by described urtext.
F48, server as described in F47, described second deciphering module is used for:
It is decoded described ciphertext obtaining the character code corresponding to text message and multiple non-coding character;Institute
State multiple non-coding character as hiding mark, it is impossible to be encoded recognition rule identification;
Determine the urtext homogeneously associated with the character code corresponding to described text message, hiding mark.
G49, a kind of mobile terminal, comprising:
Touch-sensitive display;
One or more processors;
Memorizer;
One or more application programs, wherein said one or more application programs are stored in described memorizer and quilt
Being configured to be performed by the one or more processor, the one or more program is configured to:
Obtain encrypted instruction, according to described encrypted instruction, the urtext of output is sent to server;
Receiving the ciphertext of server feedback, described ciphertext is associated with described urtext;
Described urtext is replaced to described ciphertext.
G50, mobile terminal as described in G49, described ciphertext includes:
The character code corresponding to text message that is different with described urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to described text message;Described non-coding character conduct
Hide mark, it is impossible to be encoded recognition rule identification.
G51, mobile terminal as described in G50, described text message is from the text database set in described server.
G52, mobile terminal as described in G51, described text message be from the text database of described setting random really
Fixed.
G53, mobile terminal as described in G52, described text database includes in poem, proverb, Chinese idiom, popular word extremely
Few one.
G54, mobile terminal as described in G51, each word, phrase or the character in described text message is by reflecting of setting
Word, phrase or the character of penetrating rule order corresponding with described urtext respectively map mutually.
G55, mobile terminal as described in G54, the mapping ruler of described setting includes: languages or part of speech are same or like.
G56, mobile terminal as described in G50, the plurality of non-coding character is with the form root of scattered form or entirety
According to set arranging rule be arranged in the character code corresponding to described text message before, between or afterwards.
G57, mobile terminal as described in G50, described non-coding character is from the character data set in described server
Storehouse.
G58, mobile terminal as described in G57, described non-coding character is random from the character database of described setting
Determine.
H59, a kind of mobile terminal, comprising:
Touch-sensitive display;
One or more processors;
Memorizer;
One or more application programs, wherein said one or more application programs are stored in described memorizer and quilt
Being configured to be performed by the one or more processor, the one or more program is configured to:
Ciphertext is obtained from third party application;
Receiving and deciphering instructs, and according to described decryption instructions, described ciphertext is sent to server;
Receive the urtext of server feedback, export described urtext;Described urtext and described ciphertext
It is associated.
H60, mobile terminal as described in H59, described ciphertext includes:
The character code corresponding to text message that is different with described urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to described text message;Described non-coding character conduct
Hide mark, it is impossible to be encoded recognition rule identification.
H61, mobile terminal as described in H60, described text message is from the text database set in described server.
H62, mobile terminal as described in H61, described text message be from the text database of described setting random really
Fixed.
H63, mobile terminal as described in H62, described text database includes in poem, proverb, Chinese idiom, popular word extremely
Few one.
H64, mobile terminal as described in H61, each word, phrase or the character in described text message is by reflecting of setting
Word, phrase or the character of penetrating rule order corresponding with described urtext respectively map mutually.
H65, mobile terminal as described in H64, the mapping ruler of described setting includes: languages or part of speech are same or like.
H66, mobile terminal as described in H60, the plurality of non-coding character is with the form root of scattered form or entirety
According to set arranging rule be arranged in the character code corresponding to described text message before, between or afterwards.
H67, mobile terminal as described in H60, described non-coding character is from the character data set in described server
Storehouse.
H68, mobile terminal as described in H67, described non-coding character is random from the character database of described setting
Determine.
Although each step that it should be understood that in the flow chart of accompanying drawing shows successively according to the instruction of arrow, but
These steps are not that the inevitable order indicated according to arrow performs successively.Unless expressly stated otherwise herein, these steps
The the not strictest order that performs limit, it can perform in the other order.And, at least some of step in accompanying drawing
Can include many sub-steps or multiple stage, these sub-steps or stage are not necessarily to have performed at synchronization
Becoming, but can perform in different moment, its execution sequence is also not necessarily and carries out successively, but can with other steps or
The sub-step of other steps of person or at least some of of stage perform in turn or alternately.
The above is only the some embodiments of the present invention, it is noted that for the ordinary skill people of the art
For Yuan, under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (10)
1. an encryption input method, it is characterised in that comprise the steps:
Obtain encrypted instruction, according to described encrypted instruction, the urtext of output is sent to server;
Receiving the ciphertext of server feedback, described ciphertext is associated with described urtext;
Described urtext is replaced to described ciphertext.
2. a deciphering input method, it is characterised in that comprise the steps:
Ciphertext is obtained from third party application;
Receiving and deciphering instructs, and according to described decryption instructions, described ciphertext is sent to server;
Receive the urtext of server feedback, export described urtext;Described urtext is relevant to described ciphertext
Connection.
3. a server is the method that the urtext that input method exports is encrypted, it is characterised in that comprise the steps:
Receive the urtext sent by terminal;
The ciphertext being associated with described urtext is determined according to described urtext;
Described ciphertext is sent to described terminal.
4. a server is the method that the ciphertext that input method exports is deciphered, it is characterised in that comprise the steps:
Receive the ciphertext sent by terminal;
The urtext being associated with described ciphertext is determined according to described ciphertext;
Described urtext is sent to described terminal.
5. an encryption input equipment, it is characterised in that including:
First encrypting module, is used for obtaining encrypted instruction, is sent to service by the urtext of output according to described encrypted instruction
Device;
First receiver module, for receiving the ciphertext of server feedback, described ciphertext is relevant to described urtext
Connection;
First replacement module, for replacing to described ciphertext by described urtext.
6. a deciphering input equipment, it is characterised in that including:
First acquisition module, for obtaining ciphertext from third party application;
First deciphering module, instructs for receiving and deciphering, according to described decryption instructions, described ciphertext is sent to server;
First receiver module, for receiving the urtext of server feedback, exports described urtext;Described urtext with
Described ciphertext is associated.
7. the server of the urtext encryption that a kind is input method output, it is characterised in that including:
Second receiver module, for receiving the urtext sent by terminal;
Second encrypting module, for determining, according to described urtext, the ciphertext being associated with described urtext;
Second sending module, for being sent to described terminal by described ciphertext.
8. the server of the ciphertext deciphering that a kind is input method output, it is characterised in that including:
Second receiver module, for receiving the ciphertext sent by terminal;
Second deciphering module, for determining, according to described ciphertext, the urtext being associated with described ciphertext;
Second sending module, for being sent to described terminal by described urtext.
9. a mobile terminal, it is characterised in that comprising:
Touch-sensitive display;
One or more processors;
Memorizer;
One or more application programs, wherein said one or more application programs are stored in described memorizer and are configured
For being performed by the one or more processor, the one or more program is configured to:
Obtain encrypted instruction, according to described encrypted instruction, the urtext of output is sent to server;
Receiving the ciphertext of server feedback, described ciphertext is associated with described urtext;
Described urtext is replaced to described ciphertext.
10. a mobile terminal, it is characterised in that comprising:
Touch-sensitive display;
One or more processors;
Memorizer;
One or more application programs, wherein said one or more application programs are stored in described memorizer and are configured
For being performed by the one or more processor, the one or more program is configured to:
Ciphertext is obtained from third party application;
Receiving and deciphering instructs, and according to described decryption instructions, described ciphertext is sent to server;
Receive the urtext of server feedback, export described urtext;Described urtext is relevant to described ciphertext
Connection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610772590.9A CN106295379A (en) | 2016-08-30 | 2016-08-30 | Encrypt input method and device, deciphering input method and device and relevant device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610772590.9A CN106295379A (en) | 2016-08-30 | 2016-08-30 | Encrypt input method and device, deciphering input method and device and relevant device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106295379A true CN106295379A (en) | 2017-01-04 |
Family
ID=57675127
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610772590.9A Pending CN106295379A (en) | 2016-08-30 | 2016-08-30 | Encrypt input method and device, deciphering input method and device and relevant device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106295379A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI658401B (en) * | 2017-11-14 | 2019-05-01 | 財團法人工業技術研究院 | Mobile communication device based on virtual mobile infrastructure and related input method switching methods thereof |
CN110213201A (en) * | 2018-03-01 | 2019-09-06 | 腾讯科技(深圳)有限公司 | Processing method, device, computer equipment and the storage medium of data safety |
CN110555183A (en) * | 2018-05-31 | 2019-12-10 | 视联动力信息技术股份有限公司 | Text data processing method and device |
CN111212068A (en) * | 2019-12-31 | 2020-05-29 | 熵加网络科技(北京)有限公司 | Method for encrypting and decrypting characters by input method |
US11956324B2 (en) | 2021-01-07 | 2024-04-09 | Stmicroelectronics S.R.L. | Sensor device, system and method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103198264A (en) * | 2013-03-14 | 2013-07-10 | 厦门市美亚柏科信息股份有限公司 | Method and device for recovering encrypted file system data |
CN103366132A (en) * | 2012-03-29 | 2013-10-23 | 国际商业机器公司 | Device and method for encrypting data |
CN104243149A (en) * | 2013-06-19 | 2014-12-24 | 北京搜狗科技发展有限公司 | Encrypting and decrypting method, device and server |
-
2016
- 2016-08-30 CN CN201610772590.9A patent/CN106295379A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103366132A (en) * | 2012-03-29 | 2013-10-23 | 国际商业机器公司 | Device and method for encrypting data |
CN103198264A (en) * | 2013-03-14 | 2013-07-10 | 厦门市美亚柏科信息股份有限公司 | Method and device for recovering encrypted file system data |
CN104243149A (en) * | 2013-06-19 | 2014-12-24 | 北京搜狗科技发展有限公司 | Encrypting and decrypting method, device and server |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI658401B (en) * | 2017-11-14 | 2019-05-01 | 財團法人工業技術研究院 | Mobile communication device based on virtual mobile infrastructure and related input method switching methods thereof |
US10628614B2 (en) | 2017-11-14 | 2020-04-21 | Industrial Technology Research Institute | Mobile communication device based on virtual mobile infrastructure and related input method switching method thereof |
CN110213201A (en) * | 2018-03-01 | 2019-09-06 | 腾讯科技(深圳)有限公司 | Processing method, device, computer equipment and the storage medium of data safety |
CN110555183A (en) * | 2018-05-31 | 2019-12-10 | 视联动力信息技术股份有限公司 | Text data processing method and device |
CN111212068A (en) * | 2019-12-31 | 2020-05-29 | 熵加网络科技(北京)有限公司 | Method for encrypting and decrypting characters by input method |
CN111212068B (en) * | 2019-12-31 | 2022-02-08 | 北京升鑫网络科技有限公司 | Method for encrypting and decrypting characters by input method |
US11956324B2 (en) | 2021-01-07 | 2024-04-09 | Stmicroelectronics S.R.L. | Sensor device, system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103702297B (en) | Short message enhancement, apparatus and system | |
CN106295379A (en) | Encrypt input method and device, deciphering input method and device and relevant device | |
CN104618217B (en) | Share method, terminal, server and the system of resource | |
CN112989430A (en) | Integrity verification method and device, terminal equipment and verification server | |
CN104935955B (en) | A kind of methods, devices and systems transmitting live video stream | |
CN104571979B (en) | A kind of method and apparatus for realizing split view | |
JP6910300B2 (en) | A method for displaying chat history records and a device for displaying chat history records | |
CN110888705B (en) | Method for processing unread message corner marks and electronic equipment | |
CN107103074B (en) | Processing method of shared information and mobile terminal | |
CN110391867A (en) | DCI detection method, DCI sending method, terminal and base station | |
CN109358931A (en) | A kind of interface display method and terminal | |
CN107948429A (en) | A kind of content demonstration method and terminal device | |
US20150109210A1 (en) | Control method, and input device of touch screen terminal | |
CN106469280A (en) | The method and device of instant messaging interface processing | |
CN110147186A (en) | A kind of control method and terminal device of application | |
CN112311740B (en) | Data encryption method, data decryption method, terminal and storage medium | |
CN116541865A (en) | Password input method, device, equipment and storage medium based on data security | |
CN106202422B (en) | The treating method and apparatus of Web page icon | |
CN106874045A (en) | A kind of startup method of application program, device and mobile terminal | |
CN106375182A (en) | Voice communication method and device based on instant messaging application | |
CN104424324B (en) | The method and device of locating list item in list element | |
CN109189515A (en) | A kind of application starting method, terminal and computer readable storage medium | |
CN108319432A (en) | A kind of application operation method and terminal | |
CN110190947B (en) | Information encryption and decryption method, terminal and computer readable storage medium | |
CN109710207A (en) | Method, dual-screen mobile terminal and the storage medium of dual-screen mobile terminal preview picture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170720 Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801 Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD. Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park) Applicant before: Beijing Qihu Technology Co., Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170104 |