CN106534154B - A kind of information ciphering method, device and terminal - Google Patents
A kind of information ciphering method, device and terminal Download PDFInfo
- Publication number
- CN106534154B CN106534154B CN201611085000.1A CN201611085000A CN106534154B CN 106534154 B CN106534154 B CN 106534154B CN 201611085000 A CN201611085000 A CN 201611085000A CN 106534154 B CN106534154 B CN 106534154B
- Authority
- CN
- China
- Prior art keywords
- encryption
- information
- algorithm
- encryption algorithm
- geographical location
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 79
- 230000006399 behavior Effects 0.000 claims description 189
- 238000013507 mapping Methods 0.000 claims description 62
- 230000003542 behavioural effect Effects 0.000 claims description 21
- 238000004590 computer program Methods 0.000 claims 2
- 238000010586 diagram Methods 0.000 description 12
- 238000003825 pressing Methods 0.000 description 11
- 238000012545 processing Methods 0.000 description 7
- 230000006835 compression Effects 0.000 description 6
- 238000007906 compression Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 230000000694 effects Effects 0.000 description 5
- 239000011435 rock Substances 0.000 description 5
- 241000208340 Araliaceae Species 0.000 description 4
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 4
- 235000003140 Panax quinquefolius Nutrition 0.000 description 4
- 235000008434 ginseng Nutrition 0.000 description 4
- 230000006854 communication Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000149 penetrating effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a kind of information ciphering method, device and terminals;The embodiment of the present invention is using the usage behavior information for obtaining terminal current geographical location information and user, then, according to target Encryption Algorithm needed for the geographical location information and the usage behavior acquisition of information, when the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical, encryption information is treated according to the target Encryption Algorithm and is encrypted;The safety of information and the performance of terminal can be improved in the program.
Description
Technical field
The present invention relates to field of terminal technology, and in particular to a kind of information ciphering method, device and terminal.
Background technique
With the rapid development of mobile terminals, have become the indispensable a part of people's daily life.However intelligence
The information security issue of the mobile terminals such as energy mobile phone, tablet computer is also gradually shown.For example, cell phone password is stolen, is a
The stolen brush of related deposit etc. of e-bank after people's private data leakage, mobile phone are lost.
In order to improve the information security of mobile terminal, generally by the way of being encrypted to information, specifically use
Fixed-encryption algorithm encrypts information.However, some problems can be brought by carrying out encryption using fixed-encryption algorithm, for example,
When using the Encryption Algorithm of complex (such as encryption intensity for higher), the process of encryption or decryption can reduce mobile terminal
Performance, for another example, when using relatively simple (such as encryption intensity is lower) Encryption Algorithm, due to Encryption Algorithm level of encryption not
It is relatively low enough to will lead to information security.
Summary of the invention
The embodiment of the present invention provides a kind of information ciphering method, device and terminal, and safety and the end of information can be improved
The performance at end.
The embodiment of the present invention provides a kind of information ciphering method, comprising:
Obtain the usage behavior information of terminal current geographical location information and user;
According to the geographical location information and the usage behavior information, required target Encryption Algorithm is obtained;
When the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical, encrypted and calculated according to the target
Method is treated encryption information and is encrypted.
Correspondingly, the embodiment of the invention also provides a kind of information encryption devices, comprising:
Information acquisition unit, for obtaining the usage behavior information of the current geographical location information of terminal and user;
Algorithm acquiring unit obtains required for root according to the geographical location information and the usage behavior information
Target Encryption Algorithm;
Encryption unit, when not identical for the Encryption Algorithm when the target Encryption Algorithm and current crypto algorithm, according to
The target Encryption Algorithm is treated encryption information and is encrypted.
Correspondingly, the embodiment of the invention also provides a kind of terminals, comprising:
It is stored with the memory that can execute program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes such as the embodiment of the present invention
Any information encryption method of offer.
The embodiment of the present invention is using the usage behavior information for obtaining terminal current geographical location information and user, then,
According to target Encryption Algorithm needed for the geographical location information and the usage behavior acquisition of information, calculated when the target encrypts
When method and the not identical Encryption Algorithm of current crypto algorithm, encryption information is treated according to the target Encryption Algorithm and is encrypted;
The program can dynamically change Encryption Algorithm based on the current geographical location information of terminal and usage behavior information, to information
It is encrypted, avoids and encrypted using fixed-encryption algorithm, it is thus possible to improve the safety of information and the property of terminal
Energy.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is the first flow chart of information ciphering method provided in an embodiment of the present invention.
Fig. 2 is second of flow chart of information ciphering method provided in an embodiment of the present invention.
Fig. 3 is the schematic diagram that user provided in an embodiment of the present invention uses document to apply.
Fig. 4 is the schematic diagram that user provided in an embodiment of the present invention shakes terminal.
Fig. 5 is the schematic diagram that user provided in an embodiment of the present invention rotates terminal.
Fig. 6 is the third flow chart of information ciphering method provided in an embodiment of the present invention.
Fig. 7 is the 4th kind of flow chart of information ciphering method provided in an embodiment of the present invention.
Fig. 8 is the schematic diagram that user provided in an embodiment of the present invention moves horizontally terminal.
Fig. 9 is the 5th kind of flow chart of information ciphering method provided in an embodiment of the present invention.
Figure 10 is the schematic diagram that user provided in an embodiment of the present invention moves up mobile terminal.
Figure 11 is the 6th kind of flow chart of information ciphering method provided in an embodiment of the present invention.
Figure 12 is the first structural schematic diagram provided in an embodiment of the present invention.
Figure 13 is second of structural schematic diagram of information encryption device provided in an embodiment of the present invention.
Figure 14 is the third structural schematic diagram of information encryption device provided in an embodiment of the present invention.
Figure 15 is the 4th kind of structural schematic diagram of information encryption device provided in an embodiment of the present invention.
Figure 16 is the 5th kind of structural schematic diagram of information encryption device provided in an embodiment of the present invention.
Figure 17 is the 6th kind of structural schematic diagram of information encryption device provided in an embodiment of the present invention.
Figure 18 is the structural schematic diagram of terminal provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
Term " first ", " second ", " third " and " the 4th " in the present invention etc. be for distinguishing different objects, rather than
It is used to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that cover non-exclusive
Include.Such as contain a series of steps or units process, method, system, product or equipment be not limited to it is listed
Step or unit, but optionally further comprising the step of not listing or unit, or optionally further comprising for these processes, side
The intrinsic other step or units of method, product or equipment.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments
Containing at least one embodiment of the present invention.Each position in the description occur the phrase might not each mean it is identical
Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and
Implicitly understand, embodiment described herein can be combined with other embodiments.
The embodiment of the invention provides a kind of information ciphering method, device and terminals.It will be described in detail respectively below.
The executing subject of information ciphering method provided in an embodiment of the present invention can be information provided in an embodiment of the present invention
Encryption device, being perhaps integrated with the terminal of the information encryption device information encryption device can be using hardware or software
Mode is realized;Terminal described in the embodiment of the present invention can be smart phone (such as Android phone, Windows Phone hand
Machine etc.), tablet computer, palm PC, laptop, mobile internet device (MID, Mobile Internet
Devices) or the mobile devices such as wearable device, above-mentioned terminal are only citings, and non exhaustive, including but not limited to above-mentioned end
End.
In a preferred embodiment, it will be described from the angle of information encryption device, which specifically may be used
It is integrated in the form of software or hardware in the terminal, which can be the equipment such as smart phone, tablet computer.
Fig. 1 is please referred to, Fig. 1 is a kind of flow chart for information ciphering method that this preferred embodiment provides.It is excellent to this below
Each step of the information ciphering method of embodiment is selected to be described in detail.
S101, the usage behavior information for obtaining terminal current geographical location information and user.
Wherein, usage behavior information refers to the behavioural information of user's using terminal.Behavior information may include user
The behavioural information applied in using terminal, for example, the usage behavior information may include: user to using number, frequency
Rate, user use Apply Names of application etc. using the type of application, user.
The usage behavior information can also include operation information of the user to terminal, which may include shaking behaviour
Make information (shaking direction of such as terminal shakes number, shakes frequency), moving operation information (moving direction of terminal, shifting
Dynamic distance etc.), the slide information (such as glide direction, sliding distance, sliding position) on terminal screen, terminal is pressed
Press operation information (such as pressing dynamics information, compression number), rotation process information (such as rotation angle, direction of rotation) etc.
Deng.
Wherein, geographical location information may include place locating for terminal, locating region (country, province, city, area etc.),
Height above sea level of terminal etc..
In practical application, the current geographical location of terminal can be obtained by GPS, height sensor or its sensor and is believed
Breath.For usage behavior information, it can be and user's usage behavior real-time monitoring is obtained in user's using terminal.
Specifically, can when needing to encrypt information (as encrypted to information using certain encryption intensity),
Obtain terminal current geographical location information and usage behavior information.For example, can be encrypted to information such as picture, chat records
When, obtain geographical location information and usage behavior information.
Wherein, obtain geographical location information and usage behavior information timing can there are many, for example, can obtain simultaneously
It takes, can also successively obtain.
S102, according to the geographical location information and usage behavior information, determine required target Encryption Algorithm.
In the present embodiment determine Encryption Algorithm mode can there are many, it is as follows:
(1), an encryption parameter information is first determined according to geographical location and usage behavior information, then, is based on the encryption
Parameter information obtains corresponding target Encryption Algorithm.
That is, step " according to target Encryption Algorithm needed for the geographical location information and the usage behavior acquisition of information " can
To include:
Corresponding encryption parameter information is determined according to the geographical location information and the usage behavior information;
Target Encryption Algorithm needed for being obtained according to the encryption parameter information.
Wherein, encryption parameter information can for Encryption Algorithm to data encryption when required encryption parameter;The encryption parameter
Information may include: encryption intensity, encrypted object, encryption key etc..
Wherein, encryption intensity can be logarithm according to the depth of encryption, depend on the data bits of encryption, i.e. encryption when institute
Key length.Therefore, encryption intensity can be characterized with the data bits of encryption.Such as, AES (Advanced
Encryption Standard, Advanced Encryption Standard) -128, encryption data digit is 128bits, and the encryption of the algorithm is strong
Degree can be 128bits.
In the present embodiment according to geographical location and usage behavior information determine encryption parameter information mode can also have it is more
Kind, such as:
An encryption parameter information can be obtained according to geographical location information, be encrypted according to usage behavior acquisition of information one
Then parameter information obtains corresponding encryption parameter information according to the two encryption parameters.
Namely step " determining corresponding encryption parameter information according to the geographical location information and the usage behavior information " can
To include:
Corresponding first encryption parameter information is determined according to the geographical location information;
Corresponding second encryption parameter information is determined according to the usage behavior information;
Corresponding encryption parameter information is obtained according to first encryption parameter information and second encryption parameter information.
Specifically, a geographic factor mapping relations set can be preset, which includes geographical location information and add
Mapping relations between close parameter information, at this point it is possible to be obtained according to geographical location information and geographic factor mapping relations set
Take corresponding first encryption parameter information;A behavioral parameters mapping relations set, the set packet can also equally be preset
Usage behavior information and the direct mapping relations of encryption parameter information are included, can be reflected according to usage behavior information and behavior parameter
Set of relationship is penetrated to obtain corresponding second encryption parameter information.
Wherein, the first encryption parameter information and the second encryption parameter information are the encryption parameter information of same type, for example,
First encryption parameter information and the second encryption parameter information are encryption intensity or encrypted object information etc..
For example, determining that encryption intensity is 128bits according to geographical location information, determine that encryption is strong according to usage behavior information
256bits is spent, then at this point it is possible to an encryption intensity is chosen from the two encryption intensities, as chosen 128bits.
First encryption parameter information and the second encryption parameter information may be the encryption parameter information of not same type,
For example, the first encryption parameter information is encryption intensity, the second encryption parameter information is encrypted object.At this point, according to the first encryption
The encryption parameter information that parameter information and the second encryption parameter information obtain may include that the first encryption parameter information and second add
Close parameter information.
For example, when the first encryption parameter information is encryption intensity, the second encryption parameter information is encryption key, the encryption
Parameter information may include: encryption intensity and encryption key.
In the present embodiment after determining encryption parameter information, the target needed for being obtained according to encryption parameter information, which encrypts, to be calculated
The mode of method can also there are many, for example, can be believed according to encryption parameter information the respective encrypted parameter of current crypto algorithm
Breath is modified, and obtains target Encryption Algorithm.For another example, one and encryption parameter can be chosen from multiple candidate Encryption Algorithm
The corresponding target Encryption Algorithm of information.
It, can be from default for example, when encryption parameter information is encryption intensity, and when determining that the encryption intensity is 192bits
An Encryption Algorithm is chosen in algorithm set.Wherein, predetermined encryption algorithm set include a variety of encryption intensities it is corresponding plus
Close algorithm, such as may include Encryption Algorithm D, 192bits of Encryption Algorithm C, 128bits of 128bit Encryption Algorithm C,
The Encryption Algorithm D ... of Encryption Algorithm C, 256bits of Encryption Algorithm D, 2568bit of 192bits.If target encryption intensity
For 192bits, then the encryption of Encryption Algorithm C or 192bits that encryption intensity is 192bits can be chosen from set at this time
Algorithm D.
(2), an encryption parameter information is determined according to geographical location and usage behavior information respectively, then, based on this two
A encryption parameter information obtains corresponding target Encryption Algorithm.
Namely step " according to target Encryption Algorithm needed for the geographical location information and the usage behavior acquisition of information " can
To include:
Corresponding first encryption parameter information is determined according to the geographical location information;
Corresponding second encryption parameter information is determined according to the usage behavior information;
Target Encryption Algorithm needed for being obtained according to first encryption parameter information and second encryption parameter information.
Wherein, the first encryption parameter information and the second encryption parameter information are that the encryption parameter information of same type can also be with
For different types of encryption parameter information.
(2-1), the first encryption parameter information and the second encryption parameter information belong to the encryption parameter of same type.For example,
First encryption parameter information and the second encryption parameter information are encryption intensity or encrypted object information etc..
In 2-1, step " needed for being obtained according to first encryption parameter information and second encryption parameter information
Target Encryption Algorithm " may include:
Corresponding target encryption parameter information is obtained according to first encryption parameter information and second encryption parameter information;
Target Encryption Algorithm needed for being obtained according to target encryption parameter information.
For example, determining that encryption intensity is 128bits according to geographical location information, determine that encryption is strong according to usage behavior information
256bits is spent, it, such as can be according to then at this point it is possible to obtain the target Encryption Algorithm of diminution according to the two encryption intensities
An encryption intensity is chosen in default selection rule (choosing is big or selects small), target encryption corresponding with the encryption intensity is obtained and calculates
Method.
Target Encryption Algorithm after determining target encryption parameter information, needed for being obtained according to target encryption parameter information
Mode can also there are many, for example, can be according to target encryption parameter information to the respective encrypted parameter of current crypto algorithm
Information is modified, and obtains target Encryption Algorithm.For another example, one can be chosen from multiple candidate Encryption Algorithm to join with encryption
The corresponding target Encryption Algorithm of number information.
(2-2), first encryption parameter information and the second encryption parameter information may be the encryption ginseng of not same type
Number information, for example, the first encryption parameter information is encryption intensity, the second encryption parameter information is encrypted object.At this point, according to
One encryption parameter information and the second encryption parameter information obtain required target Encryption Algorithm.
For example, be encrypted object in the first encryption parameter information, and when encrypted object is a, the second encryption parameter information be
Encryption intensity, and encryption intensity is 256bits, then can obtain at this time, an encrypted object is a, encryption intensity is
The Encryption Algorithm of 256bits.
It for another example, is encryption intensity in the first encryption parameter information, and encryption intensity is 128bits, the second encryption parameter
Information is encryption key, and encryption key is " 12345 ", then can obtain at this time an encryption intensity be 128bits and
Encryption key is the Encryption Algorithm of " 12345 ".
It wherein, can be with according to the mode that the first encryption parameter information and the second encryption parameter information obtain target Encryption Algorithm
There are many, for example, phase can be chosen from candidate Encryption Algorithm according to the first encryption parameter information and the second encryption parameter information
The Encryption Algorithm answered, such as selection encryption intensity is 128bits from candidate algorithm set and encryption key is
The Encryption Algorithm of " 12345 ".
For another example, can the respective encrypted parameter information to current crypto algorithm be modified, obtain target Encryption Algorithm;
Namely step " the target Encryption Algorithm needed for being obtained according to first encryption parameter information and second encryption parameter information " can
To include:
According to first encryption parameter information and second encryption parameter information to being encrypted accordingly in current crypto algorithm
Parameter is modified, and obtains target Encryption Algorithm.
For example, the encryption intensity of current crypto algorithm is 128bits, encrypted object a, if the first encryption parameter information
For encryption intensity, and encryption intensity is 192bits, and the second encryption parameter is encrypted object, and when encrypted object is c, then can
The encryption intensity of current crypto algorithm is changed to 192bits by 128bits, by the encrypted object of current crypto algorithm by a
It is changed to c.
(3), an Encryption Algorithm is first determined according to geographical location, then, based on usage behavior information to the Encryption Algorithm
In corresponding encryption information be modified, obtain required target Encryption Algorithm.
It can be with " according to target Encryption Algorithm needed for the geographical location information and the usage behavior acquisition of information " that is, step
Include:
Corresponding Encryption Algorithm is determined according to the geographical location information;
Encryption parameter information corresponding in the Encryption Algorithm is modified according to the usage behavior information, target is obtained and adds
Close algorithm.
Specifically, it can determine that corresponding encryption is calculated according to position algorithm mapping relations set and the geographical location information
Method, the position algorithm mapping relations set may include the mapping relations between geographical location information and Encryption Algorithm.
The geographical location information may include place, the height above sea level etc. that terminal is presently in.For example, obtaining place pair
The corresponding Encryption Algorithm of Encryption Algorithm or height above sea level answered.Specifically, can according to the place that terminal is presently in, with
And place Algorithm mapping set of relationship determines corresponding Encryption Algorithm, the place Algorithm mapping set of relationship include place with plus
Mapping relations between close algorithm.
For example, determining that terminal is presently in the corresponding Encryption Algorithm in place is Encryption Algorithm 1, it is then possible to according to using
Behavioural information, into change, obtains target Encryption Algorithm to encryption parameter corresponding in the Encryption Algorithm.
Wherein, it can be set according to actual needs according to the encryption parameter information that usage behavior information is changed, for example, can be with
Encryption intensity, encryption key or encrypted object are modified.
For example, determining that terminal is presently in the corresponding Encryption Algorithm in place is Encryption Algorithm 2, it is then possible to according to using
Behavioural information is modified the encryption intensity or encrypted object of the Encryption Algorithm 2.
In the present embodiment, can be had according to the mode that usage behavior information changes the encryption parameter information of Encryption Algorithm more
Kind, for example, the corresponding target encryption parameter information of usage behavior information can be obtained first, then, believed according to target encryption parameter
Breath is modified encryption parameter information corresponding in Encryption Algorithm.
For example, determine terminal be presently in the corresponding Encryption Algorithm in place be Encryption Algorithm 2 after, it is available with make
It is 256bits with the corresponding encryption intensity of behavioural information, it is then possible to which the encryption intensity of Encryption Algorithm 2 is changed to 256bits.
(4), an Encryption Algorithm is first determined according to usage behavior, then, based on geographical location to phase in the Encryption Algorithm
The encryption information answered is modified, and obtains required target Encryption Algorithm.
It can be with " according to target Encryption Algorithm needed for the geographical location information and the usage behavior acquisition of information " that is, step
Include:
Corresponding Encryption Algorithm is determined according to the usage behavior information;
Encryption parameter information corresponding in the Encryption Algorithm is modified according to the geographical location information, target is obtained and adds
Close algorithm.
Specifically, it can determine that corresponding encryption is calculated according to behavior Algorithm mapping set of relationship and the usage behavior information
Method, behavior Algorithm mapping set of relationship may include the mapping relations between usage behavior information and Encryption Algorithm.
The usage behavior information may include behavior characteristic information (the use frequency of application applied in user's using terminal
Rate, number, application type, Apply Names etc.), user is to operation information (moving operation information) of terminal etc..
For example, the corresponding Encryption Algorithm of available behavior characteristic information or the corresponding Encryption Algorithm of operation information etc.
Deng.Specifically, can according to the behavior characteristic information and behavior Algorithm mapping set of relationship applied in user's using terminal come
Determine that corresponding Encryption Algorithm, behavior Algorithm mapping set of relationship include the mapping between behavior characteristic information and Encryption Algorithm
Relationship.
For example, determining that Encryption Algorithm corresponding to usage behavior information is Encryption Algorithm 1, it is then possible to according to geographical position
Confidence breath, into change, obtains target Encryption Algorithm to encryption parameter corresponding in the Encryption Algorithm.
Wherein, it can be set according to actual needs according to the encryption parameter information that geographical location information is changed, for example, can be with
Encryption intensity, encryption key or encrypted object are modified.
For example, determining that Encryption Algorithm corresponding to usage behavior information is Encryption Algorithm 3, it is then possible to according to geographical position
Confidence breath is modified the encryption intensity or encrypted object of the Encryption Algorithm 3.
In the present embodiment, can be had according to the mode that geographical location information changes the encryption parameter information of Encryption Algorithm more
Kind, for example, the corresponding target encryption parameter information of geographical location information can be obtained first, then, believed according to target encryption parameter
Breath is modified encryption parameter information corresponding in Encryption Algorithm.
For example, determine Encryption Algorithm corresponding to usage behavior information be Encryption Algorithm 3 after, it is available with it is geographical
The corresponding encrypted object of location information is c, it is then possible to which the encrypted object of Encryption Algorithm 3 is changed to c.
(5), an Encryption Algorithm is determined according to geographical location and usage behavior respectively, then, is calculated according to the two encryptions
Method obtains required Encryption Algorithm.
That is, step " according to target Encryption Algorithm needed for the geographical location information and the usage behavior acquisition of information " can
To include:
Corresponding first Encryption Algorithm is determined according to the geographical location information;
Corresponding second Encryption Algorithm is determined according to the usage behavior information;
Target Encryption Algorithm needed for being obtained according to first Encryption Algorithm and second Encryption Algorithm.
Specifically, it can determine that corresponding encryption is calculated according to position algorithm mapping relations set and the geographical location information
Method, the position algorithm mapping relations set may include the mapping relations between geographical location information and Encryption Algorithm.
Specifically, it can determine that corresponding second adds according to behavior Algorithm mapping set of relationship and the usage behavior information
Close algorithm, behavior Algorithm mapping set of relationship may include the mapping relations between usage behavior information and Encryption Algorithm.
In the present embodiment, mapping relations set can be set by the user, can also be by default.
103, it when the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical, is encrypted and is calculated according to the target
Method is treated encryption information and is encrypted.
From the foregoing, it will be observed that the embodiment of the present invention is using the usage behavior letter for obtaining terminal current geographical location information and user
Breath, then, according to the geographical location information and the usage behavior information, obtains required target Encryption Algorithm, when the target adds
When the Encryption Algorithm of close algorithm and current crypto algorithm is not identical, encryption information is treated according to the target Encryption Algorithm and is added
It is close;The program can dynamically change Encryption Algorithm based on the current geographical location information of terminal and usage behavior information, with right
Information is encrypted, avoid and encrypted using fixed-encryption algorithm, it is thus possible to improve the safety and terminal of information
Performance.
For example, when target Encryption Algorithm complexity be higher than current crypto Encryption Algorithm (be such as currently at secret place, and
User is writing document) when, then it is assumed that the level of encryption of Encryption Algorithm is inadequate at this time, it is higher level of encryption can be replaced
Encryption Algorithm, it is thus possible to improve the safety of information.
For another example, when the complexity of target Encryption Algorithm (is such as currently at common place, and uses lower than current crypto algorithm
Playing game in family) when, then it is assumed that the complexity of Encryption Algorithm is excessively high at this time, it is likely to affect the performance of terminal,
Therefore, the lower Encryption Algorithm of complexity can be replaced, the performance of terminal can be promoted.In a preferred embodiment, of the invention
Embodiment additionally provides another information ciphering method, will come so that information encryption device is integrated in terminal as an example to letter in embodiment
Encryption for information method is described in detail.
Referring to figure 2., the flow chart of the information ciphering method provided for this preferred embodiment.Below to this preferred embodiment
Each step of information ciphering method be described in detail.
S201, terminal obtain the usage behavior information of current geographical location information and user.
Wherein, geographical location information may include: the height above sea level etc. that the place that is presently in of terminal, terminal are presently in.
In practical application, can activity trajectory according to user or position, place is divided into office space, life field
Institute, public place of entertainment, common place etc..
Wherein, the usage behavior information of user may include: the behavioural information applied in user's using terminal;For example, with
Family to using number, frequency, user using the type of application, user using application Apply Names etc..
In addition, the usage behavior information can also include user to the operation information of terminal, for example the operation information can be with
Including shake operation information (such as the shaking direction of terminal shakes number, shake frequency), moving operation information (terminal
Moving direction, moving distance etc.), slide information (such as glide direction, sliding distance, sliding position on terminal screen
Deng), the pressing operation information (such as pressing dynamics information, compression number) to terminal, rotation process information (as rotation angle,
Direction of rotation etc.) etc..
S202, terminal determine corresponding encryption parameter information according to the geographical location information and the usage behavior information.
Wherein, required encryption parameter when encryption parameter information can encrypt data for Encryption Algorithm;The encryption
Parameter information may include: encryption intensity, encrypted object, encryption key etc..
According to geographical location and usage behavior determine encryption parameter information mode can there are many, it is as follows:
(1), encryption parameter information is determined based on mapping relations;
Specifically, it can be determined according to parameter mapping relations set, geographical location information and usage behavior information corresponding
Encryption parameter information, the parameter mapping relations set include: preset geographical position information, default usage behavior information and preset
Mapping relations between encryption parameter information.
The parameter mapping relations set can be presented in a tabular form, by taking encryption parameter information is encryption intensity as an example, such as
Shown in following table:
Geographical location | Usage behavior information | Encryption intensity |
Position 1 | Usage behavior information 1 | Encryption intensity 2 |
Position 2 | Usage behavior information 2 | Encryption intensity 3 |
Position 1 | Usage behavior information 2 | Encryption intensity 4 |
Position 3 | Usage behavior information 3 | Encryption intensity 5 |
Position 2 | Usage behavior information 4 | Encryption intensity 1 |
Position n | Usage behavior information 5 | Encryption intensity 3 |
Position 4 | Usage behavior information n | Encryption intensity 1 |
Table 1
Current institute can be searched in this table after obtaining geographical location and usage behavior information using above table
The encryption intensity needed.
For example, using encryption parameter information as encryption intensity, geography information for place and usage behavior information is that user is current
For the application type used.In the present embodiment, different encryption intensities can be used for different places.For example, can set
Determine that office space is top-secret place, life area is secret place, common place is general secret place etc., namely office field
Corresponding encryption intensity is greater than the encryption intensity of life area, and the encryption that the encryption intensity of life area is greater than common place is strong
Degree.
It is as shown in the table:
Table 2
For example, when terminal be in public place of entertainment, and user at this time using document in application, generally security requirements are less
Height, therefore it is 192bits that required encryption intensity can be obtained by table 2.
It can pass through with reference to Fig. 3 when terminal is in office space, and document application editor's document is used in user
It is 256bits that table 2, which obtains current encryption intensity,.
For another example, using encryption parameter information as encryption intensity, geography information for place and usage behavior information is user couple
For the operation information of terminal, the operation different for different places can use different encryption intensities.It is as shown in the table:
Table 3
With reference to Fig. 4, when user is in office space, and rock from side to side terminal when, pass through the available required encryption of table 3
Intensity is 256bits.
In practical applications, usage behavior information can also carry out the operation information of certain operation for user to terminal, than
Such as, mobile moving direction, moving distance etc. are carried out to terminal.It include the mobile side of mobile terminal to use behavioural information
It is as shown in the table to for, encryption parameter information is encrypted object, geographical location information is place:
Place | Moving operation | Encrypted object |
Office space | It moves up | Object a |
Office space | It moves down | Object a |
Office space | It moves right | Object b |
Public place of entertainment | It moves up | Object c |
Public place of entertainment | It is moved to the left | Object c |
Common place | It moves right | Object d |
Common place | It moves down | Object f |
Table 4
For example, can determine that encrypted object is object by table 4 when user is in public place of entertainment, moves down terminal
c。
Same way, it is also possible to establish geographical location, shake mapping relations set between frequency and encryption parameter information, it is geographical
Mapping relations set, etc. between position, rotation angle and encryption parameter information.
(2), corresponding first encryption parameter information is determined according to the geographical location information, it is true according to the usage behavior information
Fixed corresponding second encryption parameter information obtains corresponding according to first encryption parameter information and second encryption parameter information
Encryption parameter information.
(2-a), the first encryption parameter information and the second encryption parameter information are the encryption parameter information of same type.Than
Such as, the first encryption parameter information and the second encryption parameter information are encryption intensity or encrypted object information etc..
Wherein it is possible to preset a geographic factor mapping relations set, which includes geographical location information and adds
Mapping relations between close parameter information, at this point it is possible to be obtained according to geographical location information and geographic factor mapping relations set
Take corresponding first encryption parameter information;A behavioral parameters mapping relations set, the set packet can also equally be preset
Usage behavior information and the direct mapping relations of encryption parameter information are included, can be reflected according to usage behavior information and behavior parameter
Set of relationship is penetrated to obtain corresponding second encryption parameter information.
It, can be according to (the choosing of default selection rule after obtaining the first encryption parameter information and the second encryption parameter information
Greatly or select small) encryption parameter information is chosen from the two encryption parameter informations as target encryption parameter information.
The default selection rule can be set according to actual needs, for example, choosing the corresponding encryption parameter letter in geographical location
Breath, or choose the corresponding encryption parameter information of usage behavior information etc..
For example, by taking the first encryption parameter information and the second encryption parameter information are encryption intensity as an example, it is as shown in the table:
Geographical location | Encryption intensity |
Position 1 | Encryption intensity 2 |
Position 2 | Encryption intensity 3 |
Position 3 | Encryption intensity 4 |
Position 4 | Encryption intensity 5 |
Position 5 | Encryption intensity 1 |
Position n | Encryption intensity 1 |
Table 5
Usage behavior information | Encryption intensity |
Usage behavior information 1 | Encryption intensity 2 |
Usage behavior information 2 | Encryption intensity 3 |
Usage behavior information 3 | Encryption intensity 4 |
Usage behavior information 4 | Encryption intensity 5 |
Usage behavior information 5 | Encryption intensity 1 |
Usage behavior information 6 | Encryption intensity 3 |
Usage behavior information n | Encryption intensity 1 |
Table 6
When user is in position 1, it is encryption intensity 2 that required encryption intensity can be obtained by table 5.Work as usage behavior
It is encryption intensity 3 that information can obtain required encryption intensity when being usage behavior information 6 by table 6, is added at this point it is possible to choose
Close intensity 3 is used as target encryption intensity.
(2-b), the first encryption parameter information and the second encryption parameter information may be the encryption parameter of not same type
Information.For example, the first encryption parameter information is encryption intensity, the second encryption parameter information is encrypted object.At this point, required adds
Close parameter information may include the first encryption parameter information and the second encryption parameter information.
For example, when the first encryption parameter information is encryption intensity, the second encryption parameter information is encryption key, the encryption
Parameter information may include: encryption intensity and encryption key.
Same first encryption parameter or the second encryption parameter can mapping relations set based on parameter and geographical location,
The mapping relations set of parameter and usage behavior information obtains.Using the first encryption parameter information as encryption intensity, the second encryption ginseng
For number information are encrypted object, geographical location information is place, usage behavior information is the currently used application type of user.
It is as shown in the table:
Table 7
Use application | Encrypted object |
Document application | Object a |
Entertainment applications | Object b |
Social application | Object c |
Table 8
By table 7 and table 8 it is found that be in office space as user, and when entertainment applications are used, available encryption is by force
Degree is 256bits, encrypted object b.
Using the first encryption parameter information as encryption intensity, the second encryption parameter information be encryption key, geography information is field
Institute and usage behavior information be user to the operation information of terminal for, be as follows:
Operation | Encryption key |
Rock from side to side terminal | Key a |
Move horizontally terminal | Key b |
Vertically move terminal | Key b |
Moving in rotation terminal | Key c |
Rock from side to side terminal | Key f |
Vertically move terminal | Key d |
Move horizontally terminal | Key a |
Table 9
It is available by table 7 and table 9 it is found that when user is in common place, and when moving in rotation terminal as shown in Figure 5
Current desired encryption intensity is 128bits, key c.
S203, terminal obtain required target Encryption Algorithm according to the encryption parameter information.
Wherein, according to encryption parameter information obtain needed for target Encryption Algorithm mode can also there are many, for example, can
To be modified according to respective encrypted parameter information of the encryption parameter information to current crypto algorithm, target Encryption Algorithm is obtained.
For another example, a target Encryption Algorithm corresponding with encryption parameter information can be chosen from multiple candidate Encryption Algorithm.
For example, the encrypted object b of current crypto algorithm can be changed when encryption parameter information includes encrypted object a
For a, or Encryption Algorithm that encrypted object is b is chosen from multiple candidate Encryption Algorithm as target Encryption Algorithm.In another example
When encryption parameter information includes: encrypted object a and encryption intensity 2, the encrypted object b of current crypto algorithm can be changed to
A, encryption intensity 1 is changed to encryption intensity 2;Or selection encrypted object is b from multiple candidate Encryption Algorithm, encryption intensity is
2 Encryption Algorithm is as target Encryption Algorithm.
S204, when the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical, terminal is according to the target
Encryption Algorithm is treated encryption information and is encrypted.
From the foregoing, it will be observed that the embodiment of the present invention is using the usage behavior letter for obtaining terminal current geographical location information and user
Then breath determines corresponding encryption parameter information according to the geographical location information and the usage behavior information, is joined according to the encryption
Target Encryption Algorithm needed for number acquisition of information, when the target Encryption Algorithm is not identical as the Encryption Algorithm of current crypto algorithm
When, encryption information is treated according to the target Encryption Algorithm and is encrypted;The program can be believed based on the current geographical location of terminal
Breath and usage behavior information dynamically change Encryption Algorithm, to be encrypted to information, avoid using fixed-encryption algorithm into
Row encryption, it is thus possible to improve the safety of information and the performance of terminal.
For example, when encryption parameter information is encryption intensity, when target encryption intensity is higher than current crypto intensity (as currently
In secret place, and user is writing document) when, then it is assumed that encryption intensity is inadequate at this time, information can be improved and add
Close encryption intensity, it is thus possible to improve the safety of information.
For another example, when encryption parameter information is encryption intensity, when target encryption intensity (is such as worked as lower than current crypto intensity
It is preceding to be in common place, and user is playing game) when, then it is assumed that encryption intensity is excessively high at this time, it is likely to affect
Therefore the performance of terminal can reduce the encryption intensity of information encryption, can promote the performance of terminal.
In addition, include encryption intensity in encryption parameter information, and when changing the encryption intensity of current crypto algorithm, due to only
Change encryption intensity and do not change Encryption Algorithm itself, therefore, the solution confidential information (such as password, finger print information) needed for decryption is
It remains unchanged, avoids the need for change solution confidential information, facilitate user's fast decryption, improve decryption speed.It is preferred real one
It applies in example, the embodiment of the invention also provides another information ciphering methods, will be integrated in embodiment with information encryption device
Information ciphering method is described in detail for terminal.
Fig. 6 is please referred to, for the flow chart for the information ciphering method that this preferred embodiment provides.Below to this preferred embodiment
Each step of information ciphering method be described in detail.
S301, terminal obtain the usage behavior information of current geographical location information and user.
Wherein, geographical location information may include: the height above sea level etc. that the place that is presently in of terminal, terminal are presently in.
In practical application, can activity trajectory according to user or position, place is divided into office space, life field
Institute, public place of entertainment, common place etc..
Wherein, the usage behavior information of user may include: the behavioural information applied in user's using terminal;For example, with
Family to using number, frequency, user using the type of application, user using application Apply Names etc..
In addition, the usage behavior information can also include user to the operation information of terminal, for example the operation information can be with
Including shake operation information (such as the shaking direction of terminal shakes number, shake frequency), moving operation information (terminal
Moving direction, moving distance etc.), slide information (such as glide direction, sliding distance, sliding position on terminal screen
Deng), the pressing operation information (such as pressing dynamics information, compression number) to terminal, rotation process information (as rotation angle,
Direction of rotation etc.) etc..
S302, terminal determine corresponding first encryption parameter information according to the geographical location information.
Wherein, the first encryption parameter information may include the encryption parameters such as encryption intensity, encrypted object, encryption key.
Terminal can determine corresponding first based on the mapping relations set between geographical location and encryption parameter information
Encryption parameter information.
For example, by taking the first encryption parameter information includes encryption intensity as an example, reference table 5 and table 7 can be looked by above table
Ask corresponding encryption intensity.
It for another example, can be with when include height above sea level, the first encryption parameter information including encrypted object with geographical location information
Corresponding encrypted object is obtained based on the mapping relations between height above sea level section and encrypted object.It is as shown in the table:
Height above sea level range | Encrypted object |
1-500m | Object a |
500-1000m | Object b |
1000-2000m | Object c |
Table 10
If height above sea level locating for present terminal can learn that current encrypted object is pair by table 10 when being 455m
As a.
S303, terminal determine corresponding second encryption parameter information according to the usage behavior information.
The timing of step S302 and S302 are unrestricted, also successively execute, also may be performed simultaneously.
Wherein, the second encryption parameter information may include the encryption parameters such as encryption intensity, encrypted object, encryption key.The
One encryption parameter information can belong to the encryption parameter of same type with the second encryption parameter information.For example, the first encryption parameter
Information and the second encryption parameter information are encryption intensity or encryption key etc..First encryption parameter information can also be with
Two encryption parameter informations belong to different types of encryption parameter.For example, the first encryption parameter information is encryption intensity, the second encryption
Parameter information can be encrypted object etc..
In the present embodiment second can be obtained with mapping relations set between Behavior-based control information and encryption parameter information
Encryption parameter information.For example encryption intensity, encrypted object or encryption key can be obtained with reference table 6,8,9.
Using the second encryption parameter information as encryption intensity, usage behavior information is that user shakes for the frequency of terminal, can
To obtain required encryption intensity based on the mapping relations set between frequency separation and encryption intensity.For example, such as following table institute
Show:
Shake frequency | Encryption intensity |
1-5 times | Encryption intensity 1 |
5-10 times | Encryption intensity 2 |
10-m times | Encryption intensity 3 |
Table 11
With reference to Fig. 3, when user shakes terminal, if shake frequency is 6 or 8 times, encryption intensity can be determined for encryption
Intensity 2.
S304, terminal obtain required target according to first encryption parameter information and second encryption parameter information and encrypt
Algorithm.
Specifically, first encryption parameter information and the second encryption parameter information are the encryption parameter information of not same type
When, the available Encryption Algorithm with the first encryption parameter information and the second parameter information.
For example, be encrypted object in the first encryption parameter information, and when encrypted object is a, the second encryption parameter information be
Encryption intensity, and encryption intensity is 128bits, then can obtain at this time, an encrypted object is a, encryption intensity is
The Encryption Algorithm of 128bits.
It wherein, can be with according to the mode that the first encryption parameter information and the second encryption parameter information obtain target Encryption Algorithm
There are many, for example, can the respective encrypted parameter information to current crypto algorithm be modified, obtain target Encryption Algorithm;Example
Such as, the encryption intensity of current crypto algorithm be 128bits, encrypted object a, if the first encryption parameter information is that encryption is strong
Degree, and encryption intensity is 192bits, the second encryption parameter is encrypted object, and when encrypted object is c, then can will be current
The encryption intensity of Encryption Algorithm is changed to 192bits by 128bits, and the encrypted object of current crypto algorithm is changed to c by a.
S305, when the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical, terminal is according to the target
Encryption Algorithm is treated encryption information and is encrypted.
From the foregoing, it will be observed that the embodiment of the present invention is using the usage behavior letter for obtaining terminal current geographical location information and user
Breath, then, determines the first encryption parameter information according to the geographical location information, determines corresponding the according to the usage behavior information
Two encryption parameter informations, the target Encryption Algorithm needed for being obtained according to first and second encryption parameter information, when the target adds
When the Encryption Algorithm of close algorithm and current crypto algorithm is not identical, encryption information is treated according to the target Encryption Algorithm and is added
It is close;The program can dynamically change Encryption Algorithm based on the current geographical location information of terminal and usage behavior information, with right
Information is encrypted, avoid and encrypted using fixed-encryption algorithm, it is thus possible to improve the safety and terminal of information
Performance.
In addition, include encryption intensity in encryption parameter information, and when changing the encryption intensity of current crypto algorithm, due to only
Change encryption intensity and do not change Encryption Algorithm itself, therefore, the solution confidential information (such as password, finger print information) needed for decryption is
It remains unchanged, avoids the need for change solution confidential information, facilitate user's fast decryption, improve decryption speed.
In a preferred embodiment, the embodiment of the invention also provides another information ciphering method, embodiment will be with
Information encryption device is integrated in for terminal to be described in detail information ciphering method.
Fig. 7 is please referred to, for the flow chart for the information ciphering method that this preferred embodiment provides.Below to this preferred embodiment
Each step of information ciphering method be described in detail.
S401, terminal obtain the usage behavior information of current geographical location information and user.
Wherein, geographical location information may include: the height above sea level etc. that the place that is presently in of terminal, terminal are presently in.
In practical application, can activity trajectory according to user or position, place is divided into office space, life field
Institute, public place of entertainment, common place etc..
Wherein, the usage behavior information of user may include: the behavioural information applied in user's using terminal;For example, with
Family to using number, frequency, user using the type of application, user using application Apply Names etc..
In addition, the usage behavior information can also include user to the operation information of terminal, for example the operation information can be with
Including shake operation information (such as the shaking direction of terminal shakes number, shake frequency), moving operation information (terminal
Moving direction, moving distance etc.), slide information (such as glide direction, sliding distance, sliding position on terminal screen
Deng), the pressing operation information (such as pressing dynamics information, compression number) to terminal, rotation process information (as rotation angle,
Direction of rotation etc.) etc..
S402, terminal determine corresponding Encryption Algorithm according to the geographical location information.
Specifically, it can determine that corresponding encryption is calculated according to position algorithm mapping relations set and the geographical location information
Method, the position algorithm mapping relations set may include the mapping relations between geographical location information and Encryption Algorithm.
It is as shown in the table:
Geographical location | Encryption Algorithm |
Position 1 | Encryption Algorithm 2 |
Position 2 | Encryption Algorithm 3 |
Position 3 | Encryption Algorithm 4 |
Position 4 | Encryption Algorithm 5 |
Position 5 | Encryption Algorithm 1 |
Position 6 | Encryption Algorithm 3 |
Position n | Encryption Algorithm 1 |
Table 12
When user terminal is in position 5, it can determine that Encryption Algorithm is Encryption Algorithm 1 by table 12.
For example, by taking geographical location information includes place as an example, it is as shown in the table:
Geographical location | Encryption Algorithm |
Office space | Encryption Algorithm 2 |
Public place of entertainment | Encryption Algorithm 3 |
Life area | Encryption Algorithm 4 |
Common place | Encryption Algorithm 5 |
Table 13
If user is currently at life area, it can determine that Encryption Algorithm is Encryption Algorithm 4.
S403, terminal are modified encryption parameter information corresponding in the Encryption Algorithm according to the usage behavior information,
Obtain target Encryption Algorithm.
Wherein, encryption parameter information may include the encryption ginseng of the Encryption Algorithm such as encryption intensity, encryption key, encrypted object
Number.It can set according to actual needs.
In the present embodiment, can be had according to the mode that usage behavior information changes the encryption parameter information of Encryption Algorithm more
Kind, for example, the corresponding target encryption parameter information of usage behavior information can be obtained first, then, believed according to target encryption parameter
Breath is modified encryption parameter information corresponding in Encryption Algorithm.
Wherein it is possible to which the mapping relations between Behavior-based control information and encryption parameter are corresponding to obtain usage behavior information
Target encryption parameter information.For example, can be obtained respectively with reference to above table 6,8,9 encryption intensity, encrypted object, encryption it is close
Key.
For example, when user moves horizontally terminal, can determine that encryption key is key a with reference to Fig. 8.
For example, determine terminal be presently in the corresponding Encryption Algorithm in place be Encryption Algorithm 2 after, it is available with make
It is key b with the corresponding key of behavioural information, it is then possible to which the key b of Encryption Algorithm 2 is changed to key a.
S404, when the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical, terminal is according to the target
Encryption Algorithm is treated encryption information and is encrypted.
From the foregoing, it will be observed that the embodiment of the present invention is using the usage behavior letter for obtaining terminal current geographical location information and user
Breath, then, determines corresponding Encryption Algorithm according to the geographical location information, according to the usage behavior information to the phase of Encryption Algorithm
It answers parameter information to change, obtains target Encryption Algorithm, when the Encryption Algorithm not phase of the target Encryption Algorithm and current crypto algorithm
Meanwhile encryption information is treated according to the target Encryption Algorithm and is encrypted;The program can be current based on terminal geographical location
Information and usage behavior information dynamically change Encryption Algorithm, to encrypt to information, avoid using fixed-encryption algorithm
It is encrypted, it is thus possible to improve the safety of information and the performance of terminal.
In a preferred embodiment, the embodiment of the invention also provides another information ciphering method, embodiment will be with
Information encryption device is integrated in for terminal to be described in detail information ciphering method.
Fig. 9 is please referred to, for the flow chart for the information ciphering method that this preferred embodiment provides.Below to this preferred embodiment
Each step of information ciphering method be described in detail.
S501, terminal obtain the usage behavior information of current geographical location information and user.
Wherein, geographical location information may include: the height above sea level etc. that the place that is presently in of terminal, terminal are presently in.
In practical application, can activity trajectory according to user or position, place is divided into office space, life field
Institute, public place of entertainment, common place etc..
Wherein, the usage behavior information of user may include: the behavioural information applied in user's using terminal;For example, with
Family to using number, frequency, user using the type of application, user using application Apply Names etc..
In addition, the usage behavior information can also include user to the operation information of terminal, for example the operation information can be with
Including shake operation information (such as the shaking direction of terminal shakes number, shake frequency), moving operation information (terminal
Moving direction, moving distance etc.), slide information (such as glide direction, sliding distance, sliding position on terminal screen
Deng), the pressing operation information (such as pressing dynamics information, compression number) to terminal, rotation process information (as rotation angle,
Direction of rotation etc.) etc..
S502, terminal determine corresponding Encryption Algorithm according to the usage behavior information.
Specifically, it can determine that corresponding encryption is calculated according to position algorithm mapping relations set and the geographical location information
Method, the position algorithm mapping relations set may include the mapping relations between usage behavior and Encryption Algorithm.It is as shown in the table:
Usage behavior 1 | Encryption Algorithm 2 |
Usage behavior 2 | Encryption Algorithm 3 |
Usage behavior n | Encryption Algorithm 4 |
Table 14
When usage behavior is usage behavior 4, it can determine that Encryption Algorithm is Encryption Algorithm 5 by table 14.
For example, by taking the application type for using behavioural information to use for user as an example, it is as shown in the table:
Entertainment applications | Encryption Algorithm 2 |
Social application | Encryption Algorithm 3 |
Document application | Encryption Algorithm 4 |
Table 15
If when the currently used entertainment applications of user, can determine that Encryption Algorithm is Encryption Algorithm 2.
For another example, it when usage behavior information includes operation information of the user to terminal, is as follows:
Operation | Encryption Algorithm |
Rock from side to side terminal | Encryption Algorithm 1 |
Move horizontally terminal | Encryption Algorithm 2 |
Move up terminal | Encryption Algorithm 3 |
Moving in rotation terminal | Encryption Algorithm 4 |
Rock from side to side terminal | Encryption Algorithm 5 |
Move down terminal | Encryption Algorithm 6 |
Move horizontally terminal | Encryption Algorithm 3 |
Table 16
With reference to Figure 10, when user moves up terminal, it can determine that Encryption Algorithm is Encryption Algorithm 3 by table 16.
S503, terminal are modified encryption parameter information corresponding in the Encryption Algorithm according to the geographical location information,
Obtain target Encryption Algorithm.
Wherein, encryption parameter information may include the encryption ginseng of the Encryption Algorithm such as encryption intensity, encryption key, encrypted object
Number.It can set according to actual needs.
In the present embodiment, can be had according to the mode that geographical location information changes the encryption parameter information of Encryption Algorithm more
Kind, for example, the corresponding target encryption parameter information of geographical location information can be obtained first, then, believed according to target encryption parameter
Breath is modified encryption parameter information corresponding in Encryption Algorithm.
Wherein it is possible to obtain usage behavior information pair based on the mapping relations between geographical location information and encryption parameter
The target encryption parameter information answered.For example, encryption intensity, encrypted object can be obtained respectively with reference to above table 5,7,10.
For example, can determine that the close intensity of encryption is 256bits when user is in office space.
For example, after determining that the corresponding Encryption Algorithm of the currently used behavioural information of terminal is Encryption Algorithm 3, it is available
Encryption intensity corresponding with geographical location information is 256bits, it is then possible to which the encryption intensity of Encryption Algorithm 3 is changed to
256bits。
S504, when the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical, terminal is according to the target
Encryption Algorithm is treated encryption information and is encrypted.
From the foregoing, it will be observed that the embodiment of the present invention is using the usage behavior letter for obtaining terminal current geographical location information and user
Breath, then, determines corresponding Encryption Algorithm according to the usage behavior information, according to the geographical location information to the phase of Encryption Algorithm
It answers parameter information to change, obtains target Encryption Algorithm, when the Encryption Algorithm not phase of the target Encryption Algorithm and current crypto algorithm
Meanwhile encryption information is treated according to the target Encryption Algorithm and is encrypted;The program can be current based on terminal geographical location
Information and usage behavior information dynamically change Encryption Algorithm, to encrypt to information, avoid using fixed-encryption algorithm
It is encrypted, it is thus possible to improve the safety of information and the performance of terminal.
For example, when encryption parameter information is encryption intensity, when target encryption intensity is higher than current crypto intensity (as currently
In secret place, and user is writing document) when, then it is assumed that encryption intensity is inadequate at this time, information can be improved and add
Close encryption intensity, it is thus possible to improve the safety of information.
For another example, when encryption parameter information is encryption intensity, when target encryption intensity (is such as worked as lower than current crypto intensity
It is preceding to be in common place, and user is playing game) when, then it is assumed that encryption intensity is excessively high at this time, it is likely to affect
Therefore the performance of terminal can reduce the encryption intensity of information encryption, can promote the performance of terminal.
In addition, include encryption intensity in encryption parameter information, and when changing the encryption intensity of current crypto algorithm, due to only
Change encryption intensity and do not change Encryption Algorithm itself, therefore, the solution confidential information (such as password, finger print information) needed for decryption is
It remains unchanged, avoids the need for change solution confidential information, facilitate user's fast decryption, improve decryption speed.
Figure 11 is please referred to, for the flow chart for another information ciphering method that this preferred embodiment provides.It is preferred to this below
Each step of the information ciphering method of embodiment is described in detail.
S601, terminal obtain the usage behavior information of current geographical location information and user.
Wherein, geographical location information may include: the height above sea level etc. that the place that is presently in of terminal, terminal are presently in.
In practical application, can activity trajectory according to user or position, place is divided into office space, life field
Institute, public place of entertainment, common place etc..
Wherein, the usage behavior information of user may include: the behavioural information applied in user's using terminal;For example, with
Family to using number, frequency, user using the type of application, user using application Apply Names etc..
In addition, the usage behavior information can also include user to the operation information of terminal, for example the operation information can be with
Including shake operation information (such as the shaking direction of terminal shakes number, shake frequency), moving operation information (terminal
Moving direction, moving distance etc.), slide information (such as glide direction, sliding distance, sliding position on terminal screen
Deng), the pressing operation information (such as pressing dynamics information, compression number) to terminal, rotation process information (as rotation angle,
Direction of rotation etc.) etc..
S602, terminal determine corresponding first Encryption Algorithm according to the geographical location information.
Specifically, it can determine that corresponding encryption is calculated according to position algorithm mapping relations set and the geographical location information
Method, the position algorithm mapping relations set may include the mapping relations between geographical location information and Encryption Algorithm.For example join
Table 12 and 13 is examined, corresponding Encryption Algorithm can be inquired from table 12 and 13.
S603, terminal determine corresponding second Encryption Algorithm according to the usage behavior information.
Specifically, it can determine that corresponding second adds according to behavior Algorithm mapping set of relationship and the usage behavior information
Close algorithm, behavior Algorithm mapping set of relationship may include the mapping relations between usage behavior information and Encryption Algorithm.
For example, reference table 14,15 and 16, can pass through the corresponding Encryption Algorithm of these table lookups.
S604, terminal obtain required target Encryption Algorithm according to first Encryption Algorithm and second Encryption Algorithm.
Specifically, terminal adds corresponding first encryption intensity corresponding with the second Encryption Algorithm second of the first Encryption Algorithm
Close intensity compares, and obtains comparing result;Then, it is calculated according to the comparing result from first Encryption Algorithm and second encryption
Required target Encryption Algorithm is chosen in method.
In practical application, it can choose that encryption intensity is higher or lower Encryption Algorithm is as target Encryption Algorithm,
It can specifically set according to actual needs.
For example, the corresponding Encryption Algorithm 3 in geographical location, the corresponding Encryption Algorithm 4 of usage behavior, at this point it is possible to will encryption
The encryption intensity of algorithm 3 and the encryption intensity of Encryption Algorithm 4 compare, if the encryption intensity of Encryption Algorithm 3 is higher than encryption and calculates
Method 4, at this point it is possible to which choosing Encryption Algorithm 3 is target Encryption Algorithm.
In some embodiments, Encryption Algorithm 4 can also be chosen and be used as target Encryption Algorithm.
S605, when the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical, terminal is according to the target
Encryption Algorithm is treated encryption information and is encrypted.
From the foregoing, it will be observed that the embodiment of the present invention is using the usage behavior letter for obtaining terminal current geographical location information and user
Breath, then, determines corresponding first Encryption Algorithm according to the geographical location information, is determined according to the usage behavior information corresponding
Second Encryption Algorithm obtains target Encryption Algorithm according to the first and second Encryption Algorithm, when the target Encryption Algorithm adds with current
When the Encryption Algorithm of close algorithm is not identical, encryption information is treated according to the target Encryption Algorithm and is encrypted;The program can be with base
Encryption Algorithm is dynamically changed in the current geographical location information of terminal and usage behavior information, to be encrypted to information, is kept away
Exempt to be encrypted using fixed-encryption algorithm, it is thus possible to improve the safety of information and the performance of terminal.
In a preferred embodiment, a kind of information encryption device is additionally provided, which specifically can integrate
In the terminal, which specifically can be the equipment such as smart phone, tablet computer.With reference to Figure 12, which can be with
Include: information acquisition unit 701, algorithm acquiring unit 702 and algorithm acquiring unit 703, be described in detail below:
Information acquisition unit 701, for obtaining the usage behavior information of the current geographical location information of terminal and user;
Algorithm acquiring unit 702 obtains required mesh for root according to the geographical location information and the usage behavior information
Mark Encryption Algorithm;
Encryption unit 703, when not identical for the Encryption Algorithm when the target Encryption Algorithm and current crypto algorithm, according to
The target Encryption Algorithm is treated encryption information and is encrypted.
Optionally, with reference to Figure 13, wherein algorithm acquiring unit 702 may include:
Parameter acquisition subelement 7021, for determining corresponding add according to the geographical location information and the usage behavior information
Close parameter information;
Algorithm obtains subelement 7022, for the target Encryption Algorithm needed for being obtained according to the encryption parameter information.
Optionally, with reference to Figure 14, wherein algorithm acquiring unit 702 may include:
First parameter obtains subelement 7023, for determining that corresponding first encryption parameter is believed according to the geographical location information
Breath;
Second parameter obtains subelement 7024, for determining that corresponding second encryption parameter is believed according to the usage behavior information
Breath;
Algorithm obtains subelement 7025, for being obtained according to first encryption parameter information and second encryption parameter information
Required target Encryption Algorithm.
Wherein, algorithm obtains subelement 7025 and can be used for: being joined according to first encryption parameter information and second encryption
Number information is modified encryption parameter corresponding in current crypto algorithm, obtains target Encryption Algorithm.
Optionally, with reference to Figure 15, wherein algorithm acquiring unit 702 may include:
First algorithm obtains subelement 7026, for determining corresponding Encryption Algorithm according to the geographical location information;
Second algorithm obtains subelement 7027, for according to the usage behavior information to being encrypted accordingly in the Encryption Algorithm
Parameter information is modified, and obtains target Encryption Algorithm.
Optionally, with reference to Figure 16, wherein algorithm acquiring unit 702 may include:
Third algorithm obtains subelement 7028, for determining corresponding Encryption Algorithm according to the usage behavior information;
4th algorithm obtains subelement 7029, for according to the geographical location information to being encrypted accordingly in the Encryption Algorithm
Parameter information is modified, and obtains target Encryption Algorithm.
Optionally, with reference to Figure 17, wherein algorithm acquiring unit 702 may include:
5th algorithm obtains subelement 7030, for determining corresponding first Encryption Algorithm according to the geographical location information;
6th algorithm obtains subelement 7031, for determining corresponding second Encryption Algorithm according to the usage behavior information;
7th algorithm obtains subelement 7032, needed for being obtained according to first Encryption Algorithm and second Encryption Algorithm
Target Encryption Algorithm.
Wherein, the 7th algorithm obtains subelement 7032, is specifically used for:
Corresponding first encryption intensity of first Encryption Algorithm the second encryption intensity corresponding with the second Encryption Algorithm is carried out
Comparison, obtains comparing result;
Required target encryption is chosen from first Encryption Algorithm and second Encryption Algorithm according to the comparing result to calculate
Method.
When it is implemented, above each unit can be used as independent entity to realize, any combination can also be carried out, is made
It is realized for same or several entities, the specific implementation of above each unit can be found in the embodiment of the method for front, herein not
It repeats again.
From the foregoing, it will be observed that the embodiment of the present invention using information acquisition unit 701 obtain the current geographical location information of terminal and
Then the usage behavior information of user is believed by algorithm acquiring unit 702 according to the geographical location information and the usage behavior
Breath obtains required target Encryption Algorithm, when the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical,
Encryption information is treated according to the target Encryption Algorithm by encryption unit 703 to be encrypted;The program can be current based on terminal
Geographical location information and usage behavior information dynamically change Encryption Algorithm, to be encrypted to information, avoid using solid
Determine Encryption Algorithm to be encrypted, it is thus possible to improve the safety of information and the performance of terminal.
In a preferred embodiment, a kind of terminal is additionally provided, for example, please referring to Figure 18, which may include penetrating
Frequently (RF, Radio Frequency) circuit 801, include one or more the memory of computer readable storage medium
802, input unit 803, display unit 804, sensor 805, voicefrequency circuit 806, Wireless Fidelity (WiFi, Wireless
Fidelity) module 807, the processor 808 and the components such as power supply 809 that include one or more than one processing core.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Figure 18, may include than figure
Show more or fewer components, perhaps combines certain components or different component layouts.
Radio circuit 801 can be used for receiving and sending messages or communication process in signal send and receive, particularly, by base station
Downlink information receive after, transfer to one or more than one processor 808 processing;In addition, the data for being related to uplink are sent
To base station.Memory 802 can be used for storing software program and module.Processor 808 is stored in memory 802 by operation
Software program and module, thereby executing various function application and data processing.In addition, memory 802 may include high speed
Random access memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or
Other volatile solid-state parts.Correspondingly, memory 802 can also include Memory Controller, to provide processor 808
Access with input unit 803 to memory 802.
Input unit 803 can be used for receiving the number or character information of input, and generate and user setting and function
Control related keyboard, mouse, operating stick, optics or trackball signal input.Specifically, in a specific embodiment
In, input unit 803 may include touch sensitive surface and other input equipments.Specifically, other input equipments may include but not
It is limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick, fingerprint recognition
One of mould group etc. is a variety of.
Display unit 804 can be used for showing information input by user or be supplied to user information and terminal it is various
Graphical user interface, these graphical user interface can be made of figure, text, icon, video and any combination thereof.
Terminal may also include at least one sensor 805, such as optical sensor, motion sensor and other sensors.
Voicefrequency circuit 806 can provide the audio interface between user and terminal by loudspeaker, microphone.
Processor 808 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to
It crosses operation or executes the software program and/or module being stored in memory 802, and call and be stored in memory 802
Data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Optionally, processor 808 can wrap
Include one or more processing cores;Preferably, processor 808 can integrate application processor and modem processor, wherein answer
With the main processing operation system of processor, user interface and target application etc., modem processor mainly handles wireless communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 808.
Terminal further includes the power supply 809 (such as battery) powered to all parts.Although being not shown, terminal can also Bao Lan
Tooth module, camera etc., details are not described herein.
In the present embodiment, the processor 808 in terminal can be according to following instruction, by one or more application
The corresponding executable file of the process of program is loaded into memory 802, and is stored in memory by processor 808 to run
Application program in 802, to realize various functions:
The usage behavior information for obtaining terminal current geographical location information and user, then, according to the geographical location
Target Encryption Algorithm needed for information and the usage behavior acquisition of information, when the target Encryption Algorithm and current crypto algorithm
Encryption Algorithm it is not identical when, encryption information is treated according to the target Encryption Algorithm and is encrypted.
From the foregoing, it will be observed that the embodiment of the present invention is using the usage behavior letter for obtaining terminal current geographical location information and user
Breath, then, according to target Encryption Algorithm needed for the geographical location information and the usage behavior acquisition of information, when the mesh
Mark Encryption Algorithm and current crypto algorithm Encryption Algorithm it is not identical when, according to the target Encryption Algorithm treat encryption information into
Row encryption;The program can dynamically change Encryption Algorithm based on the current geographical location information of terminal and usage behavior information,
It to be encrypted to information, avoids and is encrypted using fixed-encryption algorithm, it is thus possible to improve safety and the end of information
The performance at end.
It should be noted that those of ordinary skill in the art will appreciate that whole in the various methods of above-described embodiment or
Part steps are relevant hardware can be instructed to complete by program, which can store in computer-readable storage medium
It in matter, is such as stored in the memory of terminal, and is executed by least one processor in the terminal, can be wrapped in the process of implementation
Include the process of the embodiment such as information issuing method.Wherein, storage medium may include: read-only memory (ROM, Read Only
Memory), random access memory (RAM, Random Access Memory), disk or CD etc..
A kind of information ciphering method provided in an embodiment of the present invention, device and terminal are described in detail above,
Each functional module can integrate in a processing chip, is also possible to modules and physically exists alone, can also two or
More than two modules are integrated in a module.Above-mentioned integrated module both can take the form of hardware realization, can also adopt
It is realized with the form of software function module.Specific case used herein explains the principle of the present invention and embodiment
It states, the above description of the embodiment is only used to help understand the method for the present invention and its core ideas;Meanwhile for this field
Technical staff, according to the thought of the present invention, there will be changes in the specific implementation manner and application range, in conclusion
The contents of this specification are not to be construed as limiting the invention.
Claims (14)
1. a kind of information ciphering method characterized by comprising
The usage behavior information of terminal current geographical location information and user is obtained, the geographical location information includes that terminal is worked as
Preceding locating place, the usage behavior information includes the behavioural information applied in user's using terminal;
According to the geographical location information and the usage behavior information, required target Encryption Algorithm is obtained;
It is described according to the geographical location information and the usage behavior information, obtain required target Encryption Algorithm, comprising: root
Corresponding encryption parameter information, the parameter are determined according to parameter mapping relations set, geographical location information and usage behavior information
Mapping relations set includes that the mapping between preset geographical position information, default usage behavior information and predetermined encryption parameter is closed
System;
Target Encryption Algorithm needed for being obtained according to the encryption parameter information;
When the target Encryption Algorithm and current Encryption Algorithm be not identical, according to the target Encryption Algorithm to letter to be encrypted
Breath is encrypted.
2. information ciphering method as described in claim 1, which is characterized in that according to the geographical location information and the use
Behavioural information obtains required target Encryption Algorithm, comprising:
Corresponding first encryption parameter information is determined according to the geographical location information;
Corresponding second encryption parameter information is determined according to the usage behavior information;
Target Encryption Algorithm needed for being obtained according to first encryption parameter information and second encryption parameter information.
3. information ciphering method as claimed in claim 2, which is characterized in that according to first encryption parameter information and described
Second encryption parameter information obtains required target Encryption Algorithm, comprising:
According to first encryption parameter information and second encryption parameter information to being encrypted accordingly in current crypto algorithm
Parameter is modified, and obtains target Encryption Algorithm.
4. information ciphering method as described in claim 1, which is characterized in that according to the geographical location information and the use
Behavioural information obtains required target Encryption Algorithm, comprising:
Corresponding Encryption Algorithm is determined according to the geographical location information;
Encryption parameter information corresponding in the Encryption Algorithm is modified according to the usage behavior information, target is obtained and adds
Close algorithm.
5. information ciphering method as described in claim 1, which is characterized in that according to the geographical location information and the use
Behavioural information obtains required target Encryption Algorithm, comprising:
Corresponding Encryption Algorithm is determined according to the usage behavior information;
Encryption parameter information corresponding in the Encryption Algorithm is modified according to the geographical location information, target is obtained and adds
Close algorithm.
6. information ciphering method as described in claim 1, which is characterized in that according to the geographical location information and the use
Behavioural information obtains required target Encryption Algorithm, comprising:
Corresponding first Encryption Algorithm is determined according to the geographical location information;
Corresponding second Encryption Algorithm is determined according to the usage behavior information;
Target Encryption Algorithm needed for being obtained according to first Encryption Algorithm and second Encryption Algorithm.
7. information ciphering method as claimed in claim 6, which is characterized in that according to first Encryption Algorithm and described second
Encryption Algorithm obtains required target Encryption Algorithm, comprising:
Corresponding first encryption intensity of first Encryption Algorithm the second encryption intensity corresponding with the second Encryption Algorithm is compared,
Obtain comparing result;
Required target encryption is chosen from first Encryption Algorithm and second Encryption Algorithm according to the comparing result
Algorithm.
8. a kind of information encryption device characterized by comprising
Information acquisition unit, for obtaining the usage behavior information of the current geographical location information of terminal and user, the geography
Location information includes the place that terminal is presently in, and the usage behavior information includes the behavior letter applied in user's using terminal
Breath;
Algorithm acquiring unit, for obtaining required target and adding according to the geographical location information and the usage behavior information
Close algorithm;
The algorithm acquiring unit, comprising:
Parameter obtains subelement, for determining phase according to parameter mapping relations set, geographical location information and usage behavior information
The encryption parameter information answered, the parameter mapping relations set include preset geographical position information, default usage behavior information with
And the mapping relations between predetermined encryption parameter;
Algorithm obtains subelement, for the target Encryption Algorithm needed for being obtained according to the encryption parameter information;
Encryption unit, for being encrypted according to the target when the target Encryption Algorithm and current Encryption Algorithm be not identical
Algorithm is treated encryption information and is encrypted.
9. information encryption device as claimed in claim 8, which is characterized in that the algorithm acquiring unit, comprising:
First parameter obtains subelement, for determining corresponding first encryption parameter information according to the geographical location information;
Second parameter obtains subelement, for determining corresponding second encryption parameter information according to the usage behavior information;
Algorithm obtains subelement, needed for being obtained according to first encryption parameter information and second encryption parameter information
Target Encryption Algorithm.
10. information encryption device as claimed in claim 8, which is characterized in that the algorithm acquiring unit, comprising:
First algorithm obtains subelement, for determining corresponding Encryption Algorithm according to the geographical location information;
Second algorithm obtains subelement, is used for according to the usage behavior information to corresponding encryption parameter in the Encryption Algorithm
Information is modified, and obtains target Encryption Algorithm.
11. information encryption device as claimed in claim 8, which is characterized in that the algorithm acquiring unit, comprising:
Third algorithm obtains subelement, for determining corresponding Encryption Algorithm according to the usage behavior information;
4th algorithm obtains subelement, is used for according to the geographical location information to corresponding encryption parameter in the Encryption Algorithm
Information is modified, and obtains target Encryption Algorithm.
12. information encryption device as claimed in claim 8, which is characterized in that the algorithm acquiring unit, comprising:
5th algorithm obtains subelement, for determining corresponding first Encryption Algorithm according to the geographical location information;
6th algorithm obtains subelement, for determining corresponding second Encryption Algorithm according to the usage behavior information;
7th algorithm obtains subelement, for the mesh needed for being obtained according to first Encryption Algorithm and second Encryption Algorithm
Mark Encryption Algorithm.
13. a kind of terminal characterized by comprising
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes as claim 1-7 is any
Information ciphering method described in.
14. a kind of storage medium, is stored with computer program, which is characterized in that the computer program is executed by processor
Shi Shixian the method as described in claim 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611085000.1A CN106534154B (en) | 2016-11-30 | 2016-11-30 | A kind of information ciphering method, device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611085000.1A CN106534154B (en) | 2016-11-30 | 2016-11-30 | A kind of information ciphering method, device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106534154A CN106534154A (en) | 2017-03-22 |
CN106534154B true CN106534154B (en) | 2019-09-13 |
Family
ID=58355397
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611085000.1A Expired - Fee Related CN106534154B (en) | 2016-11-30 | 2016-11-30 | A kind of information ciphering method, device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106534154B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107231292A (en) * | 2017-05-04 | 2017-10-03 | 金华芒果信息技术有限公司 | The encryption method of mobile data |
CN109787955B (en) * | 2018-12-12 | 2021-07-16 | 东软集团股份有限公司 | Information transmission method, device and storage medium |
CN111314063A (en) * | 2020-01-18 | 2020-06-19 | 大连交通大学 | Big data information management method, system and device based on Internet of things |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1992866A (en) * | 2005-12-26 | 2007-07-04 | 株式会社日立制作所 | Information processing method and information processing apparatus |
CN101174946A (en) * | 2006-10-30 | 2008-05-07 | 株式会社日立制作所 | Content transmiting device, conetent receiving deivce and content encrypting method |
CN101267297A (en) * | 2008-04-01 | 2008-09-17 | 华为技术有限公司 | An encryption implementation method and device in communication system |
CN102523565A (en) * | 2011-11-23 | 2012-06-27 | 宇龙计算机通信科技(深圳)有限公司 | Method, system and mobile communication terminal for encrypting and decrypting message data safely |
CN103733203A (en) * | 2011-06-13 | 2014-04-16 | 意法半导体亚太私人有限公司 | Delaying or deterring counterfeiting and/or cloning of a component |
CN105871842A (en) * | 2016-03-31 | 2016-08-17 | 宇龙计算机通信科技(深圳)有限公司 | Voice encryption and decryption methods, voice encryption and decryption devices and terminals |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010088199A2 (en) * | 2009-01-27 | 2010-08-05 | Watchguard Technologies, Inc. | Location-aware configuration |
-
2016
- 2016-11-30 CN CN201611085000.1A patent/CN106534154B/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1992866A (en) * | 2005-12-26 | 2007-07-04 | 株式会社日立制作所 | Information processing method and information processing apparatus |
CN101174946A (en) * | 2006-10-30 | 2008-05-07 | 株式会社日立制作所 | Content transmiting device, conetent receiving deivce and content encrypting method |
CN101267297A (en) * | 2008-04-01 | 2008-09-17 | 华为技术有限公司 | An encryption implementation method and device in communication system |
CN103733203A (en) * | 2011-06-13 | 2014-04-16 | 意法半导体亚太私人有限公司 | Delaying or deterring counterfeiting and/or cloning of a component |
CN102523565A (en) * | 2011-11-23 | 2012-06-27 | 宇龙计算机通信科技(深圳)有限公司 | Method, system and mobile communication terminal for encrypting and decrypting message data safely |
CN105871842A (en) * | 2016-03-31 | 2016-08-17 | 宇龙计算机通信科技(深圳)有限公司 | Voice encryption and decryption methods, voice encryption and decryption devices and terminals |
Also Published As
Publication number | Publication date |
---|---|
CN106534154A (en) | 2017-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107256555B (en) | Image processing method, device and storage medium | |
CN104821937B (en) | Token acquisition methods, apparatus and system | |
CN111600710B (en) | Key storage method, device, terminal, server and readable medium | |
KR102496392B1 (en) | Frequency domain information indication method of common control resource set of residual minimum system information | |
CN106534154B (en) | A kind of information ciphering method, device and terminal | |
CN113792278A (en) | Method and device for displaying application and picture and electronic equipment | |
CN104992120A (en) | Picture encryption method and mobile terminal | |
CN103065080A (en) | Application program login method and device | |
CN107590770A (en) | Image obscures encryption method, mobile terminal and storage medium | |
CN105681395A (en) | Resource sharing control method, device, server and terminal | |
CN104349320A (en) | Sharing method and electronic equipment | |
CN108681664A (en) | A kind of encryption method and device | |
CN103489025A (en) | Method and device for sending contact information | |
CN104700040A (en) | Authority control method and device | |
CN114553612B (en) | Data encryption and decryption method and device, storage medium and electronic equipment | |
CN106775217B (en) | A kind of application identities processing method, device and terminal | |
CN106127004B (en) | A kind of document handling method and terminal device | |
CN109840426B (en) | Encryption method, encryption device and electronic equipment | |
CN104615954B (en) | Password storage method and apparatus | |
CN115549889A (en) | Decryption method, related device and storage medium | |
CN115589281A (en) | Decryption method, related device and storage medium | |
CN114629649B (en) | Data processing method and device based on cloud computing and storage medium | |
CN114900325B (en) | Federal learning-based privacy set intersection method, system, equipment and medium | |
CN106228077A (en) | Process image and the display method of image, device and terminal | |
CN107831889A (en) | The method and mobile terminal that a kind of information is sent |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190913 |
|
CF01 | Termination of patent right due to non-payment of annual fee |