CN106534154B - A kind of information ciphering method, device and terminal - Google Patents

A kind of information ciphering method, device and terminal Download PDF

Info

Publication number
CN106534154B
CN106534154B CN201611085000.1A CN201611085000A CN106534154B CN 106534154 B CN106534154 B CN 106534154B CN 201611085000 A CN201611085000 A CN 201611085000A CN 106534154 B CN106534154 B CN 106534154B
Authority
CN
China
Prior art keywords
encryption
information
algorithm
encryption algorithm
geographical location
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201611085000.1A
Other languages
Chinese (zh)
Other versions
CN106534154A (en
Inventor
任利宽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201611085000.1A priority Critical patent/CN106534154B/en
Publication of CN106534154A publication Critical patent/CN106534154A/en
Application granted granted Critical
Publication of CN106534154B publication Critical patent/CN106534154B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of information ciphering method, device and terminals;The embodiment of the present invention is using the usage behavior information for obtaining terminal current geographical location information and user, then, according to target Encryption Algorithm needed for the geographical location information and the usage behavior acquisition of information, when the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical, encryption information is treated according to the target Encryption Algorithm and is encrypted;The safety of information and the performance of terminal can be improved in the program.

Description

A kind of information ciphering method, device and terminal
Technical field
The present invention relates to field of terminal technology, and in particular to a kind of information ciphering method, device and terminal.
Background technique
With the rapid development of mobile terminals, have become the indispensable a part of people's daily life.However intelligence The information security issue of the mobile terminals such as energy mobile phone, tablet computer is also gradually shown.For example, cell phone password is stolen, is a The stolen brush of related deposit etc. of e-bank after people's private data leakage, mobile phone are lost.
In order to improve the information security of mobile terminal, generally by the way of being encrypted to information, specifically use Fixed-encryption algorithm encrypts information.However, some problems can be brought by carrying out encryption using fixed-encryption algorithm, for example, When using the Encryption Algorithm of complex (such as encryption intensity for higher), the process of encryption or decryption can reduce mobile terminal Performance, for another example, when using relatively simple (such as encryption intensity is lower) Encryption Algorithm, due to Encryption Algorithm level of encryption not It is relatively low enough to will lead to information security.
Summary of the invention
The embodiment of the present invention provides a kind of information ciphering method, device and terminal, and safety and the end of information can be improved The performance at end.
The embodiment of the present invention provides a kind of information ciphering method, comprising:
Obtain the usage behavior information of terminal current geographical location information and user;
According to the geographical location information and the usage behavior information, required target Encryption Algorithm is obtained;
When the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical, encrypted and calculated according to the target Method is treated encryption information and is encrypted.
Correspondingly, the embodiment of the invention also provides a kind of information encryption devices, comprising:
Information acquisition unit, for obtaining the usage behavior information of the current geographical location information of terminal and user;
Algorithm acquiring unit obtains required for root according to the geographical location information and the usage behavior information Target Encryption Algorithm;
Encryption unit, when not identical for the Encryption Algorithm when the target Encryption Algorithm and current crypto algorithm, according to The target Encryption Algorithm is treated encryption information and is encrypted.
Correspondingly, the embodiment of the invention also provides a kind of terminals, comprising:
It is stored with the memory that can execute program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes such as the embodiment of the present invention Any information encryption method of offer.
The embodiment of the present invention is using the usage behavior information for obtaining terminal current geographical location information and user, then, According to target Encryption Algorithm needed for the geographical location information and the usage behavior acquisition of information, calculated when the target encrypts When method and the not identical Encryption Algorithm of current crypto algorithm, encryption information is treated according to the target Encryption Algorithm and is encrypted; The program can dynamically change Encryption Algorithm based on the current geographical location information of terminal and usage behavior information, to information It is encrypted, avoids and encrypted using fixed-encryption algorithm, it is thus possible to improve the safety of information and the property of terminal Energy.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is the first flow chart of information ciphering method provided in an embodiment of the present invention.
Fig. 2 is second of flow chart of information ciphering method provided in an embodiment of the present invention.
Fig. 3 is the schematic diagram that user provided in an embodiment of the present invention uses document to apply.
Fig. 4 is the schematic diagram that user provided in an embodiment of the present invention shakes terminal.
Fig. 5 is the schematic diagram that user provided in an embodiment of the present invention rotates terminal.
Fig. 6 is the third flow chart of information ciphering method provided in an embodiment of the present invention.
Fig. 7 is the 4th kind of flow chart of information ciphering method provided in an embodiment of the present invention.
Fig. 8 is the schematic diagram that user provided in an embodiment of the present invention moves horizontally terminal.
Fig. 9 is the 5th kind of flow chart of information ciphering method provided in an embodiment of the present invention.
Figure 10 is the schematic diagram that user provided in an embodiment of the present invention moves up mobile terminal.
Figure 11 is the 6th kind of flow chart of information ciphering method provided in an embodiment of the present invention.
Figure 12 is the first structural schematic diagram provided in an embodiment of the present invention.
Figure 13 is second of structural schematic diagram of information encryption device provided in an embodiment of the present invention.
Figure 14 is the third structural schematic diagram of information encryption device provided in an embodiment of the present invention.
Figure 15 is the 4th kind of structural schematic diagram of information encryption device provided in an embodiment of the present invention.
Figure 16 is the 5th kind of structural schematic diagram of information encryption device provided in an embodiment of the present invention.
Figure 17 is the 6th kind of structural schematic diagram of information encryption device provided in an embodiment of the present invention.
Figure 18 is the structural schematic diagram of terminal provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts Example, shall fall within the protection scope of the present invention.
Term " first ", " second ", " third " and " the 4th " in the present invention etc. be for distinguishing different objects, rather than It is used to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that cover non-exclusive Include.Such as contain a series of steps or units process, method, system, product or equipment be not limited to it is listed Step or unit, but optionally further comprising the step of not listing or unit, or optionally further comprising for these processes, side The intrinsic other step or units of method, product or equipment.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments Containing at least one embodiment of the present invention.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
The embodiment of the invention provides a kind of information ciphering method, device and terminals.It will be described in detail respectively below.
The executing subject of information ciphering method provided in an embodiment of the present invention can be information provided in an embodiment of the present invention Encryption device, being perhaps integrated with the terminal of the information encryption device information encryption device can be using hardware or software Mode is realized;Terminal described in the embodiment of the present invention can be smart phone (such as Android phone, Windows Phone hand Machine etc.), tablet computer, palm PC, laptop, mobile internet device (MID, Mobile Internet Devices) or the mobile devices such as wearable device, above-mentioned terminal are only citings, and non exhaustive, including but not limited to above-mentioned end End.
In a preferred embodiment, it will be described from the angle of information encryption device, which specifically may be used It is integrated in the form of software or hardware in the terminal, which can be the equipment such as smart phone, tablet computer.
Fig. 1 is please referred to, Fig. 1 is a kind of flow chart for information ciphering method that this preferred embodiment provides.It is excellent to this below Each step of the information ciphering method of embodiment is selected to be described in detail.
S101, the usage behavior information for obtaining terminal current geographical location information and user.
Wherein, usage behavior information refers to the behavioural information of user's using terminal.Behavior information may include user The behavioural information applied in using terminal, for example, the usage behavior information may include: user to using number, frequency Rate, user use Apply Names of application etc. using the type of application, user.
The usage behavior information can also include operation information of the user to terminal, which may include shaking behaviour Make information (shaking direction of such as terminal shakes number, shakes frequency), moving operation information (moving direction of terminal, shifting Dynamic distance etc.), the slide information (such as glide direction, sliding distance, sliding position) on terminal screen, terminal is pressed Press operation information (such as pressing dynamics information, compression number), rotation process information (such as rotation angle, direction of rotation) etc. Deng.
Wherein, geographical location information may include place locating for terminal, locating region (country, province, city, area etc.), Height above sea level of terminal etc..
In practical application, the current geographical location of terminal can be obtained by GPS, height sensor or its sensor and is believed Breath.For usage behavior information, it can be and user's usage behavior real-time monitoring is obtained in user's using terminal.
Specifically, can when needing to encrypt information (as encrypted to information using certain encryption intensity), Obtain terminal current geographical location information and usage behavior information.For example, can be encrypted to information such as picture, chat records When, obtain geographical location information and usage behavior information.
Wherein, obtain geographical location information and usage behavior information timing can there are many, for example, can obtain simultaneously It takes, can also successively obtain.
S102, according to the geographical location information and usage behavior information, determine required target Encryption Algorithm.
In the present embodiment determine Encryption Algorithm mode can there are many, it is as follows:
(1), an encryption parameter information is first determined according to geographical location and usage behavior information, then, is based on the encryption Parameter information obtains corresponding target Encryption Algorithm.
That is, step " according to target Encryption Algorithm needed for the geographical location information and the usage behavior acquisition of information " can To include:
Corresponding encryption parameter information is determined according to the geographical location information and the usage behavior information;
Target Encryption Algorithm needed for being obtained according to the encryption parameter information.
Wherein, encryption parameter information can for Encryption Algorithm to data encryption when required encryption parameter;The encryption parameter Information may include: encryption intensity, encrypted object, encryption key etc..
Wherein, encryption intensity can be logarithm according to the depth of encryption, depend on the data bits of encryption, i.e. encryption when institute Key length.Therefore, encryption intensity can be characterized with the data bits of encryption.Such as, AES (Advanced Encryption Standard, Advanced Encryption Standard) -128, encryption data digit is 128bits, and the encryption of the algorithm is strong Degree can be 128bits.
In the present embodiment according to geographical location and usage behavior information determine encryption parameter information mode can also have it is more Kind, such as:
An encryption parameter information can be obtained according to geographical location information, be encrypted according to usage behavior acquisition of information one Then parameter information obtains corresponding encryption parameter information according to the two encryption parameters.
Namely step " determining corresponding encryption parameter information according to the geographical location information and the usage behavior information " can To include:
Corresponding first encryption parameter information is determined according to the geographical location information;
Corresponding second encryption parameter information is determined according to the usage behavior information;
Corresponding encryption parameter information is obtained according to first encryption parameter information and second encryption parameter information.
Specifically, a geographic factor mapping relations set can be preset, which includes geographical location information and add Mapping relations between close parameter information, at this point it is possible to be obtained according to geographical location information and geographic factor mapping relations set Take corresponding first encryption parameter information;A behavioral parameters mapping relations set, the set packet can also equally be preset Usage behavior information and the direct mapping relations of encryption parameter information are included, can be reflected according to usage behavior information and behavior parameter Set of relationship is penetrated to obtain corresponding second encryption parameter information.
Wherein, the first encryption parameter information and the second encryption parameter information are the encryption parameter information of same type, for example, First encryption parameter information and the second encryption parameter information are encryption intensity or encrypted object information etc..
For example, determining that encryption intensity is 128bits according to geographical location information, determine that encryption is strong according to usage behavior information 256bits is spent, then at this point it is possible to an encryption intensity is chosen from the two encryption intensities, as chosen 128bits.
First encryption parameter information and the second encryption parameter information may be the encryption parameter information of not same type, For example, the first encryption parameter information is encryption intensity, the second encryption parameter information is encrypted object.At this point, according to the first encryption The encryption parameter information that parameter information and the second encryption parameter information obtain may include that the first encryption parameter information and second add Close parameter information.
For example, when the first encryption parameter information is encryption intensity, the second encryption parameter information is encryption key, the encryption Parameter information may include: encryption intensity and encryption key.
In the present embodiment after determining encryption parameter information, the target needed for being obtained according to encryption parameter information, which encrypts, to be calculated The mode of method can also there are many, for example, can be believed according to encryption parameter information the respective encrypted parameter of current crypto algorithm Breath is modified, and obtains target Encryption Algorithm.For another example, one and encryption parameter can be chosen from multiple candidate Encryption Algorithm The corresponding target Encryption Algorithm of information.
It, can be from default for example, when encryption parameter information is encryption intensity, and when determining that the encryption intensity is 192bits An Encryption Algorithm is chosen in algorithm set.Wherein, predetermined encryption algorithm set include a variety of encryption intensities it is corresponding plus Close algorithm, such as may include Encryption Algorithm D, 192bits of Encryption Algorithm C, 128bits of 128bit Encryption Algorithm C, The Encryption Algorithm D ... of Encryption Algorithm C, 256bits of Encryption Algorithm D, 2568bit of 192bits.If target encryption intensity For 192bits, then the encryption of Encryption Algorithm C or 192bits that encryption intensity is 192bits can be chosen from set at this time Algorithm D.
(2), an encryption parameter information is determined according to geographical location and usage behavior information respectively, then, based on this two A encryption parameter information obtains corresponding target Encryption Algorithm.
Namely step " according to target Encryption Algorithm needed for the geographical location information and the usage behavior acquisition of information " can To include:
Corresponding first encryption parameter information is determined according to the geographical location information;
Corresponding second encryption parameter information is determined according to the usage behavior information;
Target Encryption Algorithm needed for being obtained according to first encryption parameter information and second encryption parameter information.
Wherein, the first encryption parameter information and the second encryption parameter information are that the encryption parameter information of same type can also be with For different types of encryption parameter information.
(2-1), the first encryption parameter information and the second encryption parameter information belong to the encryption parameter of same type.For example, First encryption parameter information and the second encryption parameter information are encryption intensity or encrypted object information etc..
In 2-1, step " needed for being obtained according to first encryption parameter information and second encryption parameter information Target Encryption Algorithm " may include:
Corresponding target encryption parameter information is obtained according to first encryption parameter information and second encryption parameter information;
Target Encryption Algorithm needed for being obtained according to target encryption parameter information.
For example, determining that encryption intensity is 128bits according to geographical location information, determine that encryption is strong according to usage behavior information 256bits is spent, it, such as can be according to then at this point it is possible to obtain the target Encryption Algorithm of diminution according to the two encryption intensities An encryption intensity is chosen in default selection rule (choosing is big or selects small), target encryption corresponding with the encryption intensity is obtained and calculates Method.
Target Encryption Algorithm after determining target encryption parameter information, needed for being obtained according to target encryption parameter information Mode can also there are many, for example, can be according to target encryption parameter information to the respective encrypted parameter of current crypto algorithm Information is modified, and obtains target Encryption Algorithm.For another example, one can be chosen from multiple candidate Encryption Algorithm to join with encryption The corresponding target Encryption Algorithm of number information.
(2-2), first encryption parameter information and the second encryption parameter information may be the encryption ginseng of not same type Number information, for example, the first encryption parameter information is encryption intensity, the second encryption parameter information is encrypted object.At this point, according to One encryption parameter information and the second encryption parameter information obtain required target Encryption Algorithm.
For example, be encrypted object in the first encryption parameter information, and when encrypted object is a, the second encryption parameter information be Encryption intensity, and encryption intensity is 256bits, then can obtain at this time, an encrypted object is a, encryption intensity is The Encryption Algorithm of 256bits.
It for another example, is encryption intensity in the first encryption parameter information, and encryption intensity is 128bits, the second encryption parameter Information is encryption key, and encryption key is " 12345 ", then can obtain at this time an encryption intensity be 128bits and Encryption key is the Encryption Algorithm of " 12345 ".
It wherein, can be with according to the mode that the first encryption parameter information and the second encryption parameter information obtain target Encryption Algorithm There are many, for example, phase can be chosen from candidate Encryption Algorithm according to the first encryption parameter information and the second encryption parameter information The Encryption Algorithm answered, such as selection encryption intensity is 128bits from candidate algorithm set and encryption key is The Encryption Algorithm of " 12345 ".
For another example, can the respective encrypted parameter information to current crypto algorithm be modified, obtain target Encryption Algorithm; Namely step " the target Encryption Algorithm needed for being obtained according to first encryption parameter information and second encryption parameter information " can To include:
According to first encryption parameter information and second encryption parameter information to being encrypted accordingly in current crypto algorithm Parameter is modified, and obtains target Encryption Algorithm.
For example, the encryption intensity of current crypto algorithm is 128bits, encrypted object a, if the first encryption parameter information For encryption intensity, and encryption intensity is 192bits, and the second encryption parameter is encrypted object, and when encrypted object is c, then can The encryption intensity of current crypto algorithm is changed to 192bits by 128bits, by the encrypted object of current crypto algorithm by a It is changed to c.
(3), an Encryption Algorithm is first determined according to geographical location, then, based on usage behavior information to the Encryption Algorithm In corresponding encryption information be modified, obtain required target Encryption Algorithm.
It can be with " according to target Encryption Algorithm needed for the geographical location information and the usage behavior acquisition of information " that is, step Include:
Corresponding Encryption Algorithm is determined according to the geographical location information;
Encryption parameter information corresponding in the Encryption Algorithm is modified according to the usage behavior information, target is obtained and adds Close algorithm.
Specifically, it can determine that corresponding encryption is calculated according to position algorithm mapping relations set and the geographical location information Method, the position algorithm mapping relations set may include the mapping relations between geographical location information and Encryption Algorithm.
The geographical location information may include place, the height above sea level etc. that terminal is presently in.For example, obtaining place pair The corresponding Encryption Algorithm of Encryption Algorithm or height above sea level answered.Specifically, can according to the place that terminal is presently in, with And place Algorithm mapping set of relationship determines corresponding Encryption Algorithm, the place Algorithm mapping set of relationship include place with plus Mapping relations between close algorithm.
For example, determining that terminal is presently in the corresponding Encryption Algorithm in place is Encryption Algorithm 1, it is then possible to according to using Behavioural information, into change, obtains target Encryption Algorithm to encryption parameter corresponding in the Encryption Algorithm.
Wherein, it can be set according to actual needs according to the encryption parameter information that usage behavior information is changed, for example, can be with Encryption intensity, encryption key or encrypted object are modified.
For example, determining that terminal is presently in the corresponding Encryption Algorithm in place is Encryption Algorithm 2, it is then possible to according to using Behavioural information is modified the encryption intensity or encrypted object of the Encryption Algorithm 2.
In the present embodiment, can be had according to the mode that usage behavior information changes the encryption parameter information of Encryption Algorithm more Kind, for example, the corresponding target encryption parameter information of usage behavior information can be obtained first, then, believed according to target encryption parameter Breath is modified encryption parameter information corresponding in Encryption Algorithm.
For example, determine terminal be presently in the corresponding Encryption Algorithm in place be Encryption Algorithm 2 after, it is available with make It is 256bits with the corresponding encryption intensity of behavioural information, it is then possible to which the encryption intensity of Encryption Algorithm 2 is changed to 256bits.
(4), an Encryption Algorithm is first determined according to usage behavior, then, based on geographical location to phase in the Encryption Algorithm The encryption information answered is modified, and obtains required target Encryption Algorithm.
It can be with " according to target Encryption Algorithm needed for the geographical location information and the usage behavior acquisition of information " that is, step Include:
Corresponding Encryption Algorithm is determined according to the usage behavior information;
Encryption parameter information corresponding in the Encryption Algorithm is modified according to the geographical location information, target is obtained and adds Close algorithm.
Specifically, it can determine that corresponding encryption is calculated according to behavior Algorithm mapping set of relationship and the usage behavior information Method, behavior Algorithm mapping set of relationship may include the mapping relations between usage behavior information and Encryption Algorithm.
The usage behavior information may include behavior characteristic information (the use frequency of application applied in user's using terminal Rate, number, application type, Apply Names etc.), user is to operation information (moving operation information) of terminal etc..
For example, the corresponding Encryption Algorithm of available behavior characteristic information or the corresponding Encryption Algorithm of operation information etc. Deng.Specifically, can according to the behavior characteristic information and behavior Algorithm mapping set of relationship applied in user's using terminal come Determine that corresponding Encryption Algorithm, behavior Algorithm mapping set of relationship include the mapping between behavior characteristic information and Encryption Algorithm Relationship.
For example, determining that Encryption Algorithm corresponding to usage behavior information is Encryption Algorithm 1, it is then possible to according to geographical position Confidence breath, into change, obtains target Encryption Algorithm to encryption parameter corresponding in the Encryption Algorithm.
Wherein, it can be set according to actual needs according to the encryption parameter information that geographical location information is changed, for example, can be with Encryption intensity, encryption key or encrypted object are modified.
For example, determining that Encryption Algorithm corresponding to usage behavior information is Encryption Algorithm 3, it is then possible to according to geographical position Confidence breath is modified the encryption intensity or encrypted object of the Encryption Algorithm 3.
In the present embodiment, can be had according to the mode that geographical location information changes the encryption parameter information of Encryption Algorithm more Kind, for example, the corresponding target encryption parameter information of geographical location information can be obtained first, then, believed according to target encryption parameter Breath is modified encryption parameter information corresponding in Encryption Algorithm.
For example, determine Encryption Algorithm corresponding to usage behavior information be Encryption Algorithm 3 after, it is available with it is geographical The corresponding encrypted object of location information is c, it is then possible to which the encrypted object of Encryption Algorithm 3 is changed to c.
(5), an Encryption Algorithm is determined according to geographical location and usage behavior respectively, then, is calculated according to the two encryptions Method obtains required Encryption Algorithm.
That is, step " according to target Encryption Algorithm needed for the geographical location information and the usage behavior acquisition of information " can To include:
Corresponding first Encryption Algorithm is determined according to the geographical location information;
Corresponding second Encryption Algorithm is determined according to the usage behavior information;
Target Encryption Algorithm needed for being obtained according to first Encryption Algorithm and second Encryption Algorithm.
Specifically, it can determine that corresponding encryption is calculated according to position algorithm mapping relations set and the geographical location information Method, the position algorithm mapping relations set may include the mapping relations between geographical location information and Encryption Algorithm.
Specifically, it can determine that corresponding second adds according to behavior Algorithm mapping set of relationship and the usage behavior information Close algorithm, behavior Algorithm mapping set of relationship may include the mapping relations between usage behavior information and Encryption Algorithm.
In the present embodiment, mapping relations set can be set by the user, can also be by default.
103, it when the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical, is encrypted and is calculated according to the target Method is treated encryption information and is encrypted.
From the foregoing, it will be observed that the embodiment of the present invention is using the usage behavior letter for obtaining terminal current geographical location information and user Breath, then, according to the geographical location information and the usage behavior information, obtains required target Encryption Algorithm, when the target adds When the Encryption Algorithm of close algorithm and current crypto algorithm is not identical, encryption information is treated according to the target Encryption Algorithm and is added It is close;The program can dynamically change Encryption Algorithm based on the current geographical location information of terminal and usage behavior information, with right Information is encrypted, avoid and encrypted using fixed-encryption algorithm, it is thus possible to improve the safety and terminal of information Performance.
For example, when target Encryption Algorithm complexity be higher than current crypto Encryption Algorithm (be such as currently at secret place, and User is writing document) when, then it is assumed that the level of encryption of Encryption Algorithm is inadequate at this time, it is higher level of encryption can be replaced Encryption Algorithm, it is thus possible to improve the safety of information.
For another example, when the complexity of target Encryption Algorithm (is such as currently at common place, and uses lower than current crypto algorithm Playing game in family) when, then it is assumed that the complexity of Encryption Algorithm is excessively high at this time, it is likely to affect the performance of terminal, Therefore, the lower Encryption Algorithm of complexity can be replaced, the performance of terminal can be promoted.In a preferred embodiment, of the invention Embodiment additionally provides another information ciphering method, will come so that information encryption device is integrated in terminal as an example to letter in embodiment Encryption for information method is described in detail.
Referring to figure 2., the flow chart of the information ciphering method provided for this preferred embodiment.Below to this preferred embodiment Each step of information ciphering method be described in detail.
S201, terminal obtain the usage behavior information of current geographical location information and user.
Wherein, geographical location information may include: the height above sea level etc. that the place that is presently in of terminal, terminal are presently in.
In practical application, can activity trajectory according to user or position, place is divided into office space, life field Institute, public place of entertainment, common place etc..
Wherein, the usage behavior information of user may include: the behavioural information applied in user's using terminal;For example, with Family to using number, frequency, user using the type of application, user using application Apply Names etc..
In addition, the usage behavior information can also include user to the operation information of terminal, for example the operation information can be with Including shake operation information (such as the shaking direction of terminal shakes number, shake frequency), moving operation information (terminal Moving direction, moving distance etc.), slide information (such as glide direction, sliding distance, sliding position on terminal screen Deng), the pressing operation information (such as pressing dynamics information, compression number) to terminal, rotation process information (as rotation angle, Direction of rotation etc.) etc..
S202, terminal determine corresponding encryption parameter information according to the geographical location information and the usage behavior information.
Wherein, required encryption parameter when encryption parameter information can encrypt data for Encryption Algorithm;The encryption Parameter information may include: encryption intensity, encrypted object, encryption key etc..
According to geographical location and usage behavior determine encryption parameter information mode can there are many, it is as follows:
(1), encryption parameter information is determined based on mapping relations;
Specifically, it can be determined according to parameter mapping relations set, geographical location information and usage behavior information corresponding Encryption parameter information, the parameter mapping relations set include: preset geographical position information, default usage behavior information and preset Mapping relations between encryption parameter information.
The parameter mapping relations set can be presented in a tabular form, by taking encryption parameter information is encryption intensity as an example, such as Shown in following table:
Geographical location Usage behavior information Encryption intensity
Position 1 Usage behavior information 1 Encryption intensity 2
Position 2 Usage behavior information 2 Encryption intensity 3
Position 1 Usage behavior information 2 Encryption intensity 4
Position 3 Usage behavior information 3 Encryption intensity 5
Position 2 Usage behavior information 4 Encryption intensity 1
Position n Usage behavior information 5 Encryption intensity 3
Position 4 Usage behavior information n Encryption intensity 1
Table 1
Current institute can be searched in this table after obtaining geographical location and usage behavior information using above table The encryption intensity needed.
For example, using encryption parameter information as encryption intensity, geography information for place and usage behavior information is that user is current For the application type used.In the present embodiment, different encryption intensities can be used for different places.For example, can set Determine that office space is top-secret place, life area is secret place, common place is general secret place etc., namely office field Corresponding encryption intensity is greater than the encryption intensity of life area, and the encryption that the encryption intensity of life area is greater than common place is strong Degree.
It is as shown in the table:
Table 2
For example, when terminal be in public place of entertainment, and user at this time using document in application, generally security requirements are less Height, therefore it is 192bits that required encryption intensity can be obtained by table 2.
It can pass through with reference to Fig. 3 when terminal is in office space, and document application editor's document is used in user It is 256bits that table 2, which obtains current encryption intensity,.
For another example, using encryption parameter information as encryption intensity, geography information for place and usage behavior information is user couple For the operation information of terminal, the operation different for different places can use different encryption intensities.It is as shown in the table:
Table 3
With reference to Fig. 4, when user is in office space, and rock from side to side terminal when, pass through the available required encryption of table 3 Intensity is 256bits.
In practical applications, usage behavior information can also carry out the operation information of certain operation for user to terminal, than Such as, mobile moving direction, moving distance etc. are carried out to terminal.It include the mobile side of mobile terminal to use behavioural information It is as shown in the table to for, encryption parameter information is encrypted object, geographical location information is place:
Place Moving operation Encrypted object
Office space It moves up Object a
Office space It moves down Object a
Office space It moves right Object b
Public place of entertainment It moves up Object c
Public place of entertainment It is moved to the left Object c
Common place It moves right Object d
Common place It moves down Object f
Table 4
For example, can determine that encrypted object is object by table 4 when user is in public place of entertainment, moves down terminal c。
Same way, it is also possible to establish geographical location, shake mapping relations set between frequency and encryption parameter information, it is geographical Mapping relations set, etc. between position, rotation angle and encryption parameter information.
(2), corresponding first encryption parameter information is determined according to the geographical location information, it is true according to the usage behavior information Fixed corresponding second encryption parameter information obtains corresponding according to first encryption parameter information and second encryption parameter information Encryption parameter information.
(2-a), the first encryption parameter information and the second encryption parameter information are the encryption parameter information of same type.Than Such as, the first encryption parameter information and the second encryption parameter information are encryption intensity or encrypted object information etc..
Wherein it is possible to preset a geographic factor mapping relations set, which includes geographical location information and adds Mapping relations between close parameter information, at this point it is possible to be obtained according to geographical location information and geographic factor mapping relations set Take corresponding first encryption parameter information;A behavioral parameters mapping relations set, the set packet can also equally be preset Usage behavior information and the direct mapping relations of encryption parameter information are included, can be reflected according to usage behavior information and behavior parameter Set of relationship is penetrated to obtain corresponding second encryption parameter information.
It, can be according to (the choosing of default selection rule after obtaining the first encryption parameter information and the second encryption parameter information Greatly or select small) encryption parameter information is chosen from the two encryption parameter informations as target encryption parameter information.
The default selection rule can be set according to actual needs, for example, choosing the corresponding encryption parameter letter in geographical location Breath, or choose the corresponding encryption parameter information of usage behavior information etc..
For example, by taking the first encryption parameter information and the second encryption parameter information are encryption intensity as an example, it is as shown in the table:
Geographical location Encryption intensity
Position 1 Encryption intensity 2
Position 2 Encryption intensity 3
Position 3 Encryption intensity 4
Position 4 Encryption intensity 5
Position 5 Encryption intensity 1
Position n Encryption intensity 1
Table 5
Usage behavior information Encryption intensity
Usage behavior information 1 Encryption intensity 2
Usage behavior information 2 Encryption intensity 3
Usage behavior information 3 Encryption intensity 4
Usage behavior information 4 Encryption intensity 5
Usage behavior information 5 Encryption intensity 1
Usage behavior information 6 Encryption intensity 3
Usage behavior information n Encryption intensity 1
Table 6
When user is in position 1, it is encryption intensity 2 that required encryption intensity can be obtained by table 5.Work as usage behavior It is encryption intensity 3 that information can obtain required encryption intensity when being usage behavior information 6 by table 6, is added at this point it is possible to choose Close intensity 3 is used as target encryption intensity.
(2-b), the first encryption parameter information and the second encryption parameter information may be the encryption parameter of not same type Information.For example, the first encryption parameter information is encryption intensity, the second encryption parameter information is encrypted object.At this point, required adds Close parameter information may include the first encryption parameter information and the second encryption parameter information.
For example, when the first encryption parameter information is encryption intensity, the second encryption parameter information is encryption key, the encryption Parameter information may include: encryption intensity and encryption key.
Same first encryption parameter or the second encryption parameter can mapping relations set based on parameter and geographical location, The mapping relations set of parameter and usage behavior information obtains.Using the first encryption parameter information as encryption intensity, the second encryption ginseng For number information are encrypted object, geographical location information is place, usage behavior information is the currently used application type of user. It is as shown in the table:
Table 7
Use application Encrypted object
Document application Object a
Entertainment applications Object b
Social application Object c
Table 8
By table 7 and table 8 it is found that be in office space as user, and when entertainment applications are used, available encryption is by force Degree is 256bits, encrypted object b.
Using the first encryption parameter information as encryption intensity, the second encryption parameter information be encryption key, geography information is field Institute and usage behavior information be user to the operation information of terminal for, be as follows:
Operation Encryption key
Rock from side to side terminal Key a
Move horizontally terminal Key b
Vertically move terminal Key b
Moving in rotation terminal Key c
Rock from side to side terminal Key f
Vertically move terminal Key d
Move horizontally terminal Key a
Table 9
It is available by table 7 and table 9 it is found that when user is in common place, and when moving in rotation terminal as shown in Figure 5 Current desired encryption intensity is 128bits, key c.
S203, terminal obtain required target Encryption Algorithm according to the encryption parameter information.
Wherein, according to encryption parameter information obtain needed for target Encryption Algorithm mode can also there are many, for example, can To be modified according to respective encrypted parameter information of the encryption parameter information to current crypto algorithm, target Encryption Algorithm is obtained. For another example, a target Encryption Algorithm corresponding with encryption parameter information can be chosen from multiple candidate Encryption Algorithm.
For example, the encrypted object b of current crypto algorithm can be changed when encryption parameter information includes encrypted object a For a, or Encryption Algorithm that encrypted object is b is chosen from multiple candidate Encryption Algorithm as target Encryption Algorithm.In another example When encryption parameter information includes: encrypted object a and encryption intensity 2, the encrypted object b of current crypto algorithm can be changed to A, encryption intensity 1 is changed to encryption intensity 2;Or selection encrypted object is b from multiple candidate Encryption Algorithm, encryption intensity is 2 Encryption Algorithm is as target Encryption Algorithm.
S204, when the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical, terminal is according to the target Encryption Algorithm is treated encryption information and is encrypted.
From the foregoing, it will be observed that the embodiment of the present invention is using the usage behavior letter for obtaining terminal current geographical location information and user Then breath determines corresponding encryption parameter information according to the geographical location information and the usage behavior information, is joined according to the encryption Target Encryption Algorithm needed for number acquisition of information, when the target Encryption Algorithm is not identical as the Encryption Algorithm of current crypto algorithm When, encryption information is treated according to the target Encryption Algorithm and is encrypted;The program can be believed based on the current geographical location of terminal Breath and usage behavior information dynamically change Encryption Algorithm, to be encrypted to information, avoid using fixed-encryption algorithm into Row encryption, it is thus possible to improve the safety of information and the performance of terminal.
For example, when encryption parameter information is encryption intensity, when target encryption intensity is higher than current crypto intensity (as currently In secret place, and user is writing document) when, then it is assumed that encryption intensity is inadequate at this time, information can be improved and add Close encryption intensity, it is thus possible to improve the safety of information.
For another example, when encryption parameter information is encryption intensity, when target encryption intensity (is such as worked as lower than current crypto intensity It is preceding to be in common place, and user is playing game) when, then it is assumed that encryption intensity is excessively high at this time, it is likely to affect Therefore the performance of terminal can reduce the encryption intensity of information encryption, can promote the performance of terminal.
In addition, include encryption intensity in encryption parameter information, and when changing the encryption intensity of current crypto algorithm, due to only Change encryption intensity and do not change Encryption Algorithm itself, therefore, the solution confidential information (such as password, finger print information) needed for decryption is It remains unchanged, avoids the need for change solution confidential information, facilitate user's fast decryption, improve decryption speed.It is preferred real one It applies in example, the embodiment of the invention also provides another information ciphering methods, will be integrated in embodiment with information encryption device Information ciphering method is described in detail for terminal.
Fig. 6 is please referred to, for the flow chart for the information ciphering method that this preferred embodiment provides.Below to this preferred embodiment Each step of information ciphering method be described in detail.
S301, terminal obtain the usage behavior information of current geographical location information and user.
Wherein, geographical location information may include: the height above sea level etc. that the place that is presently in of terminal, terminal are presently in.
In practical application, can activity trajectory according to user or position, place is divided into office space, life field Institute, public place of entertainment, common place etc..
Wherein, the usage behavior information of user may include: the behavioural information applied in user's using terminal;For example, with Family to using number, frequency, user using the type of application, user using application Apply Names etc..
In addition, the usage behavior information can also include user to the operation information of terminal, for example the operation information can be with Including shake operation information (such as the shaking direction of terminal shakes number, shake frequency), moving operation information (terminal Moving direction, moving distance etc.), slide information (such as glide direction, sliding distance, sliding position on terminal screen Deng), the pressing operation information (such as pressing dynamics information, compression number) to terminal, rotation process information (as rotation angle, Direction of rotation etc.) etc..
S302, terminal determine corresponding first encryption parameter information according to the geographical location information.
Wherein, the first encryption parameter information may include the encryption parameters such as encryption intensity, encrypted object, encryption key.
Terminal can determine corresponding first based on the mapping relations set between geographical location and encryption parameter information Encryption parameter information.
For example, by taking the first encryption parameter information includes encryption intensity as an example, reference table 5 and table 7 can be looked by above table Ask corresponding encryption intensity.
It for another example, can be with when include height above sea level, the first encryption parameter information including encrypted object with geographical location information Corresponding encrypted object is obtained based on the mapping relations between height above sea level section and encrypted object.It is as shown in the table:
Height above sea level range Encrypted object
1-500m Object a
500-1000m Object b
1000-2000m Object c
Table 10
If height above sea level locating for present terminal can learn that current encrypted object is pair by table 10 when being 455m As a.
S303, terminal determine corresponding second encryption parameter information according to the usage behavior information.
The timing of step S302 and S302 are unrestricted, also successively execute, also may be performed simultaneously.
Wherein, the second encryption parameter information may include the encryption parameters such as encryption intensity, encrypted object, encryption key.The One encryption parameter information can belong to the encryption parameter of same type with the second encryption parameter information.For example, the first encryption parameter Information and the second encryption parameter information are encryption intensity or encryption key etc..First encryption parameter information can also be with Two encryption parameter informations belong to different types of encryption parameter.For example, the first encryption parameter information is encryption intensity, the second encryption Parameter information can be encrypted object etc..
In the present embodiment second can be obtained with mapping relations set between Behavior-based control information and encryption parameter information Encryption parameter information.For example encryption intensity, encrypted object or encryption key can be obtained with reference table 6,8,9.
Using the second encryption parameter information as encryption intensity, usage behavior information is that user shakes for the frequency of terminal, can To obtain required encryption intensity based on the mapping relations set between frequency separation and encryption intensity.For example, such as following table institute Show:
Shake frequency Encryption intensity
1-5 times Encryption intensity 1
5-10 times Encryption intensity 2
10-m times Encryption intensity 3
Table 11
With reference to Fig. 3, when user shakes terminal, if shake frequency is 6 or 8 times, encryption intensity can be determined for encryption Intensity 2.
S304, terminal obtain required target according to first encryption parameter information and second encryption parameter information and encrypt Algorithm.
Specifically, first encryption parameter information and the second encryption parameter information are the encryption parameter information of not same type When, the available Encryption Algorithm with the first encryption parameter information and the second parameter information.
For example, be encrypted object in the first encryption parameter information, and when encrypted object is a, the second encryption parameter information be Encryption intensity, and encryption intensity is 128bits, then can obtain at this time, an encrypted object is a, encryption intensity is The Encryption Algorithm of 128bits.
It wherein, can be with according to the mode that the first encryption parameter information and the second encryption parameter information obtain target Encryption Algorithm There are many, for example, can the respective encrypted parameter information to current crypto algorithm be modified, obtain target Encryption Algorithm;Example Such as, the encryption intensity of current crypto algorithm be 128bits, encrypted object a, if the first encryption parameter information is that encryption is strong Degree, and encryption intensity is 192bits, the second encryption parameter is encrypted object, and when encrypted object is c, then can will be current The encryption intensity of Encryption Algorithm is changed to 192bits by 128bits, and the encrypted object of current crypto algorithm is changed to c by a.
S305, when the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical, terminal is according to the target Encryption Algorithm is treated encryption information and is encrypted.
From the foregoing, it will be observed that the embodiment of the present invention is using the usage behavior letter for obtaining terminal current geographical location information and user Breath, then, determines the first encryption parameter information according to the geographical location information, determines corresponding the according to the usage behavior information Two encryption parameter informations, the target Encryption Algorithm needed for being obtained according to first and second encryption parameter information, when the target adds When the Encryption Algorithm of close algorithm and current crypto algorithm is not identical, encryption information is treated according to the target Encryption Algorithm and is added It is close;The program can dynamically change Encryption Algorithm based on the current geographical location information of terminal and usage behavior information, with right Information is encrypted, avoid and encrypted using fixed-encryption algorithm, it is thus possible to improve the safety and terminal of information Performance.
In addition, include encryption intensity in encryption parameter information, and when changing the encryption intensity of current crypto algorithm, due to only Change encryption intensity and do not change Encryption Algorithm itself, therefore, the solution confidential information (such as password, finger print information) needed for decryption is It remains unchanged, avoids the need for change solution confidential information, facilitate user's fast decryption, improve decryption speed.
In a preferred embodiment, the embodiment of the invention also provides another information ciphering method, embodiment will be with Information encryption device is integrated in for terminal to be described in detail information ciphering method.
Fig. 7 is please referred to, for the flow chart for the information ciphering method that this preferred embodiment provides.Below to this preferred embodiment Each step of information ciphering method be described in detail.
S401, terminal obtain the usage behavior information of current geographical location information and user.
Wherein, geographical location information may include: the height above sea level etc. that the place that is presently in of terminal, terminal are presently in.
In practical application, can activity trajectory according to user or position, place is divided into office space, life field Institute, public place of entertainment, common place etc..
Wherein, the usage behavior information of user may include: the behavioural information applied in user's using terminal;For example, with Family to using number, frequency, user using the type of application, user using application Apply Names etc..
In addition, the usage behavior information can also include user to the operation information of terminal, for example the operation information can be with Including shake operation information (such as the shaking direction of terminal shakes number, shake frequency), moving operation information (terminal Moving direction, moving distance etc.), slide information (such as glide direction, sliding distance, sliding position on terminal screen Deng), the pressing operation information (such as pressing dynamics information, compression number) to terminal, rotation process information (as rotation angle, Direction of rotation etc.) etc..
S402, terminal determine corresponding Encryption Algorithm according to the geographical location information.
Specifically, it can determine that corresponding encryption is calculated according to position algorithm mapping relations set and the geographical location information Method, the position algorithm mapping relations set may include the mapping relations between geographical location information and Encryption Algorithm.
It is as shown in the table:
Geographical location Encryption Algorithm
Position 1 Encryption Algorithm 2
Position 2 Encryption Algorithm 3
Position 3 Encryption Algorithm 4
Position 4 Encryption Algorithm 5
Position 5 Encryption Algorithm 1
Position 6 Encryption Algorithm 3
Position n Encryption Algorithm 1
Table 12
When user terminal is in position 5, it can determine that Encryption Algorithm is Encryption Algorithm 1 by table 12.
For example, by taking geographical location information includes place as an example, it is as shown in the table:
Geographical location Encryption Algorithm
Office space Encryption Algorithm 2
Public place of entertainment Encryption Algorithm 3
Life area Encryption Algorithm 4
Common place Encryption Algorithm 5
Table 13
If user is currently at life area, it can determine that Encryption Algorithm is Encryption Algorithm 4.
S403, terminal are modified encryption parameter information corresponding in the Encryption Algorithm according to the usage behavior information, Obtain target Encryption Algorithm.
Wherein, encryption parameter information may include the encryption ginseng of the Encryption Algorithm such as encryption intensity, encryption key, encrypted object Number.It can set according to actual needs.
In the present embodiment, can be had according to the mode that usage behavior information changes the encryption parameter information of Encryption Algorithm more Kind, for example, the corresponding target encryption parameter information of usage behavior information can be obtained first, then, believed according to target encryption parameter Breath is modified encryption parameter information corresponding in Encryption Algorithm.
Wherein it is possible to which the mapping relations between Behavior-based control information and encryption parameter are corresponding to obtain usage behavior information Target encryption parameter information.For example, can be obtained respectively with reference to above table 6,8,9 encryption intensity, encrypted object, encryption it is close Key.
For example, when user moves horizontally terminal, can determine that encryption key is key a with reference to Fig. 8.
For example, determine terminal be presently in the corresponding Encryption Algorithm in place be Encryption Algorithm 2 after, it is available with make It is key b with the corresponding key of behavioural information, it is then possible to which the key b of Encryption Algorithm 2 is changed to key a.
S404, when the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical, terminal is according to the target Encryption Algorithm is treated encryption information and is encrypted.
From the foregoing, it will be observed that the embodiment of the present invention is using the usage behavior letter for obtaining terminal current geographical location information and user Breath, then, determines corresponding Encryption Algorithm according to the geographical location information, according to the usage behavior information to the phase of Encryption Algorithm It answers parameter information to change, obtains target Encryption Algorithm, when the Encryption Algorithm not phase of the target Encryption Algorithm and current crypto algorithm Meanwhile encryption information is treated according to the target Encryption Algorithm and is encrypted;The program can be current based on terminal geographical location Information and usage behavior information dynamically change Encryption Algorithm, to encrypt to information, avoid using fixed-encryption algorithm It is encrypted, it is thus possible to improve the safety of information and the performance of terminal.
In a preferred embodiment, the embodiment of the invention also provides another information ciphering method, embodiment will be with Information encryption device is integrated in for terminal to be described in detail information ciphering method.
Fig. 9 is please referred to, for the flow chart for the information ciphering method that this preferred embodiment provides.Below to this preferred embodiment Each step of information ciphering method be described in detail.
S501, terminal obtain the usage behavior information of current geographical location information and user.
Wherein, geographical location information may include: the height above sea level etc. that the place that is presently in of terminal, terminal are presently in.
In practical application, can activity trajectory according to user or position, place is divided into office space, life field Institute, public place of entertainment, common place etc..
Wherein, the usage behavior information of user may include: the behavioural information applied in user's using terminal;For example, with Family to using number, frequency, user using the type of application, user using application Apply Names etc..
In addition, the usage behavior information can also include user to the operation information of terminal, for example the operation information can be with Including shake operation information (such as the shaking direction of terminal shakes number, shake frequency), moving operation information (terminal Moving direction, moving distance etc.), slide information (such as glide direction, sliding distance, sliding position on terminal screen Deng), the pressing operation information (such as pressing dynamics information, compression number) to terminal, rotation process information (as rotation angle, Direction of rotation etc.) etc..
S502, terminal determine corresponding Encryption Algorithm according to the usage behavior information.
Specifically, it can determine that corresponding encryption is calculated according to position algorithm mapping relations set and the geographical location information Method, the position algorithm mapping relations set may include the mapping relations between usage behavior and Encryption Algorithm.It is as shown in the table:
Usage behavior 1 Encryption Algorithm 2
Usage behavior 2 Encryption Algorithm 3
Usage behavior n Encryption Algorithm 4
Table 14
When usage behavior is usage behavior 4, it can determine that Encryption Algorithm is Encryption Algorithm 5 by table 14.
For example, by taking the application type for using behavioural information to use for user as an example, it is as shown in the table:
Entertainment applications Encryption Algorithm 2
Social application Encryption Algorithm 3
Document application Encryption Algorithm 4
Table 15
If when the currently used entertainment applications of user, can determine that Encryption Algorithm is Encryption Algorithm 2.
For another example, it when usage behavior information includes operation information of the user to terminal, is as follows:
Operation Encryption Algorithm
Rock from side to side terminal Encryption Algorithm 1
Move horizontally terminal Encryption Algorithm 2
Move up terminal Encryption Algorithm 3
Moving in rotation terminal Encryption Algorithm 4
Rock from side to side terminal Encryption Algorithm 5
Move down terminal Encryption Algorithm 6
Move horizontally terminal Encryption Algorithm 3
Table 16
With reference to Figure 10, when user moves up terminal, it can determine that Encryption Algorithm is Encryption Algorithm 3 by table 16.
S503, terminal are modified encryption parameter information corresponding in the Encryption Algorithm according to the geographical location information, Obtain target Encryption Algorithm.
Wherein, encryption parameter information may include the encryption ginseng of the Encryption Algorithm such as encryption intensity, encryption key, encrypted object Number.It can set according to actual needs.
In the present embodiment, can be had according to the mode that geographical location information changes the encryption parameter information of Encryption Algorithm more Kind, for example, the corresponding target encryption parameter information of geographical location information can be obtained first, then, believed according to target encryption parameter Breath is modified encryption parameter information corresponding in Encryption Algorithm.
Wherein it is possible to obtain usage behavior information pair based on the mapping relations between geographical location information and encryption parameter The target encryption parameter information answered.For example, encryption intensity, encrypted object can be obtained respectively with reference to above table 5,7,10.
For example, can determine that the close intensity of encryption is 256bits when user is in office space.
For example, after determining that the corresponding Encryption Algorithm of the currently used behavioural information of terminal is Encryption Algorithm 3, it is available Encryption intensity corresponding with geographical location information is 256bits, it is then possible to which the encryption intensity of Encryption Algorithm 3 is changed to 256bits。
S504, when the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical, terminal is according to the target Encryption Algorithm is treated encryption information and is encrypted.
From the foregoing, it will be observed that the embodiment of the present invention is using the usage behavior letter for obtaining terminal current geographical location information and user Breath, then, determines corresponding Encryption Algorithm according to the usage behavior information, according to the geographical location information to the phase of Encryption Algorithm It answers parameter information to change, obtains target Encryption Algorithm, when the Encryption Algorithm not phase of the target Encryption Algorithm and current crypto algorithm Meanwhile encryption information is treated according to the target Encryption Algorithm and is encrypted;The program can be current based on terminal geographical location Information and usage behavior information dynamically change Encryption Algorithm, to encrypt to information, avoid using fixed-encryption algorithm It is encrypted, it is thus possible to improve the safety of information and the performance of terminal.
For example, when encryption parameter information is encryption intensity, when target encryption intensity is higher than current crypto intensity (as currently In secret place, and user is writing document) when, then it is assumed that encryption intensity is inadequate at this time, information can be improved and add Close encryption intensity, it is thus possible to improve the safety of information.
For another example, when encryption parameter information is encryption intensity, when target encryption intensity (is such as worked as lower than current crypto intensity It is preceding to be in common place, and user is playing game) when, then it is assumed that encryption intensity is excessively high at this time, it is likely to affect Therefore the performance of terminal can reduce the encryption intensity of information encryption, can promote the performance of terminal.
In addition, include encryption intensity in encryption parameter information, and when changing the encryption intensity of current crypto algorithm, due to only Change encryption intensity and do not change Encryption Algorithm itself, therefore, the solution confidential information (such as password, finger print information) needed for decryption is It remains unchanged, avoids the need for change solution confidential information, facilitate user's fast decryption, improve decryption speed.
Figure 11 is please referred to, for the flow chart for another information ciphering method that this preferred embodiment provides.It is preferred to this below Each step of the information ciphering method of embodiment is described in detail.
S601, terminal obtain the usage behavior information of current geographical location information and user.
Wherein, geographical location information may include: the height above sea level etc. that the place that is presently in of terminal, terminal are presently in.
In practical application, can activity trajectory according to user or position, place is divided into office space, life field Institute, public place of entertainment, common place etc..
Wherein, the usage behavior information of user may include: the behavioural information applied in user's using terminal;For example, with Family to using number, frequency, user using the type of application, user using application Apply Names etc..
In addition, the usage behavior information can also include user to the operation information of terminal, for example the operation information can be with Including shake operation information (such as the shaking direction of terminal shakes number, shake frequency), moving operation information (terminal Moving direction, moving distance etc.), slide information (such as glide direction, sliding distance, sliding position on terminal screen Deng), the pressing operation information (such as pressing dynamics information, compression number) to terminal, rotation process information (as rotation angle, Direction of rotation etc.) etc..
S602, terminal determine corresponding first Encryption Algorithm according to the geographical location information.
Specifically, it can determine that corresponding encryption is calculated according to position algorithm mapping relations set and the geographical location information Method, the position algorithm mapping relations set may include the mapping relations between geographical location information and Encryption Algorithm.For example join Table 12 and 13 is examined, corresponding Encryption Algorithm can be inquired from table 12 and 13.
S603, terminal determine corresponding second Encryption Algorithm according to the usage behavior information.
Specifically, it can determine that corresponding second adds according to behavior Algorithm mapping set of relationship and the usage behavior information Close algorithm, behavior Algorithm mapping set of relationship may include the mapping relations between usage behavior information and Encryption Algorithm.
For example, reference table 14,15 and 16, can pass through the corresponding Encryption Algorithm of these table lookups.
S604, terminal obtain required target Encryption Algorithm according to first Encryption Algorithm and second Encryption Algorithm.
Specifically, terminal adds corresponding first encryption intensity corresponding with the second Encryption Algorithm second of the first Encryption Algorithm Close intensity compares, and obtains comparing result;Then, it is calculated according to the comparing result from first Encryption Algorithm and second encryption Required target Encryption Algorithm is chosen in method.
In practical application, it can choose that encryption intensity is higher or lower Encryption Algorithm is as target Encryption Algorithm, It can specifically set according to actual needs.
For example, the corresponding Encryption Algorithm 3 in geographical location, the corresponding Encryption Algorithm 4 of usage behavior, at this point it is possible to will encryption The encryption intensity of algorithm 3 and the encryption intensity of Encryption Algorithm 4 compare, if the encryption intensity of Encryption Algorithm 3 is higher than encryption and calculates Method 4, at this point it is possible to which choosing Encryption Algorithm 3 is target Encryption Algorithm.
In some embodiments, Encryption Algorithm 4 can also be chosen and be used as target Encryption Algorithm.
S605, when the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical, terminal is according to the target Encryption Algorithm is treated encryption information and is encrypted.
From the foregoing, it will be observed that the embodiment of the present invention is using the usage behavior letter for obtaining terminal current geographical location information and user Breath, then, determines corresponding first Encryption Algorithm according to the geographical location information, is determined according to the usage behavior information corresponding Second Encryption Algorithm obtains target Encryption Algorithm according to the first and second Encryption Algorithm, when the target Encryption Algorithm adds with current When the Encryption Algorithm of close algorithm is not identical, encryption information is treated according to the target Encryption Algorithm and is encrypted;The program can be with base Encryption Algorithm is dynamically changed in the current geographical location information of terminal and usage behavior information, to be encrypted to information, is kept away Exempt to be encrypted using fixed-encryption algorithm, it is thus possible to improve the safety of information and the performance of terminal.
In a preferred embodiment, a kind of information encryption device is additionally provided, which specifically can integrate In the terminal, which specifically can be the equipment such as smart phone, tablet computer.With reference to Figure 12, which can be with Include: information acquisition unit 701, algorithm acquiring unit 702 and algorithm acquiring unit 703, be described in detail below:
Information acquisition unit 701, for obtaining the usage behavior information of the current geographical location information of terminal and user;
Algorithm acquiring unit 702 obtains required mesh for root according to the geographical location information and the usage behavior information Mark Encryption Algorithm;
Encryption unit 703, when not identical for the Encryption Algorithm when the target Encryption Algorithm and current crypto algorithm, according to The target Encryption Algorithm is treated encryption information and is encrypted.
Optionally, with reference to Figure 13, wherein algorithm acquiring unit 702 may include:
Parameter acquisition subelement 7021, for determining corresponding add according to the geographical location information and the usage behavior information Close parameter information;
Algorithm obtains subelement 7022, for the target Encryption Algorithm needed for being obtained according to the encryption parameter information.
Optionally, with reference to Figure 14, wherein algorithm acquiring unit 702 may include:
First parameter obtains subelement 7023, for determining that corresponding first encryption parameter is believed according to the geographical location information Breath;
Second parameter obtains subelement 7024, for determining that corresponding second encryption parameter is believed according to the usage behavior information Breath;
Algorithm obtains subelement 7025, for being obtained according to first encryption parameter information and second encryption parameter information Required target Encryption Algorithm.
Wherein, algorithm obtains subelement 7025 and can be used for: being joined according to first encryption parameter information and second encryption Number information is modified encryption parameter corresponding in current crypto algorithm, obtains target Encryption Algorithm.
Optionally, with reference to Figure 15, wherein algorithm acquiring unit 702 may include:
First algorithm obtains subelement 7026, for determining corresponding Encryption Algorithm according to the geographical location information;
Second algorithm obtains subelement 7027, for according to the usage behavior information to being encrypted accordingly in the Encryption Algorithm Parameter information is modified, and obtains target Encryption Algorithm.
Optionally, with reference to Figure 16, wherein algorithm acquiring unit 702 may include:
Third algorithm obtains subelement 7028, for determining corresponding Encryption Algorithm according to the usage behavior information;
4th algorithm obtains subelement 7029, for according to the geographical location information to being encrypted accordingly in the Encryption Algorithm Parameter information is modified, and obtains target Encryption Algorithm.
Optionally, with reference to Figure 17, wherein algorithm acquiring unit 702 may include:
5th algorithm obtains subelement 7030, for determining corresponding first Encryption Algorithm according to the geographical location information;
6th algorithm obtains subelement 7031, for determining corresponding second Encryption Algorithm according to the usage behavior information;
7th algorithm obtains subelement 7032, needed for being obtained according to first Encryption Algorithm and second Encryption Algorithm Target Encryption Algorithm.
Wherein, the 7th algorithm obtains subelement 7032, is specifically used for:
Corresponding first encryption intensity of first Encryption Algorithm the second encryption intensity corresponding with the second Encryption Algorithm is carried out Comparison, obtains comparing result;
Required target encryption is chosen from first Encryption Algorithm and second Encryption Algorithm according to the comparing result to calculate Method.
When it is implemented, above each unit can be used as independent entity to realize, any combination can also be carried out, is made It is realized for same or several entities, the specific implementation of above each unit can be found in the embodiment of the method for front, herein not It repeats again.
From the foregoing, it will be observed that the embodiment of the present invention using information acquisition unit 701 obtain the current geographical location information of terminal and Then the usage behavior information of user is believed by algorithm acquiring unit 702 according to the geographical location information and the usage behavior Breath obtains required target Encryption Algorithm, when the Encryption Algorithm of the target Encryption Algorithm and current crypto algorithm is not identical, Encryption information is treated according to the target Encryption Algorithm by encryption unit 703 to be encrypted;The program can be current based on terminal Geographical location information and usage behavior information dynamically change Encryption Algorithm, to be encrypted to information, avoid using solid Determine Encryption Algorithm to be encrypted, it is thus possible to improve the safety of information and the performance of terminal.
In a preferred embodiment, a kind of terminal is additionally provided, for example, please referring to Figure 18, which may include penetrating Frequently (RF, Radio Frequency) circuit 801, include one or more the memory of computer readable storage medium 802, input unit 803, display unit 804, sensor 805, voicefrequency circuit 806, Wireless Fidelity (WiFi, Wireless Fidelity) module 807, the processor 808 and the components such as power supply 809 that include one or more than one processing core. It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Figure 18, may include than figure Show more or fewer components, perhaps combines certain components or different component layouts.
Radio circuit 801 can be used for receiving and sending messages or communication process in signal send and receive, particularly, by base station Downlink information receive after, transfer to one or more than one processor 808 processing;In addition, the data for being related to uplink are sent To base station.Memory 802 can be used for storing software program and module.Processor 808 is stored in memory 802 by operation Software program and module, thereby executing various function application and data processing.In addition, memory 802 may include high speed Random access memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or Other volatile solid-state parts.Correspondingly, memory 802 can also include Memory Controller, to provide processor 808 Access with input unit 803 to memory 802.
Input unit 803 can be used for receiving the number or character information of input, and generate and user setting and function Control related keyboard, mouse, operating stick, optics or trackball signal input.Specifically, in a specific embodiment In, input unit 803 may include touch sensitive surface and other input equipments.Specifically, other input equipments may include but not It is limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick, fingerprint recognition One of mould group etc. is a variety of.
Display unit 804 can be used for showing information input by user or be supplied to user information and terminal it is various Graphical user interface, these graphical user interface can be made of figure, text, icon, video and any combination thereof.
Terminal may also include at least one sensor 805, such as optical sensor, motion sensor and other sensors.
Voicefrequency circuit 806 can provide the audio interface between user and terminal by loudspeaker, microphone.
Processor 808 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to It crosses operation or executes the software program and/or module being stored in memory 802, and call and be stored in memory 802 Data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Optionally, processor 808 can wrap Include one or more processing cores;Preferably, processor 808 can integrate application processor and modem processor, wherein answer With the main processing operation system of processor, user interface and target application etc., modem processor mainly handles wireless communication. It is understood that above-mentioned modem processor can not also be integrated into processor 808.
Terminal further includes the power supply 809 (such as battery) powered to all parts.Although being not shown, terminal can also Bao Lan Tooth module, camera etc., details are not described herein.
In the present embodiment, the processor 808 in terminal can be according to following instruction, by one or more application The corresponding executable file of the process of program is loaded into memory 802, and is stored in memory by processor 808 to run Application program in 802, to realize various functions:
The usage behavior information for obtaining terminal current geographical location information and user, then, according to the geographical location Target Encryption Algorithm needed for information and the usage behavior acquisition of information, when the target Encryption Algorithm and current crypto algorithm Encryption Algorithm it is not identical when, encryption information is treated according to the target Encryption Algorithm and is encrypted.
From the foregoing, it will be observed that the embodiment of the present invention is using the usage behavior letter for obtaining terminal current geographical location information and user Breath, then, according to target Encryption Algorithm needed for the geographical location information and the usage behavior acquisition of information, when the mesh Mark Encryption Algorithm and current crypto algorithm Encryption Algorithm it is not identical when, according to the target Encryption Algorithm treat encryption information into Row encryption;The program can dynamically change Encryption Algorithm based on the current geographical location information of terminal and usage behavior information, It to be encrypted to information, avoids and is encrypted using fixed-encryption algorithm, it is thus possible to improve safety and the end of information The performance at end.
It should be noted that those of ordinary skill in the art will appreciate that whole in the various methods of above-described embodiment or Part steps are relevant hardware can be instructed to complete by program, which can store in computer-readable storage medium It in matter, is such as stored in the memory of terminal, and is executed by least one processor in the terminal, can be wrapped in the process of implementation Include the process of the embodiment such as information issuing method.Wherein, storage medium may include: read-only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), disk or CD etc..
A kind of information ciphering method provided in an embodiment of the present invention, device and terminal are described in detail above, Each functional module can integrate in a processing chip, is also possible to modules and physically exists alone, can also two or More than two modules are integrated in a module.Above-mentioned integrated module both can take the form of hardware realization, can also adopt It is realized with the form of software function module.Specific case used herein explains the principle of the present invention and embodiment It states, the above description of the embodiment is only used to help understand the method for the present invention and its core ideas;Meanwhile for this field Technical staff, according to the thought of the present invention, there will be changes in the specific implementation manner and application range, in conclusion The contents of this specification are not to be construed as limiting the invention.

Claims (14)

1. a kind of information ciphering method characterized by comprising
The usage behavior information of terminal current geographical location information and user is obtained, the geographical location information includes that terminal is worked as Preceding locating place, the usage behavior information includes the behavioural information applied in user's using terminal;
According to the geographical location information and the usage behavior information, required target Encryption Algorithm is obtained;
It is described according to the geographical location information and the usage behavior information, obtain required target Encryption Algorithm, comprising: root Corresponding encryption parameter information, the parameter are determined according to parameter mapping relations set, geographical location information and usage behavior information Mapping relations set includes that the mapping between preset geographical position information, default usage behavior information and predetermined encryption parameter is closed System;
Target Encryption Algorithm needed for being obtained according to the encryption parameter information;
When the target Encryption Algorithm and current Encryption Algorithm be not identical, according to the target Encryption Algorithm to letter to be encrypted Breath is encrypted.
2. information ciphering method as described in claim 1, which is characterized in that according to the geographical location information and the use Behavioural information obtains required target Encryption Algorithm, comprising:
Corresponding first encryption parameter information is determined according to the geographical location information;
Corresponding second encryption parameter information is determined according to the usage behavior information;
Target Encryption Algorithm needed for being obtained according to first encryption parameter information and second encryption parameter information.
3. information ciphering method as claimed in claim 2, which is characterized in that according to first encryption parameter information and described Second encryption parameter information obtains required target Encryption Algorithm, comprising:
According to first encryption parameter information and second encryption parameter information to being encrypted accordingly in current crypto algorithm Parameter is modified, and obtains target Encryption Algorithm.
4. information ciphering method as described in claim 1, which is characterized in that according to the geographical location information and the use Behavioural information obtains required target Encryption Algorithm, comprising:
Corresponding Encryption Algorithm is determined according to the geographical location information;
Encryption parameter information corresponding in the Encryption Algorithm is modified according to the usage behavior information, target is obtained and adds Close algorithm.
5. information ciphering method as described in claim 1, which is characterized in that according to the geographical location information and the use Behavioural information obtains required target Encryption Algorithm, comprising:
Corresponding Encryption Algorithm is determined according to the usage behavior information;
Encryption parameter information corresponding in the Encryption Algorithm is modified according to the geographical location information, target is obtained and adds Close algorithm.
6. information ciphering method as described in claim 1, which is characterized in that according to the geographical location information and the use Behavioural information obtains required target Encryption Algorithm, comprising:
Corresponding first Encryption Algorithm is determined according to the geographical location information;
Corresponding second Encryption Algorithm is determined according to the usage behavior information;
Target Encryption Algorithm needed for being obtained according to first Encryption Algorithm and second Encryption Algorithm.
7. information ciphering method as claimed in claim 6, which is characterized in that according to first Encryption Algorithm and described second Encryption Algorithm obtains required target Encryption Algorithm, comprising:
Corresponding first encryption intensity of first Encryption Algorithm the second encryption intensity corresponding with the second Encryption Algorithm is compared, Obtain comparing result;
Required target encryption is chosen from first Encryption Algorithm and second Encryption Algorithm according to the comparing result Algorithm.
8. a kind of information encryption device characterized by comprising
Information acquisition unit, for obtaining the usage behavior information of the current geographical location information of terminal and user, the geography Location information includes the place that terminal is presently in, and the usage behavior information includes the behavior letter applied in user's using terminal Breath;
Algorithm acquiring unit, for obtaining required target and adding according to the geographical location information and the usage behavior information Close algorithm;
The algorithm acquiring unit, comprising:
Parameter obtains subelement, for determining phase according to parameter mapping relations set, geographical location information and usage behavior information The encryption parameter information answered, the parameter mapping relations set include preset geographical position information, default usage behavior information with And the mapping relations between predetermined encryption parameter;
Algorithm obtains subelement, for the target Encryption Algorithm needed for being obtained according to the encryption parameter information;
Encryption unit, for being encrypted according to the target when the target Encryption Algorithm and current Encryption Algorithm be not identical Algorithm is treated encryption information and is encrypted.
9. information encryption device as claimed in claim 8, which is characterized in that the algorithm acquiring unit, comprising:
First parameter obtains subelement, for determining corresponding first encryption parameter information according to the geographical location information;
Second parameter obtains subelement, for determining corresponding second encryption parameter information according to the usage behavior information;
Algorithm obtains subelement, needed for being obtained according to first encryption parameter information and second encryption parameter information Target Encryption Algorithm.
10. information encryption device as claimed in claim 8, which is characterized in that the algorithm acquiring unit, comprising:
First algorithm obtains subelement, for determining corresponding Encryption Algorithm according to the geographical location information;
Second algorithm obtains subelement, is used for according to the usage behavior information to corresponding encryption parameter in the Encryption Algorithm Information is modified, and obtains target Encryption Algorithm.
11. information encryption device as claimed in claim 8, which is characterized in that the algorithm acquiring unit, comprising:
Third algorithm obtains subelement, for determining corresponding Encryption Algorithm according to the usage behavior information;
4th algorithm obtains subelement, is used for according to the geographical location information to corresponding encryption parameter in the Encryption Algorithm Information is modified, and obtains target Encryption Algorithm.
12. information encryption device as claimed in claim 8, which is characterized in that the algorithm acquiring unit, comprising:
5th algorithm obtains subelement, for determining corresponding first Encryption Algorithm according to the geographical location information;
6th algorithm obtains subelement, for determining corresponding second Encryption Algorithm according to the usage behavior information;
7th algorithm obtains subelement, for the mesh needed for being obtained according to first Encryption Algorithm and second Encryption Algorithm Mark Encryption Algorithm.
13. a kind of terminal characterized by comprising
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes as claim 1-7 is any Information ciphering method described in.
14. a kind of storage medium, is stored with computer program, which is characterized in that the computer program is executed by processor Shi Shixian the method as described in claim 1.
CN201611085000.1A 2016-11-30 2016-11-30 A kind of information ciphering method, device and terminal Expired - Fee Related CN106534154B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611085000.1A CN106534154B (en) 2016-11-30 2016-11-30 A kind of information ciphering method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611085000.1A CN106534154B (en) 2016-11-30 2016-11-30 A kind of information ciphering method, device and terminal

Publications (2)

Publication Number Publication Date
CN106534154A CN106534154A (en) 2017-03-22
CN106534154B true CN106534154B (en) 2019-09-13

Family

ID=58355397

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611085000.1A Expired - Fee Related CN106534154B (en) 2016-11-30 2016-11-30 A kind of information ciphering method, device and terminal

Country Status (1)

Country Link
CN (1) CN106534154B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107231292A (en) * 2017-05-04 2017-10-03 金华芒果信息技术有限公司 The encryption method of mobile data
CN109787955B (en) * 2018-12-12 2021-07-16 东软集团股份有限公司 Information transmission method, device and storage medium
CN111314063A (en) * 2020-01-18 2020-06-19 大连交通大学 Big data information management method, system and device based on Internet of things

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1992866A (en) * 2005-12-26 2007-07-04 株式会社日立制作所 Information processing method and information processing apparatus
CN101174946A (en) * 2006-10-30 2008-05-07 株式会社日立制作所 Content transmiting device, conetent receiving deivce and content encrypting method
CN101267297A (en) * 2008-04-01 2008-09-17 华为技术有限公司 An encryption implementation method and device in communication system
CN102523565A (en) * 2011-11-23 2012-06-27 宇龙计算机通信科技(深圳)有限公司 Method, system and mobile communication terminal for encrypting and decrypting message data safely
CN103733203A (en) * 2011-06-13 2014-04-16 意法半导体亚太私人有限公司 Delaying or deterring counterfeiting and/or cloning of a component
CN105871842A (en) * 2016-03-31 2016-08-17 宇龙计算机通信科技(深圳)有限公司 Voice encryption and decryption methods, voice encryption and decryption devices and terminals

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010088199A2 (en) * 2009-01-27 2010-08-05 Watchguard Technologies, Inc. Location-aware configuration

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1992866A (en) * 2005-12-26 2007-07-04 株式会社日立制作所 Information processing method and information processing apparatus
CN101174946A (en) * 2006-10-30 2008-05-07 株式会社日立制作所 Content transmiting device, conetent receiving deivce and content encrypting method
CN101267297A (en) * 2008-04-01 2008-09-17 华为技术有限公司 An encryption implementation method and device in communication system
CN103733203A (en) * 2011-06-13 2014-04-16 意法半导体亚太私人有限公司 Delaying or deterring counterfeiting and/or cloning of a component
CN102523565A (en) * 2011-11-23 2012-06-27 宇龙计算机通信科技(深圳)有限公司 Method, system and mobile communication terminal for encrypting and decrypting message data safely
CN105871842A (en) * 2016-03-31 2016-08-17 宇龙计算机通信科技(深圳)有限公司 Voice encryption and decryption methods, voice encryption and decryption devices and terminals

Also Published As

Publication number Publication date
CN106534154A (en) 2017-03-22

Similar Documents

Publication Publication Date Title
CN107256555B (en) Image processing method, device and storage medium
CN104821937B (en) Token acquisition methods, apparatus and system
CN111600710B (en) Key storage method, device, terminal, server and readable medium
KR102496392B1 (en) Frequency domain information indication method of common control resource set of residual minimum system information
CN106534154B (en) A kind of information ciphering method, device and terminal
CN113792278A (en) Method and device for displaying application and picture and electronic equipment
CN104992120A (en) Picture encryption method and mobile terminal
CN103065080A (en) Application program login method and device
CN107590770A (en) Image obscures encryption method, mobile terminal and storage medium
CN105681395A (en) Resource sharing control method, device, server and terminal
CN104349320A (en) Sharing method and electronic equipment
CN108681664A (en) A kind of encryption method and device
CN103489025A (en) Method and device for sending contact information
CN104700040A (en) Authority control method and device
CN114553612B (en) Data encryption and decryption method and device, storage medium and electronic equipment
CN106775217B (en) A kind of application identities processing method, device and terminal
CN106127004B (en) A kind of document handling method and terminal device
CN109840426B (en) Encryption method, encryption device and electronic equipment
CN104615954B (en) Password storage method and apparatus
CN115549889A (en) Decryption method, related device and storage medium
CN115589281A (en) Decryption method, related device and storage medium
CN114629649B (en) Data processing method and device based on cloud computing and storage medium
CN114900325B (en) Federal learning-based privacy set intersection method, system, equipment and medium
CN106228077A (en) Process image and the display method of image, device and terminal
CN107831889A (en) The method and mobile terminal that a kind of information is sent

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190913

CF01 Termination of patent right due to non-payment of annual fee