Summary of the invention
According to an aspect of the present invention, a kind of system for carrying out data security transmission in equipment room is provided, it is described
System includes:
Connection unit, for mobile terminal and host to be communicatively coupled;
Receiving unit is received from the host for the encryption data stored in mobile terminal via the communication connection
Read requests, the read requests carry host identification and data area;
Control unit determines storage region involved in read requests according to the data area, and according to host mark
Knowing is that the host assignment reads rank, is selected from a variety of authentication modes for described based on storage region with rank is read
The current authentication mode that host is authenticated is the encryption number in respective memory regions when the host passes through current authentication
According to the copy data for generating decryption;And
The reading response of copy data including the decryption is sent to host by transmission unit.
Preferably, the communication connection is that wire communication connects or wirelessly communicate connection.
Preferably, the host identification is: the user name of the MAC Address of host, the letter of identity of host or host.
Preferably, wherein the host is: personal computer, server or mobile terminal.
Preferably, wherein data are at least one of the following contents: text file, image file, audio file, video
File and application program.
Preferably, the data area includes: total data and public data.
Preferably, described to determine that storage region involved in read requests includes: according to the data area
When the data area is total data, determine that storage region involved in read requests is internal storage region;
Or
When the data area is public data, determine that storage region involved in read requests is external memory area.
Preferably, described to include: for host assignment reading rank according to host identification
It is to read completely for the reading rank of the host assignment when host identification indicates that the host is trusted parties
It takes;Or
It is part for the reading rank of the host assignment when host identification indicates that the host is part trusted parties
It reads.
Preferably, a variety of authentication modes include: high-intensitive gesture password certification, the certification of low-intensity gesture password, move
State cipher authentication and registration information authentication.
Preferably, it is described based on storage region and read rank selected from a variety of authentication modes for the host into
Row certification current authentication mode include:
When storage region is internal storage region and to read rank be to read completely, work as to what the host was authenticated
Preceding authentication mode is high-intensitive gesture password certification;
When storage region be internal storage region and read rank be part read when, work as to what the host was authenticated
Preceding authentication mode is dynamic cipher verification;
When storage region is external memory area and to read rank be to read completely, work as to what the host was authenticated
Preceding authentication mode is the certification of low-intensity gesture password;
When storage region be external memory area and read rank be part read when, work as to what the host was authenticated
Preceding authentication mode is registration information authentication.
According to another aspect of the present invention, a kind of mobile terminal is provided, including or for executing system as described above.
According to another aspect of the present invention, a kind of method for carrying out data security transmission in equipment room is provided, it is described
Method includes:
Mobile terminal and host are communicatively coupled;
The read requests for the encryption data stored in mobile terminal are received from the host via the communication connection,
The read requests carry host identification and data area;
Storage region involved in read requests is determined according to the data area, and is the master according to host identification
Rank is read in machine distribution, is selected from a variety of authentication modes for recognizing the host based on storage region and reading rank
The current authentication mode of card is that the encryption data in respective memory regions generates decryption when the host passes through current authentication
Copy data;And
The reading response of copy data including the decryption is sent to host.
Preferably, the communication connection is that wire communication connects or wirelessly communicate connection.
Preferably, the host identification is: the user name of the MAC Address of host, the letter of identity of host or host.
Preferably, wherein the host is: personal computer, server or mobile terminal.
Preferably, wherein data are at least one of the following contents: text file, image file, audio file, video
File and application program.
Preferably, the data area includes: total data and public data.
Preferably, described to determine that storage region involved in read requests includes: according to the data area
When the data area is total data, determine that storage region involved in read requests is internal storage region;
Or
When the data area is public data, determine that storage region involved in read requests is external memory area.
Preferably, described to include: for host assignment reading rank according to host identification
It is to read completely for the reading rank of the host assignment when host identification indicates that the host is trusted parties
It takes;Or
It is part for the reading rank of the host assignment when host identification indicates that the host is part trusted parties
It reads.
Preferably, a variety of authentication modes include: high-intensitive gesture password certification, the certification of low-intensity gesture password, move
State cipher authentication and registration information authentication.
Preferably, it is described based on storage region and read rank selected from a variety of authentication modes for the host into
Row certification current authentication mode include:
When storage region is internal storage region and to read rank be to read completely, work as to what the host was authenticated
Preceding authentication mode is high-intensitive gesture password certification;
When storage region be internal storage region and read rank be part read when, work as to what the host was authenticated
Preceding authentication mode is dynamic cipher verification;
When storage region is external memory area and to read rank be to read completely, work as to what the host was authenticated
Preceding authentication mode is the certification of low-intensity gesture password;
When storage region be external memory area and read rank be part read when, work as to what the host was authenticated
Preceding authentication mode is registration information authentication.
Specific embodiment
Exemplary embodiments of the present invention are introduced referring now to the drawings, however, the present invention can use many different shapes
Formula is implemented, and is not limited to the embodiment described herein, and to provide these embodiments be at large and fully disclose
The present invention, and the scope of the present invention is sufficiently conveyed to person of ordinary skill in the field.Show for what is be illustrated in the accompanying drawings
Term in example property embodiment is not limitation of the invention.In the accompanying drawings, identical cells/elements use identical attached
Icon note.
Unless otherwise indicated, term (including scientific and technical terminology) used herein has person of ordinary skill in the field
It is common to understand meaning.Further it will be understood that with the term that usually used dictionary limits, should be understood as and its
The context of related fields has consistent meaning, and is not construed as Utopian or too formal meaning.
Fig. 1 is the structural schematic diagram according to the data transmission system 100 of embodiment of the present invention.As shown in Figure 1, data pass
Defeated system 100 includes: mobile terminal 101, network connection 103 and host 103-1,103-2...103-N.Preferably, mobile
Terminal 101 is for storing user data with for users to use, and the user data can be various types of data, such as
Address list, job documentation, picture, audio, video, account information and transfer information etc..Mobile terminal 101 can be any class
The mobile device of type, including cell phone, stand, unit, equipment, multimedia plate, communicator, laptop computer, a number
Word assistant (PDA) or any combination thereof.In general, mobile terminal 101 can be communicated by network connection 103 with other equipment
Connection, other equipment are, for example, host 103-1,103-2...103-N.
Preferably, the connection that network connection 103 is established according to various wired or wireless communication agreements.Network connection 103
For establishing communication connection for mobile terminal 101 and host 103-1,103-2...103-N, to form communication network.It is described
Communication network be, for example, data network, wireless network, telephone network, or any combination thereof.Network connection 103 can be data
Various types of connections such as line, cable, telephone wire and wireless connection.Therefore, composed network can be local area network
(LAN), Metropolitan Area Network (MAN) (MAN), wide area network (WAN), public data network (such as internet) or other any suitable packet switches
Network.In addition, wireless network can be such as cellular network, Wireless Fidelity (WiFi).
Preferably, host 103-1,103-2...103-N is connect and energy by network connection 103 with mobile terminal 101
It is enough to send data to mobile terminal 101 via the network connection 103 or read data from mobile terminal 101.Preferably, host
103-1,103-2...103-N can be any type of mobile terminal, fixed terminal or portable terminal, including mobile hand
Machine is stood, unit, equipment, multimedia computer, multimedia plate, the Internet nodes, communicator, desktop computer, meter on knee
Calculation machine, personal digital assistant (PDA), or any combination thereof.
In data transmission system 100 according to the present invention, reading data is set by the opposite end connecting with mobile terminal 101
For what is initiated, this is because the problem to be solved in the present invention is data transmission when accessing opposite equip. mobile terminal 101
Carry out security control.And in the prior art, it usually will not relate to carry out opposite equip. authentication, and only set in opposite end
For by just allowing to carry out reading data or write-in after authentication.
Fig. 2 is the system 200 for carrying out data security transmission in equipment room according to the preferred embodiment for the present invention
Structure chart.When mobile terminal and host are communicatively coupled, system 200 passes through communication connection and receives from host for mobile whole
The read requests of the encryption data of end memory storage.In embodiment of the present invention, read requests carry host identification and request is read
Data area.System 200 determines read requests related storage region in the terminal, Yi Jigen according to data area
It is the host assignment reading rank for issuing read requests according to host identification.System 200 is based on storage region and reads rank from more
Current authentication mode of the selection for being authenticated to the host for issuing read requests in kind authentication mode.When sending read requests
Host when passing through current authentication, system 200 be encryption data in respective memory regions generate decryption copy data and
The reading response of copy data after decryption is sent to host.
Mobile terminal data is stored in different regions by embodiment of the present invention by the way that different storage regions is arranged,
And the reading rank different for different host assignments, and to different data storage areas and different reading ranks
Selection of chiller current authentication mode, realize for distinct device, different types of data and different reading ranks, pass through
Different modes carry out data transmission, and ensure that the safety of data transmission.
As shown in Fig. 2, system 200 includes: connection unit 201, receiving unit 202, control unit 203 and transmission unit
204.Preferably, connection unit 201 is for mobile terminal and host to be communicatively coupled.It is logical between mobile terminal and host
Letter is connected as wire communication connection or wireless communication connection, for example, communication connection passes through data network, wireless network, telephone network
Network, or any combination thereof be attached.It is various types of that communication connection can be data line, cable, telephone wire and wireless connection etc.
The connection of type.
Preferably, receiving unit 202 is received from host for the encryption data stored in mobile terminal via communication connection
Read requests.In general, read requests carry host identification and data area.Preferably, host issues data to mobile terminal
Read requests, requesting the data type read includes at least one of the following contents: text file, image file, audio
File, video file and application program.Host identification may is that the use of the MAC Address of host, the letter of identity of host or host
Name in an account book.It includes: total data and public data that host, which issues the data area that request is read to mobile terminal,.For example, a MAC
Address are as follows: 00-24-BD-16-8B-A2 host is public computer, is issued and is read to 360 mobile phones by this public computer
The request of total data.Alternatively, the office special purpose computer of one entitled " Qihoo 001 ", issues read work field to 360 mobile phones
The request of institute's pictorial information.
Preferably, control unit 203 according to data area determine read requests involved in storage region, and according to master
Machine is identified as host assignment and reads rank, is selected from a variety of authentication modes for host based on storage region and reading rank
The current authentication mode authenticated is that the encryption data in respective memory regions generates solution when host passes through current authentication
Close copy data.Preferably, embodiment of the present invention according to data area determine read requests involved in storage region packet
It includes: when data area is total data, determining that storage region involved in read requests is internal storage region;Or work as data
When range is public data, determine that storage region involved in read requests is external memory area.It is host according to host identification
It includes: when host identification instruction host is trusted parties that rank is read in distribution, be the reading rank of host assignment is to read completely;
Or host identification instruction host be part trusted parties when, be host assignment reading rank be part reading.Preferably, a variety of
Authentication mode includes: that high-intensitive gesture password certification, the certification of low-intensity gesture password, dynamic cipher verification and registration information are recognized
Card.High-intensitive gesture password certification is the embodiment party of the invention by being authenticated in the tag slot graphing password of 9 points
In formula, the points drawn in graphical passwords are high-intensitive gesture password authentication mode when being 5 or more, and the points drawn are no more than
It is authenticated at 5 for low-intensity gesture password.
It is preferably based on storage region and reads rank and select from a variety of authentication modes for being authenticated to host
Current authentication mode includes: to recognize when storage region is internal storage region and to read rank be to read completely host
The current authentication mode of card is high-intensitive gesture password certification.When storage region is internal storage region and to read rank be part
When reading, the current authentication mode authenticated to the host is dynamic cipher verification, such as mobile phone dynamic cipher verification.When
Storage region is external memory area and to read rank be when reading completely, and the current authentication mode authenticated to host is low
The certification of intensity gesture password.When storage region be external memory area and read rank be part read when, host is recognized
The current authentication mode of card is registration information authentication.
For example, a MAC Address are as follows: 00-24-BD-16-8B-A2 host is public computer, passes through this public calculating
Machine issues the request for reading total data to 360 mobile phones, which is total data, control due to the data area of reading
Data area is determined as internal storage region by unit 203 processed.Control unit 203 is by the mark of public computer, by public meter
Calculation machine is designated as part trusted parties, and be public computer distribution reading rank be part read.Control unit 103 is based on depositing
Storage area domain and reading rank select the current authentication mode for being authenticated to host from a variety of authentication modes, deposit due to working as
Storage area domain be internal storage region and read rank be part read when, the current authentication mode authenticated to the host is
Using dynamic cipher verification.Therefore, the request of reading total data public computer issued, by the way of dynamic password
Recognized just.When public computer passes through the certification of dynamic password, control unit is whole encryption numbers in internal storage region
According to the copy data for generating decryption.
For example, the office special purpose computer of one entitled " Qihoo 001 ", issues read work place picture to 360 mobile phones
The request of information.Since " Qihoo 001 " office special purpose computer issues the request of read work place pictorial information, control unit
Data area is determined as external memory area by 203, and control unit 203 will be handled official business dedicated by the mark of office special purpose computer
Computer is designated as trusted parties, and be handle official business special purpose computer distribution reading rank be to read completely.Control unit 203 is based on
Storage region and reading rank select the current authentication mode for being authenticated to host from a variety of authentication modes, work as storage
Region is external memory area and to read rank be when reading completely, and the current authentication mode authenticated to host is low-intensity
Gesture password certification.Therefore, the request of read work place pictorial information office special purpose computer issued, using low-intensity
The mode of gesture password is authenticated.When special purpose computer of handling official business passes through the certification of low-intensity gesture password, control unit is
Workplace pictorial information encryption data in external memory area generates the copy data of decryption.
Preferably, the reading response of the copy data including decryption is sent to host by transmission unit 204.In general, sending
Unit 204, which passes through to be connected to the network as described above, is sent to host for the reading response of the copy data including decryption.Network connects
Connect the connection established according to various wired or wireless communication agreements.Network connection is for establishing communication for mobile terminal and host
Connection, to form communication network.The communication network is, for example, data network, wireless network, telephone network or its any group
It closes.Network connection can be various types of connections such as data line, cable, telephone wire and wireless connection.
Another embodiment according to the present invention, mobile terminal (not shown) include or for executing system as described above
System.In this case, when mobile terminal and host are communicatively coupled, system is directed to by communication connection from host reception
The read requests of the encryption data stored in mobile terminal.In embodiment of the present invention, read requests carry host identification and ask
Seek the data area of reading.System determines read requests related storage region in the terminal according to data area, with
And rank is read according to the host assignment that host identification is sending read requests.System is based on storage region and reads rank from more
Current authentication mode of the selection for being authenticated to the host for issuing read requests in kind authentication mode.When sending read requests
Host when passing through current authentication, system be encryption data in respective memory regions generate decryption copy data and will solution
The reading response of copy data after close is sent to host.
Fig. 3 is the schematic diagram according to the data storage method of the preferred embodiment for the present invention.Embodiment of the present invention passes through
Different storage regions is arranged to be stored in mobile terminal data in different regions.As shown in figure 3,301 He of internal storage region
The relationship of external memory area 302 is inclusion relation, i.e., external memory area 302 is included in internal storage region 301.It can will be external
Regard the region for being suitable for storing disclosure in internal storage region 301 as in memory block 302.Host 303 can be with by communication connection
Request access to internal storage region 301 or external memory area 302.
Fig. 4 is the process according to the method 400 for carrying out data security transmission in equipment room of embodiment of the present invention
Figure.When mobile terminal and host are communicatively coupled, method 400 is received from host in mobile terminal by communication connection
The read requests of the encryption data of storage.In embodiment of the present invention, read requests carry the number of host identification and request reading
According to range.Method 400 determines read requests related storage region in the terminal according to data area, and according to master
Machine is identified as the host assignment reading rank for issuing read requests.Method 400 is based on storage region and reading rank is recognized from a variety of
The current authentication mode for being authenticated to the host for issuing read requests is selected in card mode.As the master for issuing read requests
When machine passes through current authentication, method 400 is that the encryption data in respective memory regions generates the copy data of decryption and will solve
The reading response of copy data after close is sent to host.
Mobile terminal data is stored in different regions by embodiment of the present invention by the way that different storage regions is arranged,
And the reading rank different for different host assignments, and to different data storage areas and different reading ranks
Selection of chiller current authentication mode, realize for distinct device, different types of data and different reading ranks, pass through
Different modes carry out data transmission, and ensure that the safety of data transmission.
As shown in figure 4, method 400 is since step 401 place.Preferably, in step 401, by mobile terminal and host into
Row communication connection.Communication connection between mobile terminal and host is that wire communication connects or wirelessly communicate connection, for example, communication
Connection by data network, wireless network, telephone network, or any combination thereof be attached.Communication connection can be data line,
Various types of connections such as cable, telephone wire and wireless connection.
Preferably, it in step 402, receives via the communication connection from the host and adds for what is stored in mobile terminal
The read requests of ciphertext data, the read requests carry host identification and data area.In general, read requests carry host identification
And data area.Preferably, host issues data read request to mobile terminal, and it includes following for requesting the data type read
At least one of content: text file, image file, audio file, video file and application program.Host identification can be with
It is: the user name of the MAC Address of host, the letter of identity of host or host.Host issues the number that request is read to mobile terminal
It include: total data and public data according to range.For example, a MAC Address are as follows: 00-24-BD-16-8B-A2 host is public
Computer issues the request for reading total data by this public computer to 360 mobile phones.Alternatively, an entitled " Qihoo
001 " office special purpose computer issues the request of read work place pictorial information to 360 mobile phones.
Preferably, in step 403, storage region involved in read requests, and root are determined according to the data area
It is that the host assignment reads rank according to host identification, selects to use from a variety of authentication modes based on storage region and reading rank
It is in respective memory regions when the host passes through current authentication in the current authentication mode authenticated to the host
Encryption data generate decryption copy data.Preferably, embodiment of the present invention determines read requests institute according to data area
The storage region being related to includes: to determine storage region involved in read requests for inside when data area is total data
Memory block;Or when data area is public data, determine that storage region involved in read requests is external memory area.Root
According to host identification be host assignment read rank include: when host identification instruction host be trusted parties when, be host assignment reading
Taking rank is to read completely;Or host identification instruction host is when being part trusted parties, be the reading rank of host assignment is portion
Divide and reads.Preferably, a variety of authentication modes include: high-intensitive gesture password certification, the certification of low-intensity gesture password, dynamic password
Certification and registration information authentication.High-intensitive gesture password certification is the tag slot graphing password progress passed through in 9 points
It authenticates, in embodiments of the present invention, the points drawn in graphical passwords are high-intensitive gesture password authenticating party when being 5 or more
Formula, the points drawn authenticate when being no more than 5 for low-intensity gesture password.
It is preferably based on storage region and reads rank and select from a variety of authentication modes for being authenticated to host
Current authentication mode includes: to recognize when storage region is internal storage region and to read rank be to read completely host
The current authentication mode of card is high-intensitive gesture password certification.When storage region is internal storage region and to read rank be part
When reading, the current authentication mode authenticated to the host is dynamic cipher verification, such as mobile phone dynamic cipher verification.When
Storage region is external memory area and to read rank be when reading completely, and the current authentication mode authenticated to host is low
The certification of intensity gesture password.When storage region be external memory area and read rank be part read when, host is recognized
The current authentication mode of card is registration information authentication.
Preferably, in step 404, the reading response of the copy data including the decryption is sent to host.Method 400
Host is sent to by being connected to the network to respond the reading of the copy data including decryption as described above.Network connection is according to each
The connection that kind wired or wireless communication agreement is established.Network connection is used to establish communication connection for mobile terminal and host, from
And form communication network.The communication network be, for example, data network, wireless network, telephone network, or any combination thereof.Network
Connection can be various types of connections such as data line, cable, telephone wire and wireless connection.
The present invention is described by reference to a small amount of embodiment.However, it is known in those skilled in the art, as
Defined by subsidiary Patent right requirement, in addition to the present invention other embodiments disclosed above equally fall in it is of the invention
In range.
Normally, all terms used in the claims are all solved according to them in the common meaning of technical field
It releases, unless in addition clearly being defined wherein.All references " one/described/be somebody's turn to do [device, component etc.] " are all opened ground
At least one example being construed in described device, component etc., unless otherwise expressly specified.Any method disclosed herein
Step need not all be run with disclosed accurate sequence, unless explicitly stated otherwise.