CN109858240A - A kind of processing of single device information security and exchange method and its interactive system - Google Patents

A kind of processing of single device information security and exchange method and its interactive system Download PDF

Info

Publication number
CN109858240A
CN109858240A CN201711169330.3A CN201711169330A CN109858240A CN 109858240 A CN109858240 A CN 109858240A CN 201711169330 A CN201711169330 A CN 201711169330A CN 109858240 A CN109858240 A CN 109858240A
Authority
CN
China
Prior art keywords
information
ciphertext
operating system
interface
conversion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201711169330.3A
Other languages
Chinese (zh)
Inventor
曹耀和
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Zhibei Information Technology Co Ltd
Original Assignee
Zhejiang Zhibei Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Zhibei Information Technology Co Ltd filed Critical Zhejiang Zhibei Information Technology Co Ltd
Priority to CN201711169330.3A priority Critical patent/CN109858240A/en
Publication of CN109858240A publication Critical patent/CN109858240A/en
Withdrawn legal-status Critical Current

Links

Landscapes

  • Document Processing Apparatus (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of processing of single device information security and exchange method and its interactive systems, including display screen and operating system, it is provided with encrypted file system, function call interception card module and encrypting module in an operating system, user or application (interface), which issue dynamic ciphertext security information to operating system, requests, and file system requests encrypting module carries out coding encrypting or ciphertext conversion generates new information ciphertext;Operating system proposes the request of ciphertext code conversion to encrypting module;Encrypting module returns to operating system after carrying out ciphertext code conversion;Operating system is intercepted image to be shown and/or text information.Encrypting module returns to operating system after carrying out code conversion to the ciphertext of information processing result;Operating system merges the information of interception with the ciphertext of the information processing result after conversion, and the display screen of single device is shown or application (interface) handles information processing ciphertext result.The safety of processing and the information used in effective protection operating system of the present invention.

Description

A kind of processing of single device information security and exchange method and its interactive system
Technical field
The invention belongs to the technical field of information safety protection more particularly to a kind of processing of single device information security and interaction Method and its interactive system.
Background technique
In the interbehavior of people and computer, information security is a problem to be solved.Have in the prior art various Technical solution come ensure the links such as hard disc of computer, memory, screen cache save information security.There is peace in the prior art It is complete that interbehavior is excessively cumbersome, is easy problem under attack, especially computer always has an opportunity the plaintext letter for touching information Breath.The information security that the present invention solves single device from a completely new angle uses and interaction problems.
Summary of the invention
Technical problem to be solved by the present invention lies in, provide a kind of processing of single device information security and exchange method and its System, it is intended to solve information security use and interbehavior is excessively cumbersome, is easy technical problem under attack, especially calculate Machine always has an opportunity to touch total source problem of this leakage of information of the cleartext information of information.
The embodiments of the present invention are implemented as follows, a kind of processing of single device information security and exchange method, including has as follows Body step:
(1), user or application (interface) issue the close cultural security of dynamic to its file system using the operating system of single device and believe Breath request, the information includes information in plain text and/or information ciphertext, the information security request include file system to the information Coding encrypting is carried out in plain text or/and the request of ciphertext conversion dynamic generation information ciphertext is carried out to the information ciphertext;
(2), the file system proposes to encode the information in plain text to the encrypting module being arranged in single device memory Encryption carries out the request of ciphertext code conversion to the information ciphertext, and the information plaintext or cipher text is sent to encryption mould simultaneously Block;
(3), after the encrypting module carries out coding encrypting to the information in plain text or carries out ciphertext code conversion to the information ciphertext Accessible information ciphertext after conversion is returned into operating system;
(4), the operating system is handled or/and is calculated to accessible information ciphertext, and obtains information processing result Ciphertext;
(5), before the ciphertext of the information processing result is pushed to user or application (interface), the operating system first to Encrypting module proposes to carry out the request of ciphertext code conversion to the ciphertext of information processing result, and the ciphertext of information processing result is sent out Give encrypting module;The operating system intercepts simultaneously will show or apply (interface) by image to be processed and/or text Information;
(6), the encrypting module carries out the information processing after conversion after ciphertext code conversion the ciphertext of information processing result As a result ciphertext returns to operating system;
(7), the operating system melts the ciphertext of the information processing result after the information and conversion of not requesting safe handling Symphysis is shown or at corresponding with user or application (interface) information request using (interface) accessible information processing knot The display screen of fruit, single device is shown or the cipher-text information of application (interface) processing information processing result.
The embodiments of the present invention are implemented as follows, a kind of processing of single device information security and interactive system, including display screen And operating system, encrypted file system, function call interception card module and encrypting module are provided in the operating system,
User or application (interface), which issue dynamic ciphertext security information to its file system using the operating system of single device, asks It asks, the information includes information in plain text and/or information ciphertext, the information security request include file system to information plaintext It carries out coding encrypting or/and carries out the request of ciphertext conversion dynamic generation information ciphertext to the information ciphertext;
The file system carries out coding encrypting or close to the information to the proposition of the encrypting module of operating system in plain text to the information Text carries out the request of ciphertext code conversion, and the information plaintext or cipher text is sent to encrypting module simultaneously;
The encrypting module carries out coding encrypting in plain text to the information or will turn after carrying out ciphertext code conversion to the information ciphertext Accessible information ciphertext after changing returns to operating system;
The operating system handles accessible information ciphertext, and obtains the ciphertext of information processing result;
Before the ciphertext of the information processing result is pushed to user or application (interface), the operating system is first to encryption mould Block proposes to carry out the request of ciphertext code conversion to the ciphertext of information processing result, and the ciphertext of information processing result is sent to and is added Close module;The operating system intercepts simultaneously will show or apply (interface) by image to be processed and/or text information;
The encrypting module carries out the information processing result after conversion after ciphertext code conversion the ciphertext of information processing result Ciphertext return to operating system;
The operating system will not request the information of safe handling to carry out merging life with the ciphertext of the information processing result after conversion At it is corresponding with user information request show or using (interface) accessible information processing as a result, single device display screen The cipher-text information of display or application (interface) processing information processing result.
Single device information security processing disclosed by the invention and exchange method and its system have the following characteristics that
1. information is all in links such as computer, the hard disk of mobile phone terminal, memory, CPU, application code, network, screen caches Ciphertext state can directly carry out close state conversion between ciphertext, without being decrypted into plain text.
2. ciphertext state of the information in terminal hard disk and in other component, for example, memory, CPU, application code, network, Disposable stochastic transformation relationship mathematically is only existed between ciphertext state in screen cache, it can not be from the ciphertext in these components Find on hard disk for ciphertext.
3. even if can not also find corresponding ciphertext on hard disk, no information needs to be decrypted into computer and application in plain text Injure the safety of ciphertext in hard disk.
4. human-computer interaction is also to be completed by disposable ciphertext, the usability for not influencing information is consistent with user experience Property.
5. the said shank that ciphertext is encoded with customized Unicode can not be understood and be closed by other application and coding mode Method uses.
6. the said shank that ciphertext is encoded with customized Unicode, as long as supporting the code of Unicode standard, code layer It will not all report an error.
Dot chart (font), sound, phonetic, gesture (blind language/code word etc.), the shape of the mouth as one speaks or other characteristics of a ciphertext more than 7. are logical Special/non-special rendering or the superposition of other specially treated effects are crossed, people or other special installation/interface/services can be formed Deng it will be appreciated that effect.
8. disposable transformation can be carried out between ciphertext and ciphertext, the safety of ciphertext is not injured.
9. a certain disposable coding of a ciphertext may disposably encode identical, but point with a certain of another ciphertext The system of battle formations (font), sound, phonetic, gesture (blind language/code word etc.), the shape of the mouth as one speaks or other special characteristics are different, this does not injure ciphertext Safety.
10. the dot chart of each ciphertext, sound, phonetic, gesture (blind language/code word etc.), the shape of the mouth as one speaks or other special characteristics It can be disposable continually changing, but the dot chart (font) of one or a set of ciphertext, sound, phonetic, gesture (blind language/dark Language etc.), the shape of the mouth as one speaks or other special characteristics can be by special/non-special rendering or the superposition of other specially treated effects it is constant Or by certain certification rule variation, specifically how to change and all handled by the requirement of security algorithm.
Detailed description of the invention
Fig. 1 is the schematic illustration of the processing of single device information security and exchange method of the invention.
Specific embodiment
In order to which technical problems, technical solutions and advantages to be solved are more clearly understood, tie below Accompanying drawings and embodiments are closed, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only To explain the present invention, it is not intended to limit the present invention.
It please refers to shown in Fig. 1, single device information security processing of the invention and exchange method preferred embodiment, including as follows Specific steps:
(1), user or application (interface) issue the close cultural security of dynamic to its file system using the operating system of single device and believe Breath request, the information includes information in plain text and/or information ciphertext, the information security request include file system to the information Coding encrypting is carried out in plain text or/and the request of ciphertext conversion dynamic generation information ciphertext etc. is carried out to the information ciphertext.
(2), the file system proposes to carry out the information in plain text to the encrypting module being arranged in single device memory Coding encrypting carries out the request of ciphertext code conversion to the information ciphertext, and the information plaintext or cipher text is sent to encryption simultaneously Module.In this step, the dot chart of ciphertext is stored and is transmitted using font form.
(3), the encrypting module carries out coding encrypting to the information in plain text or carries out ciphertext code conversion to information ciphertext The accessible information ciphertext after conversion is returned into operating system afterwards.After the conversion for returning to operating system in step (3) Information ciphertext be it is disposable, information is only converted between close state, even if computer CPU does not all reach the bright of information Text, the also not no plaintext of information in memory.The dot chart of ciphertext is stored and is transmitted using font form.
(4), the operating system is handled or/and is calculated to accessible information ciphertext, and obtains information processing knot The ciphertext of fruit.In this step, processing mode includes the various modes such as safe handling, logical process.
(5), before the ciphertext of the information processing result is pushed to user or application (interface), the operating system It first proposes to carry out the ciphertext of information processing result the request of ciphertext code conversion to encrypting module, and by the close of information processing result Text is sent to encrypting module;The operating system simultaneously intercept will show or by it is to be processed application (interface) image and/ Or text information.
(6), the encrypting module carries out the information after conversion after ciphertext code conversion the ciphertext of information processing result The ciphertext of processing result returns to operating system.Information processing result after returning to the conversion of operating system in step (6) Ciphertext be it is disposable, the only talent can see and understand or/and specific could authenticate using (interface) to wrong.
(7), the operating system by the ciphertext of the information processing result after the information and conversion of not requesting safe handling into Row fusion generates show or using (interface) accessible information at corresponding with user or application (interface) information request Reason is as a result, the display screen of single device is shown or the cipher-text information of application (interface) processing information processing result.In step (7) The fusion results for being sent to display screen or application (interface) are disposable ciphertexts, merge after refreshing, is interactive and implementing result Binary coding is not identical every time, that people sees or be that can understand and constant using the semanteme that (interface) receives content.
In the present invention, information not only includes text information, further include the dot matrix of information, image, audio, phonetic, sign language, Other characteristics such as labiomaney, foreign language, dialect.The said shank that ciphertext is encoded with customized Unicode, can not be by other coding modes Understand and legal use.The said shank that ciphertext is encoded with customized Unicode, as long as supporting the code of Unicode standard, all It will not report an error, it is transparent to application.
A kind of single device information security processing of the invention and interactive system, including display screen and operating system, described Encrypted file system, function call interception card module and encrypting module, user or application (interface) are provided in operating system It issues dynamic ciphertext security information to its file system using the operating system of single device to request, the information includes that information is bright Text and/or information ciphertext, the information security request include that file system carries out coding encrypting to the information or/and to this in plain text Information ciphertext carries out the request of ciphertext conversion dynamic generation information ciphertext etc..Encrypting module of the file system to operating system It proposes to carry out coding encrypting in plain text to the information or the request of ciphertext code conversion is carried out to the information ciphertext, and simultaneously by the information Plaintext or cipher text is sent to encrypting module.The encrypting module to the information in plain text carry out coding encrypting or to the information ciphertext into The accessible information ciphertext after conversion is returned into operating system after row ciphertext code conversion.The operating system is to can handle Information ciphertext handled or/and calculated, and obtain the ciphertext of information processing result.In the ciphertext of the information processing result Be pushed to before user or application (interface), the operating system first to encrypting module propose to the ciphertext of information processing result into The request of row ciphertext code conversion, and the ciphertext of information processing result is sent to encrypting module;The operating system intercepts simultaneously It will show or apply (interface) by image to be processed and/or text information.The encrypting module is to information processing result The ciphertext of the information processing result after conversion is returned into operating system after ciphertext progress ciphertext code conversion.The operating system The information of safe handling and the ciphertext of the information processing result after conversion will not requested merge generation and user or apply (to connect Mouthful) information request is corresponding shows or using (interface) accessible information processing result ciphertext, the display screen of single device Display or application (interface) handle information processing result cipher-text information.
The ciphertext of information processing result after the conversion for returning to operating system is disposably that information is only in close state Between converted, even if computer CPU does not all reach the plaintext of information, the also not no plaintext of information in memory.The return To showing after the conversion of associated server or using the ciphertext of (interface) accessible information processing result be it is disposable, Only the talent, which can see, understands or/and could specifically authenticate using (interface) to mistake.It is described be sent to display screen or application (connect Mouthful) fusion results be it is disposable, the only talent can see and understand or/and specific could authenticate using (interface) to the close of mistake Text, merged after refreshing, interactive and implementing result binary coding it is not identical every time, it is that people sees or in receiving using (interface) The semanteme of appearance is to understand and constant.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (8)

1. a kind of single device information security processing and exchange method, which is characterized in that comprise the following specific steps that:
(1), user or application (interface) issue the close cultural security of dynamic to its file system using the operating system of single device and believe Breath request, the information includes information in plain text and/or information ciphertext, the information security request include file system to the information Coding encrypting is carried out in plain text or/and the request of ciphertext conversion dynamic generation new information ciphertext is carried out to the information ciphertext;
(2), the file system proposes to encode the information in plain text to the encrypting module being arranged in single device memory Encryption carries out the request of ciphertext code conversion to the information ciphertext, and the information plaintext or cipher text is sent to encryption mould simultaneously Block;
(3), after the encrypting module carries out coding encrypting to the information in plain text or carries out ciphertext code conversion to the information ciphertext Accessible information ciphertext after conversion is returned into operating system;
(4), the operating system is handled or/and is calculated to accessible information ciphertext, and obtains information processing result Ciphertext;
(5), before the ciphertext of the information processing result is pushed to user or application (interface), the operating system first to Encrypting module proposes to carry out the request of ciphertext code conversion to the ciphertext of information processing result, and the ciphertext of information processing result is sent out Give encrypting module;The operating system simultaneously intercept will show or by it is to be processed application (interface) image and/or text Word information;
(6), the encrypting module carries out the information processing after conversion after ciphertext code conversion the ciphertext of information processing result As a result ciphertext returns to operating system;
(7), the operating system melts the ciphertext of the information processing result after the information and conversion of not requesting safe handling Symphysis is shown or at corresponding with user or application (interface) information request using (interface) accessible information processing knot The display screen of fruit, single device is shown or the cipher-text information of application (interface) processing information processing result.
2. single device information security processing as described in claim 1 and exchange method, which is characterized in that returned in step (3) It is disposably that information is only converted between close state, even if computer CPU back to the information ciphertext after the conversion of operating system The plaintext of information is not all reached, the yet not no plaintext of information in memory.
3. single device information security processing as described in claim 1 and exchange method, which is characterized in that returned in step (6) Ciphertext back to the information processing result after the conversion of operating system be it is disposable, only the talent can see it is clear or/and specific Application (interface) could authenticate to wrong.
4. single device information security processing as described in claim 1 and exchange method, which is characterized in that sent out in step (7) The fusion results for being sent to display screen or application (interface) are disposable ciphertexts, fusion, interactive and implementing result two after refreshing Scale coding is not identical every time, that people sees or be that can understand and constant using the semanteme that (interface) receives content.
5. a kind of single device information security processing and interactive system, which is characterized in that including display screen and operating system, described Encrypted file system, function call interception card module and encrypting module are provided in operating system,
User or application (interface), which issue dynamic ciphertext security information to its file system using the operating system of single device, asks It asks, the information includes information in plain text and/or information ciphertext, the information security request include file system to information plaintext It carries out coding encrypting or/and carries out the request of ciphertext conversion dynamic generation information ciphertext to the information ciphertext;
The file system carries out coding encrypting or close to the information to the proposition of the encrypting module of operating system in plain text to the information Text carries out the request of ciphertext code conversion, and the information plaintext or cipher text is sent to encrypting module simultaneously;
The encrypting module will turn after progress coding encrypting or the information ciphertext carry out ciphertext code conversion in plain text to the information Accessible information ciphertext after changing returns to operating system;
The operating system is handled or/and is calculated to accessible information ciphertext, and obtains the ciphertext of information processing result;
Before the ciphertext of the information processing result is pushed to user or application (interface), the operating system is first to encryption mould Block proposes to carry out the request of ciphertext code conversion to the ciphertext of information processing result, and the ciphertext of information processing result is sent to and is added Close module;The operating system intercepts the image and/or text information that will be shown or will handle using (interface) simultaneously;
The encrypting module carries out the information processing result after conversion after ciphertext code conversion the ciphertext of information processing result Ciphertext return to operating system;
The operating system will not request the information of safe handling to carry out merging life with the ciphertext of the information processing result after conversion At with user or application (interface) information request it is corresponding show or using (interface) accessible information processing as a result, list The display screen of equipment is shown or the cipher-text information of application (interface) processing information processing result.
6. single device information security processing as claimed in claim 5 and interactive system, which is characterized in that described to return to operation Information ciphertext after the conversion of system is disposably that information is only converted between close state, even if computer CPU all contacts not To the plaintext of information, the also not no plaintext of information in memory.
7. single device information security processing as claimed in claim 5 and interactive system, which is characterized in that described to return to operation The ciphertext of information processing result after the conversion of system is that disposably, only the talent can see that clear or/and specific application (connects Mouthful) could authenticate to mistake.
8. single device information security processing as claimed in claim 5 and interactive system, which is characterized in that described to be sent to display Screen or the fusion results of application (interface) are disposable ciphertexts, are merged after refreshing, interactive and implementing result binary coding It is not identical every time, it is that people sees or be that can understand and constant using the semanteme that (interface) receives content.
CN201711169330.3A 2017-11-22 2017-11-22 A kind of processing of single device information security and exchange method and its interactive system Withdrawn CN109858240A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711169330.3A CN109858240A (en) 2017-11-22 2017-11-22 A kind of processing of single device information security and exchange method and its interactive system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711169330.3A CN109858240A (en) 2017-11-22 2017-11-22 A kind of processing of single device information security and exchange method and its interactive system

Publications (1)

Publication Number Publication Date
CN109858240A true CN109858240A (en) 2019-06-07

Family

ID=66887467

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711169330.3A Withdrawn CN109858240A (en) 2017-11-22 2017-11-22 A kind of processing of single device information security and exchange method and its interactive system

Country Status (1)

Country Link
CN (1) CN109858240A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114219052A (en) * 2022-02-23 2022-03-22 富算科技(上海)有限公司 Graph data fusion method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1885298A (en) * 2006-07-11 2006-12-27 北京飞天诚信科技有限公司 Secure information storage method and information security apparatus thereof
US20080208948A1 (en) * 2007-02-27 2008-08-28 Panetta Karen A Methods and apparatus for using boolean derivatives to process data
CN103379483A (en) * 2012-04-16 2013-10-30 中兴通讯股份有限公司 Method, device and mobile terminal for mobile terminal information security management
CN104994068A (en) * 2015-05-22 2015-10-21 武汉大学 Multimedia content protection and safe distribution method in cloud environment
CN107196765A (en) * 2017-07-19 2017-09-22 武汉大学 A kind of remote biometric characteristic identity authentication method for strengthening secret protection

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1885298A (en) * 2006-07-11 2006-12-27 北京飞天诚信科技有限公司 Secure information storage method and information security apparatus thereof
US20080208948A1 (en) * 2007-02-27 2008-08-28 Panetta Karen A Methods and apparatus for using boolean derivatives to process data
CN103379483A (en) * 2012-04-16 2013-10-30 中兴通讯股份有限公司 Method, device and mobile terminal for mobile terminal information security management
CN104994068A (en) * 2015-05-22 2015-10-21 武汉大学 Multimedia content protection and safe distribution method in cloud environment
CN107196765A (en) * 2017-07-19 2017-09-22 武汉大学 A kind of remote biometric characteristic identity authentication method for strengthening secret protection

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114219052A (en) * 2022-02-23 2022-03-22 富算科技(上海)有限公司 Graph data fusion method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US20210312334A1 (en) Model parameter training method, apparatus, and device based on federation learning, and medium
EP3319069B1 (en) Method for authenticating a user by means of a non-secure terminal
CN108769027B (en) Secure communication method, device, mobile terminal and storage medium
US8666065B2 (en) Real-time data encryption
CN106022017B (en) The methods, devices and systems of Password Input are realized by dummy keyboard
MY172709A (en) Method and system for abstracted and randomized one-time use passwords for transactional authentication
CN103378971B (en) A kind of data encryption system and method
CN110048848A (en) Method, system and the storage medium of session token are sent by passive client
CN104967597A (en) Third-party application message authentication method and system based on secure channel
TW201409990A (en) Communication method utilizing fingerprint information for authentication
CN107871081A (en) A kind of computer information safe system
CN101924734A (en) Identity authentication method and authentication device based on Web form
CN103701586A (en) Method and device for acquiring secret key
CN104901951A (en) Mobile terminal based cipher data processing and interaction method in Web application
US20190258829A1 (en) Securely performing a sensitive operation using a non-secure terminal
CN109858240A (en) A kind of processing of single device information security and exchange method and its interactive system
CN107370596B (en) User password encryption transmission method, system and storage medium
CN107370728B (en) Instant license generation and verification system and method based on electronic license library
CN102571323A (en) Non-standard character repertoire processing method and device, and system adopting same
CN202978979U (en) Password security keypad device and password security pad system
EP3319067B1 (en) Method for authenticating a user by means of a non-secure terminal
CN109861944A (en) A kind of distributed information safe handling and exchange method and its interactive system
US20220245287A1 (en) Encrypted human interface keyboard
CN108573581A (en) ATM initial keys setting method, device, system and storage medium
US11095435B2 (en) Keystroke dynamics anonimization

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20190607

WW01 Invention patent application withdrawn after publication