CN112052469A - Encryption method, decryption method, storage medium and terminal equipment - Google Patents

Encryption method, decryption method, storage medium and terminal equipment Download PDF

Info

Publication number
CN112052469A
CN112052469A CN202010947904.0A CN202010947904A CN112052469A CN 112052469 A CN112052469 A CN 112052469A CN 202010947904 A CN202010947904 A CN 202010947904A CN 112052469 A CN112052469 A CN 112052469A
Authority
CN
China
Prior art keywords
data
decryption
encryption
encrypted
decrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010947904.0A
Other languages
Chinese (zh)
Inventor
谷国良
彭青齐
黄佳
瞿满波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hainan Fenghuangmu Technology Co ltd
Original Assignee
Pengyuan Credit Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Pengyuan Credit Service Co ltd filed Critical Pengyuan Credit Service Co ltd
Priority to CN202010947904.0A priority Critical patent/CN112052469A/en
Publication of CN112052469A publication Critical patent/CN112052469A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention discloses an encryption method, a decryption method, a storage medium and a terminal device, wherein the encryption method comprises the following steps: acquiring data to be encrypted and an encryption question set corresponding to the data to be encrypted, acquiring an encryption answer set according to the encryption question set, and encrypting the data to be encrypted by adopting the encryption answer set; and when decrypting, the method comprises the following steps: and acquiring data to be decrypted and a decryption question set corresponding to the data to be decrypted, acquiring a decryption answer set according to the decryption question set, and decrypting the data to be decrypted by adopting the decryption answer set. Therefore, the problems of forgetting the password and the like can occur when the password encryption is set for the encrypted data, the data is encrypted by setting the problems and the answers by the user, the problems of forgetting the password and the like can occur when the password decryption is set for the decrypted data, and the data is decrypted by setting the problems and the answers by the user, so that the usability of file encryption and the safety of the data are improved.

Description

Encryption method, decryption method, storage medium and terminal equipment
Technical Field
The present invention relates to the field of data encryption technologies, and in particular, to an encryption method, a decryption method, a storage medium, and a terminal device.
Background
In recent years, people have more and more strong awareness of personal information security protection, and relevant important files of individuals may be stored in an encrypted manner. Besides directly setting password protection for files (including file compression encryption), encryption and decryption (public key encryption, private key decryption and private key protection can also be set for the private key) can be performed through encryption software, however, in any mode, the management problem of the password or the secret key exists, and if the password is forgotten or the decryption private key is lost, the problem that the files cannot be decrypted occurs.
Thus, the prior art has yet to be improved and enhanced.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide an encryption method, a decryption method, a storage medium and a terminal device, aiming at the defects of the prior art, so as to avoid the problem that a file (data) cannot be decrypted when a user forgets a password or loses a decryption private key.
The technical scheme adopted by the invention is as follows:
in a first aspect, an embodiment of the present invention provides an encryption method, where the encryption method includes:
acquiring data to be encrypted and an encryption problem set corresponding to the data to be encrypted;
determining an encryption answer corresponding to each encryption question in the encryption question set to obtain an encryption answer set;
and encrypting the data to be encrypted according to the encrypted answer set to generate encrypted data.
As a further improved technical solution, the encrypting the data to be encrypted according to the encrypted answer set to generate encrypted data specifically includes:
generating an encryption key based on the set of encrypted answers;
and encrypting the data to be encrypted according to the encryption key to generate encrypted data.
As a further improved technical solution, the generating an encryption key based on the encrypted answer set specifically includes:
splicing each encrypted answer according to the position sequence of each encrypted answer in the encrypted answer set;
and carrying out Hash operation on the spliced encryption answers to obtain an encryption key.
As a further improved technical solution, the encrypting the data to be encrypted according to the encryption key to generate encrypted data specifically includes:
and encrypting the data to be encrypted by adopting a symmetric algorithm according to the encryption key to generate encrypted data.
In a second aspect, an embodiment of the present invention provides a decryption method, where the decryption method includes:
acquiring data to be decrypted and a decryption problem set corresponding to the data to be decrypted;
determining a decryption answer corresponding to each decryption question in the decryption question set to obtain a decryption answer set;
and decrypting the data to be decrypted according to the decryption answer set to generate decrypted data.
As a further improved technical solution, the decrypting the data to be decrypted according to the decryption answer set to generate decrypted data specifically includes:
generating a decryption key based on the set of decryption answers;
and decrypting the data to be decrypted according to the decryption key to generate decrypted data.
As a further improved technical solution, the generating a decryption key based on the decryption answer set specifically includes:
splicing each decryption answer according to the position sequence of each decryption answer in the decryption answer set;
and carrying out hash operation on the spliced decryption answer to obtain a decryption key.
As a further improved technical solution, the decrypting the data to be decrypted according to the decryption key to generate decrypted data specifically includes:
and decrypting the data to be decrypted by adopting a symmetric algorithm according to the decryption key to generate decrypted data.
In a third aspect, an embodiment of the present invention provides a computer-readable storage medium storing one or more programs, which are executable by one or more processors to implement the steps in the encryption method described in any one of the above items or to implement the steps in the decryption method described in any one of the above items.
In a fourth aspect, an embodiment of the present invention provides a terminal device, which includes: a processor and memory and a communication bus; the memory has stored thereon a computer readable program executable by the processor;
the communication bus realizes connection communication between the processor and the memory;
the processor, when executing the computer readable program, implements the steps in the encryption method as described in any one of the above, or implements the steps in the decryption method as described in any one of the above.
Has the advantages that: compared with the prior art, the invention discloses an encryption method, a decryption method, a storage medium and a terminal device, wherein the encryption method comprises the following steps: acquiring data to be encrypted and an encryption question set corresponding to the data to be encrypted, acquiring an encryption answer set according to the encryption question set, and encrypting the data to be encrypted by adopting the encryption answer set; and when decrypting, the method comprises the following steps: and acquiring data to be decrypted and a decryption question set corresponding to the data to be decrypted, acquiring a decryption answer set according to the decryption question set, and decrypting the data to be decrypted by adopting the decryption answer set. Therefore, the problems of forgetting the password and the like can occur when the password encryption is set for the encrypted data, the data is encrypted by setting the problems and the answers by the user, the problems of forgetting the password and the like can occur when the password decryption is set for the decrypted data, and the data is decrypted by setting the problems and the answers by the user, so that the usability of file encryption and the safety of the data are improved.
Drawings
Fig. 1 is a flowchart of an embodiment of an encryption method provided in the present invention.
Fig. 2 is a flowchart of an embodiment of a decryption method provided by the present invention.
Fig. 3 is a schematic diagram of a terminal device structure provided by the present invention.
Detailed Description
The present invention provides an encryption method, a decryption method, a storage medium and a terminal device, and in order to make the objects, technical solutions and effects of the present invention clearer and clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The invention will be further explained by the description of the embodiments with reference to the drawings.
The present embodiment provides an encryption method, as shown in fig. 1, the method includes:
s100, acquiring data to be encrypted and an encryption problem set corresponding to the data to be encrypted.
In the embodiment, aiming at the problems that password encryption is set for data to be encrypted, passwords are forgotten and the like, the data encryption is carried out in a mode that a user sets the problems and answers by himself, correspondingly, in the embodiment, the data to be encrypted is obtained, meanwhile, an encryption problem set corresponding to the data to be encrypted is also obtained, the encryption problem set can correspond to one, two or more encryption problems, in addition, the encryption problems are set when the user encrypts the data to be encrypted, the problems can be dynamically set according to the actual conditions and requirements of the user, and therefore the user can set different difficult and easy problems according to the confidentiality of the data. In this embodiment, the confidentiality of the file to be encrypted is related to the guessability of the question itself, that is, for an encrypted question that is harder to answer by a non-user, the data is more confidential, and in practical application, the user can set 1 to N questions, that is, the greater the number of questions, the greater the difficulty in guessing answers to all the questions, the stronger the file confidentiality is. It should be noted that the setting of the encryption problem can be applied to many scenarios, the problem setting itself has no limitation, except that the description content length can require limitation, and one encryption problem content is too long and has little meaning to be described clearly.
S200, determining an encryption answer corresponding to each encryption question in the encryption question set to obtain an encryption answer set.
Specifically, the encryption problem set includes a plurality of encryption problems, and if a password for a plurality of persons is required to be set to encrypt data, the data needs to be decrypted by the plurality of persons inputting the password set by the plurality of persons at the same time. Such a scenario may set the encryption problem as follows: the method has the advantages that when data to be decrypted is decrypted, the display of decryption problems has prompt effects (the password of Zusanli, the password of Lisiu and the password of Wangpen), so that the method is more beneficial to scenes needing to specify the password sequence, compared with the simple multiple compression encryption of files (data) to achieve the effect of multiple or multiple encryption, and when a user does not need to prompt the scene of the password sequence, the problem is set to be the problem of no prompt content like the password one, the password two and the password three.
On the other hand, the problem of setting is practically unlimited, but the more unknowable the problem of user setting is, the more the confidentiality of data is. For example, in a company, to encrypt its own file data, the following problem may be set: the name of old jiu, the fat true name of old classmates, child's ID card number and the like can't know the problem generally, it is more to relate to the scene to file data security, can combine several problems to set up, will be stronger to the protectiveness of file. It can be understood that the setting of the encryption question is actually the setting of a question that can be answered by oneself, but not by oneself. The encryption and decryption mode of setting the question and the answer not only solves the problem that the password is easy to forget, but also can meet the requirement of the user on the protection of the file data. On the other hand, the method solves the problem that the conventional encryption and decryption have limitations, for example, when multiple encryption is needed, the order of the passwords needs to be prompted.
S300, encrypting the data to be encrypted according to the encrypted answer set to generate encrypted data.
In this embodiment, the obtaining of the encrypted data according to a pre-generated encryption key, and correspondingly encrypting the data to be encrypted according to the encrypted answer set to generate the encrypted data specifically includes:
s301, generating an encryption key based on the encryption answer set.
In this embodiment, generating an encryption key based on the encrypted answer set specifically includes:
s3011, splicing each encrypted answer according to the position sequence of each encrypted answer in the encrypted answer set;
s3012, performing hash operation on the spliced encrypted answers to obtain an encryption key.
In this embodiment, each encrypted answer is spliced according to the position sequence of each encrypted answer in the encrypted answer set, so that a spliced encrypted answer can be obtained, and then hash operation is performed on the spliced encrypted answer to obtain an encryption key. In practical application, the hash operation of the encrypted answer is only one application in technology, and is substantially to generate the most critical key of the data to be encrypted according to the encrypted answer. For example: when encryption is performed, two questions are set, the name of old jiu, the true name of old classmate are also input as answers, the corresponding standard answers (zhang san and lie quan) are also input simultaneously, and then the answer one (zhang) and the answer two (lie quan) are spliced into zhang trillin quan', the character string is subjected to Hash (such as MD5) to obtain the value of 7b421930127f4bb35626d9da1aa0a73b, so that the encryption key can be obtained, wherein the encryption key is 7b421930127f4bb35626d9da1aa0a73 b. In practical application, when a user inputs answers to questions, the answers can be displayed and protected, and whether the answers are password answers or other question answers can be displayed in a star mode, so that the data security is improved.
S302, encrypting the data to be encrypted according to the encryption key to generate encrypted data.
In this embodiment, after obtaining the encryption key, the to-be-encrypted data may be further encrypted according to the encryption key, for example, the encryption key is 7b421930127f4bb35626d9da1aa0a73b, and then the to-be-encrypted data is encrypted according to the encryption key, and accordingly, in practical application, encrypting the to-be-encrypted data according to the encryption key to generate the encrypted data specifically includes: and encrypting the data to be encrypted by adopting a symmetric algorithm according to the encryption key to generate encrypted data.
Based on the above encryption method, this embodiment further provides a decryption method, as shown in fig. 2, where the decryption method is used to decrypt the encrypted data obtained by the encryption method according to the above embodiment, and the decryption method includes:
h100, acquiring data to be decrypted and a decryption problem set corresponding to the data to be decrypted.
Specifically, the data to be decrypted is the encrypted data obtained by the encryption method in the above embodiment, and it can be understood that the decryption problem sets correspond to the encryption problem sets one to one, and in practical application, the data to be decrypted carries the decryption problem sets, so that the playback of the decryption problem during decryption is facilitated. Conveniently for obtaining the decryption answer from the decryption question.
And H200, determining a decryption answer corresponding to each decryption question in the decryption question set to obtain a decryption answer set.
Specifically, the decryption question set includes a plurality of decryption questions, the plurality of decryption questions may be displayed on the software interface according to respective position sequences in the set, and the user needs to input a decryption answer corresponding to each decryption question, so that a decryption answer set may be obtained, and thus, the data to be decrypted is decrypted according to the decryption answer set.
And H300, decrypting the data to be decrypted according to the decrypted answer set to generate decrypted data.
In this embodiment, decrypting the data to be decrypted according to the decrypted answer set to generate decrypted data specifically includes:
and H301, generating a decryption key based on the decryption answer set.
In this embodiment, generating a decryption key based on the decryption answer set specifically includes:
h3011, splicing each decryption answer according to the position sequence of each decryption answer in the decryption answer set;
h3012, carrying out hash operation on the spliced decryption answers to obtain a decryption key.
In this embodiment, each decryption answer is spliced according to the position sequence of each decryption answer in the decryption answer set, so that a spliced decryption answer can be obtained, and then hash operation is performed on the spliced decryption answer to obtain a decryption key. In practical application, the hash operation of the decryption answer is only one application in the technology, and is substantially to generate the most critical key of the data to be encrypted according to the decryption answer. It should be noted that the hash operation used in step H3012 uses the same algorithm as the hash operation used in the above encryption method, and if the answer returned by the user during decryption is correct and is equal to the key of the data to be encrypted and decrypted, the encryption and decryption can be successful.
And H302, decrypting the data to be decrypted according to the decryption key to generate decrypted data.
In this embodiment, after obtaining the decryption key, the to-be-decrypted data may be further decrypted according to the decryption key, for example, the decryption key is 7b421930127f4bb35626d9da1aa0a73b, and then the to-be-decrypted data is decrypted according to the decryption key, and accordingly, in practical application, the decrypting the to-be-decrypted data according to the decryption key to generate the decrypted data specifically includes: and decrypting the data to be decrypted by adopting a symmetric algorithm according to the decryption key to generate decrypted data.
In summary, compared with the prior art, the embodiment of the invention has the following advantages:
the invention discloses an encryption method and a decryption method, wherein the method comprises the following steps: acquiring data to be encrypted and an encryption question set corresponding to the data to be encrypted, acquiring an encryption answer set according to the encryption question set, and encrypting the data to be encrypted by adopting the encryption answer set; and when decrypting, the method comprises the following steps: and acquiring data to be decrypted and a decryption question set corresponding to the data to be decrypted, acquiring a decryption answer set according to the decryption question set, and decrypting the data to be decrypted by adopting the decryption answer set. Therefore, the problems of forgetting the password and the like can occur when the password encryption is set for the encrypted data, the data is encrypted by setting the problems and the answers by the user, the problems of forgetting the password and the like can occur when the password decryption is set for the decrypted data, and the data is decrypted by setting the problems and the answers by the user, so that the usability of file encryption and the safety of the data are improved.
Based on the encryption method and the decryption method, the present invention also provides a computer-readable storage medium storing one or more programs, which are executable by one or more processors to implement the steps in the encryption method according to the above embodiment or to implement the steps in the decryption method according to the above embodiment.
Based on the above encryption method and decryption method, the present invention also provides a terminal device, as shown in fig. 3, which includes at least one processor (processor) 20; a display screen 21; and a memory (memory)22, and may further include a communication Interface (Communications Interface)23 and a bus 24. The processor 20, the display 21, the memory 22 and the communication interface 23 can communicate with each other through the bus 24. The display screen 21 is configured to display a user guidance interface preset in the initial setting mode. The communication interface 23 may transmit information. The processor 20 may call logic instructions in the memory 22 to perform the methods in the embodiments described above.
Furthermore, the logic instructions in the memory 22 may be implemented in software functional units and stored in a computer readable storage medium when sold or used as a stand-alone product.
The memory 22, which is a computer-readable storage medium, may be configured to store a software program, a computer-executable program, such as program instructions or modules corresponding to the methods in the embodiments of the present disclosure. The processor 20 executes the functional application and data processing, i.e. implements the method in the above-described embodiments, by executing the software program, instructions or modules stored in the memory 22.
The memory 22 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal device, and the like. Further, the memory 22 may include a high speed random access memory and may also include a non-volatile memory. For example, a variety of media that can store program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk, may also be transient storage media.
In addition, the specific processes loaded and executed by the storage medium and the instruction processors in the terminal device are described in detail in the method, and are not stated herein.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. An encryption method, characterized in that the encryption method comprises:
acquiring data to be encrypted and an encryption problem set corresponding to the data to be encrypted;
determining an encryption answer corresponding to each encryption question in the encryption question set to obtain an encryption answer set;
and encrypting the data to be encrypted according to the encrypted answer set to generate encrypted data.
2. The encryption method according to claim 1, wherein the encrypting the data to be encrypted according to the encrypted answer set to generate encrypted data specifically includes:
generating an encryption key based on the set of encrypted answers;
and encrypting the data to be encrypted according to the encryption key to generate encrypted data.
3. The encryption method according to claim 2, wherein the generating an encryption key based on the encrypted answer set specifically includes:
splicing each encrypted answer according to the position sequence of each encrypted answer in the encrypted answer set;
and carrying out Hash operation on the spliced encryption answers to obtain an encryption key.
4. The encryption method according to claim 2, wherein the encrypting the data to be encrypted according to the encryption key to generate encrypted data specifically includes:
and encrypting the data to be encrypted by adopting a symmetric algorithm according to the encryption key to generate encrypted data.
5. A decryption method, characterized in that the decryption method comprises:
acquiring data to be decrypted and a decryption problem set corresponding to the data to be decrypted;
determining a decryption answer corresponding to each decryption question in the decryption question set to obtain a decryption answer set;
and decrypting the data to be decrypted according to the decryption answer set to generate decrypted data.
6. The decryption method according to claim 5, wherein the decrypting the data to be decrypted according to the decrypted answer set to generate decrypted data specifically includes:
generating a decryption key based on the set of decryption answers;
and decrypting the data to be decrypted according to the decryption key to generate decrypted data.
7. The decryption method according to claim 6, wherein the generating a decryption key based on the decrypted answer set specifically includes:
splicing each decryption answer according to the position sequence of each decryption answer in the decryption answer set;
and carrying out hash operation on the spliced decryption answer to obtain a decryption key.
8. The decryption method according to claim 6, wherein the decrypting the data to be decrypted according to the decryption key to generate decrypted data specifically includes:
and decrypting the data to be decrypted by adopting a symmetric algorithm according to the decryption key to generate decrypted data.
9. A computer readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to perform the steps in the encryption method according to any one of claims 1 to 4 or to perform the steps in the decryption method according to any one of claims 5 to 8.
10. A terminal device, comprising: a processor and memory and a communication bus; the memory has stored thereon a computer readable program executable by the processor;
the communication bus realizes connection communication between the processor and the memory;
the processor, when executing the computer readable program, implements the steps in the encryption method of any one of claims 1 to 4 or implements the steps in the decryption method of any one of claims 5 to 8.
CN202010947904.0A 2020-09-10 2020-09-10 Encryption method, decryption method, storage medium and terminal equipment Pending CN112052469A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010947904.0A CN112052469A (en) 2020-09-10 2020-09-10 Encryption method, decryption method, storage medium and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010947904.0A CN112052469A (en) 2020-09-10 2020-09-10 Encryption method, decryption method, storage medium and terminal equipment

Publications (1)

Publication Number Publication Date
CN112052469A true CN112052469A (en) 2020-12-08

Family

ID=73611426

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010947904.0A Pending CN112052469A (en) 2020-09-10 2020-09-10 Encryption method, decryption method, storage medium and terminal equipment

Country Status (1)

Country Link
CN (1) CN112052469A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014183671A1 (en) * 2013-05-17 2014-11-20 天津书生投资有限公司 Safety control method for cloud storage
CN109587276A (en) * 2019-01-11 2019-04-05 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of data back up method, system and associated component
US20200389302A1 (en) * 2017-12-15 2020-12-10 Orange Technique for protecting a cryptographic key by means of a user password

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014183671A1 (en) * 2013-05-17 2014-11-20 天津书生投资有限公司 Safety control method for cloud storage
US20200389302A1 (en) * 2017-12-15 2020-12-10 Orange Technique for protecting a cryptographic key by means of a user password
CN109587276A (en) * 2019-01-11 2019-04-05 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of data back up method, system and associated component

Similar Documents

Publication Publication Date Title
US9673975B1 (en) Cryptographic key splitting for offline and online data protection
TWI578749B (en) Methods and apparatus for migrating keys
CN112165490B (en) Encryption method, decryption method, storage medium and terminal equipment
CN108712412B (en) Database encryption and decryption methods and devices, storage medium and terminal
CA2701061C (en) Method and system for recovering a security credential
US9313185B1 (en) Systems and methods for authenticating devices
CN105005731A (en) Data encryption and decryption methods and mobile terminal
WO2016045464A1 (en) Decryption method and mobile terminal
WO2017050152A1 (en) Password security system adopted by mobile apparatus and secure password entering method thereof
KR101625785B1 (en) Method and device for information security management of mobile terminal, and mobile terminal
US20180225467A1 (en) Method and system for data protection
KR100954841B1 (en) Method and Apparatus of managing unity data on mobile device and Recording medium using this
EP3866039A1 (en) Method and system for protecting authentication credentials
CN106845264A (en) Using encryption method, device and application access method, device
CN113726515B (en) UKEY-based key processing method, storage medium and electronic device
CN107135074A (en) A kind of advanced security method and apparatus
CN112052469A (en) Encryption method, decryption method, storage medium and terminal equipment
CN112637140A (en) Password transmission method, terminal, server and readable storage medium
CN111859423A (en) Information security encryption method and device
JP2007150780A (en) Enciphering method, apparatus and program
US20230388115A1 (en) Non-Custodial Backup and Recovery
CN114297715B (en) File encryption method, file processing method, file encryption device, file processing device and electronic equipment
US20220278974A1 (en) System, device and methods for secure exchange of text messages
CN114329510A (en) Digital authorization method, device, terminal equipment and storage medium
EP3982592A1 (en) Identity verification program, identity verification method, user terminal, and user authentication program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220601

Address after: 570100 Room 102, 1st floor, building B28, zone B, Hainan Ecological Software Park, high tech industry demonstration zone, Laocheng Town, Chengmai County, Haikou City, Hainan Province

Applicant after: Hainan fenghuangmu Technology Co.,Ltd.

Address before: 518040 4th floor, Sunshine Golf building, 7008 Shennan Avenue, Futian District, Shenzhen City, Guangdong Province

Applicant before: PENGYUAN CREDIT SERVICE CO.,LTD.