WO2012006830A1 - Mobile terminal and encryption method thereof - Google Patents

Mobile terminal and encryption method thereof Download PDF

Info

Publication number
WO2012006830A1
WO2012006830A1 PCT/CN2010/077893 CN2010077893W WO2012006830A1 WO 2012006830 A1 WO2012006830 A1 WO 2012006830A1 CN 2010077893 W CN2010077893 W CN 2010077893W WO 2012006830 A1 WO2012006830 A1 WO 2012006830A1
Authority
WO
WIPO (PCT)
Prior art keywords
password
mobile terminal
file
encryption
encryption level
Prior art date
Application number
PCT/CN2010/077893
Other languages
French (fr)
Chinese (zh)
Inventor
王武斌
张芝萍
傅启洪
裴莉辉
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2012006830A1 publication Critical patent/WO2012006830A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • the present invention relates to the field of communications, and in particular to a mobile terminal and an encryption method thereof.
  • BACKGROUND At present, various types of mobile terminals have a password protection function, which can generally protect important files or information stored in a mobile terminal by setting a password, and only the correct password can be input to view the encrypted content. This method effectively prevents the leakage of information, but at the same time, there are also hidden dangers: People who are closely related to the owner of the mobile terminal (such as a lover, a child, etc.) may obtain the password by asking the owner of the mobile terminal, and then The mobile terminal decrypts to know the encrypted content in the mobile terminal.
  • the current mobile terminal encryption technology, encryption or decryption operation is public, and anyone may know that the mobile terminal is encrypted, thereby causing the above to move in the case that some people have to inform the mobile terminal of the password. Exposure of encrypted information in the terminal.
  • the present invention is directed to the disclosure of an operation of encrypting or decrypting a mobile terminal in the related art, thereby causing anyone to know that the mobile terminal has been encrypted. Therefore, the main object of the present invention is to provide a mobile terminal and Its encryption method to solve the above problems.
  • a mobile terminal is provided.
  • the mobile terminal of the present invention includes: a password management module, configured to manage a first password and a second password of the mobile terminal, where the first password is used to encrypt a file of a first encryption level in the mobile terminal, The second password is used to encrypt the file of the second encryption level in the mobile terminal, and the second encryption level is higher than the first encryption level; the password receiving module is configured to receive the first password or the second password input by the user of the mobile terminal. And a file display module, configured to display the first encryption level file in the first password; and a file for displaying the first encryption level and the second encryption level according to the second password.
  • the mobile terminal further includes: a receiving module, configured to receive an encrypted message that encrypts the file; a determining module, configured to determine whether the password received by the password receiving module is a second password; and the encryption module is configured to: Yes, according to the encrypted message, the second encryption level is used to encrypt the file with the second password.
  • the password management module is further configured to set the second password when the mobile terminal is used for the first time.
  • the mobile terminal further includes a password repairing module, configured to prompt the user 4 to tamper with the first password and/or the second password.
  • the mobile terminal encryption method includes: the mobile terminal encrypts the file of the first encryption level using the first password, and encrypts the file of the second encryption level with the second password, wherein the second encryption level is higher than a first encryption level; the mobile terminal receives the first password input by the user, and displays the file of the first encryption level according to the first password; or the mobile terminal receives the second password input by the user, and displays the first encryption according to the second password Level file and file at the second encryption level.
  • the method further includes: the mobile terminal receives the encrypted message for encrypting the file, and the password input by the user; the mobile terminal determines whether the password is The second password; if the judgment result is yes, the mobile terminal performs an operation of encrypting the file using the second password according to the encrypted message. Further, the mobile terminal sets the second password when it is first used.
  • the method further includes: the mobile terminal receiving the first password input by the user; the mobile terminal prompting the user to select whether to perform the setting of the second password, and receiving the selection result of the user If the result of the selection is YES, the operation of setting the second password is performed. Further, if the result of the selection is no, the setting of the second password is no longer prompted in subsequent use. Further, the method further includes: the mobile terminal prompting the user to tamper with the first password and/or the second password. According to the present invention, the file display module has the first password and only displays the first encryption level.
  • the file does not prompt that the file of the second encryption level still exists, which solves the problem that the mobile terminal discloses the operation of encrypting or decrypting in the related art, thereby causing anyone to know that the mobile terminal has been encrypted, and avoiding the problem in the mobile terminal.
  • the exposure of the second encryption level file ensures file security.
  • FIG. 1 is a block diagram showing the structure of a mobile terminal according to an embodiment of the present invention
  • FIG. 2 is a block diagram showing the structure of a mobile terminal according to a preferred embodiment of the present invention
  • FIG. 3 is a mobile terminal encryption according to an embodiment of the present invention.
  • FIG. 4 is a flowchart of a mobile terminal password setting when a normal password function is turned on according to an embodiment of the present invention
  • FIG. 5 is a mobile terminal password setting when a normal password function is not turned on according to an embodiment of the present invention
  • Figure 6 is a flow chart of file browsing in an embodiment of the present invention.
  • the present invention provides an implementation method for making the encryption setting of the mobile terminal relatively invisible.
  • the method described in the present invention can achieve better implementation of others even if the mobile terminal is obtained and is familiar with the mobile.
  • FIG. 1 is a structural block diagram of a mobile terminal according to an embodiment of the present invention, including a password management module 11, a password receiving module 12, and a file display. Module 13.
  • the structure is described in detail below.
  • the password management module 11 is configured to manage the first password and the second password of the mobile terminal, where the first password is used to encrypt the file of the first encryption level in the mobile terminal, and the second password is used to the mobile terminal.
  • the file of the second encryption level is encrypted, and the second encryption level is higher than the first encryption level.
  • the password receiving module 12 is configured to receive a first password or a second password input by a user of the mobile terminal.
  • the file display module 13 is connected to the password management module 11 and the password receiving module 12, and configured to display the first encryption level file corresponding to the first password managed by the password management module 11 according to the first password received by the password receiving module 12; For the second password received by the password receiving module 12, the file of the first encryption level corresponding to the first password managed by the password management module 11 and the file of the second encryption level corresponding to the second password managed by the password management module 11 are displayed. It should be noted that, when the file display module 13 displays the first encryption level file corresponding to the first password managed by the password management module 11 according to the first password received by the password receiving module 12, the second encryption is not prompted. Level file.
  • the mobile terminal discloses an operation of encrypting or decrypting, thereby causing anyone to know that the mobile terminal has been encrypted.
  • the mobile terminal uses two sets of passwords of the first password and the second password, and when the user inputs the first password, the mobile terminal only displays the file of the first encryption level corresponding to the first password, and The user is prompted to have a second encryption level file. Since the user who knows the first password does not know that there is still a file of the second encryption level, it is impossible to know that the mobile terminal has also encrypted with the second password. In this way, the exposure of the file of the second encryption level in the mobile terminal can be avoided, and the file security is ensured.
  • the mobile terminal further includes: a receiving module 14, a determining module 15, and an encryption module 16.
  • the receiving module 14 is configured to receive an encrypted message for encrypting the file
  • the determining module 15 is connected to the password receiving module 14 for determining whether the password received by the password receiving module 14 is a second password.
  • the encryption module 16 is connected to the determining module. 15 .
  • the determination result of the determination module 15 is YES, according to the encrypted message received by the receiving module 14 , the second encryption level is used to perform the second encryption level of the file.
  • the preferred embodiment describes a process of encrypting a file of a second encryption level.
  • the mobile terminal does not make a clear prompt for the user, for example, "Please enter the second password.” Therefore, the password received by the password receiving module 14 may be the first password or the second password.
  • the determining module 15 determines that the password received by the password receiving module 14 is the second password, the file is subjected to the second encryption level. Encryption, otherwise the file is encrypted at the first encryption level to improve the security of the mobile terminal.
  • the password management module 11 is further configured to set the second password when the mobile terminal is used for the first time.
  • the mobile terminal in the preferred embodiment will not prompt the setting of the second password, thereby preventing others who can access the mobile terminal from knowing the existence of the second password, and improving the second.
  • the concealment of the password Preferably, the mobile terminal further includes a password repairing module 17 for prompting the user 4 to tamper with the first password and/or the second password.
  • the preferred embodiment describes a tampering process for the second password. In view of the concealment of the second password, the mobile terminal does not make a clear prompt for the user, for example, "Please enter the second password.” Therefore, the password received by the password receiving module 14 may be the first password or the second password.
  • the present invention also provides a preferred embodiment, which incorporates the technical solutions of the above-mentioned plurality of preferred embodiments, which will be described in detail below with reference to FIG. 2 is a structural block diagram of a mobile terminal according to a preferred embodiment of the present invention, including a password setting module and a password management module, wherein the password setting module is responsible for completing setting and changing of a normal password and an advanced password, and simultaneously implementing two sets of passwords. Does not affect.
  • the password setting module is responsible for calling the password management module to implement the password saving function and the current password information acquisition function.
  • the password management module uses two access areas: a normal password (corresponding to the first password described above) storage area and an advanced password (corresponding to the second password described above) storage area.
  • the folder browser determines the currently input password information by calling the password management module, and displays different contents according to different password information.
  • a mobile terminal encryption method is also provided.
  • FIG. 3 is a flowchart of a method for encrypting a mobile terminal according to an embodiment of the present invention, including the following step 4: S302 to step S304.
  • Step S302 The mobile terminal encrypts the file of the first encryption level by using the first password, and encrypts the file of the second encryption level by using the second password, where the second encryption level is higher than the first encryption level.
  • Step 4 S304, the mobile terminal receives the first password input by the user, and displays the file of the first encryption level according to the first password; or the mobile terminal receives the second password input by the user, and displays the second password according to the second password.
  • An encryption level file and a second encryption level file It should be noted that, when the mobile terminal displays the file of the first encryption level according to the first password, it does not prompt that the file of the second encryption level still exists.
  • the mobile terminal discloses an operation of encrypting or decrypting, thereby causing anyone to know that the mobile terminal has been encrypted.
  • the mobile terminal uses two sets of passwords of the first password and the second password, and when the user inputs the first password, the mobile terminal only displays the file of the first encryption level corresponding to the first password, and The user is prompted to have a second encryption level file. Since the user who knows the first password does not know that there is still a file of the second encryption level, it is impossible to know that the mobile terminal has also encrypted with the second password. In this way, the exposure of the file of the second encryption level in the mobile terminal can be avoided, and the file security is ensured.
  • the mobile terminal receives the encrypted message for encrypting the file, and the password input by the user; the mobile terminal determines whether the password is the second password. If the judgment result is yes, the mobile terminal performs an operation of encrypting the file using the second password according to the encrypted message.
  • the preferred embodiment describes a process of encrypting a file of a second encryption level. Considering the concealment of the second password and the file of the second encryption level, the mobile terminal does not make a clear prompt for the user, for example, "Please enter the second password.” Therefore, the password received by the mobile terminal may be the first password or the second password.
  • the mobile terminal determines that the password is the second password
  • the file is encrypted by the second encryption level, otherwise the file is first encrypted. Level of encryption to improve the security of mobile terminals.
  • the mobile terminal sets the second password when it is first used. And, before setting the second password, the mobile terminal receives the first password input by the user; the mobile terminal prompts the user to select whether to perform the setting of the second password, and receives the selection result of the user; if the selection result is yes, the pair is executed The second password is set to operate. If the result of the selection is no, it will not be used in subsequent use. Then prompt to set the second password.
  • the mobile terminal in the preferred embodiment will not prompt the setting of the second password, thereby preventing others who can access the mobile terminal from knowing the existence of the second password, and improving the second. Password security.
  • the mobile terminal prompts the user to tamper with the first password and/or the second password.
  • the preferred embodiment describes a tampering process for the second password.
  • the mobile terminal does not make a clear prompt for the user, for example, "Please enter the second password.” Therefore, the password received by the mobile terminal may be the first password or the second password.
  • the mobile terminal determines that the received password is the second password, the user is allowed to modify the second password.
  • FIG. 4 is a flowchart of the password setting of the mobile terminal when the normal password function is turned on according to the embodiment of the present invention, and includes the following steps S402 to S410.
  • Step S402 The user enters the password setting module, and the setting module determines whether it is the first entry, if it is to go to step S404, if not, then to step S408.
  • Step S404 Prompt the user whether to set an advanced password. If yes, go to step S406; if not, exit the password setting module.
  • Step S406 Perform advanced password setting processing, and exit the password setting module after the setting is completed.
  • Step S408 Wait for the user to input the password of the mobile terminal. If the input password is a normal password, go to step S410; if the input password is a high-level password, go to step S406.
  • Step S410 Perform normal password setting processing, and exit the password setting module after setting.
  • Step S412 Determine whether it is an advanced password? If the determination result is yes, step S406 is performed. Otherwise, step S410 is performed.
  • FIG. 5 is a flowchart of the mobile terminal password setting when the normal password function is not turned on according to the embodiment of the present invention, and includes the following steps S502 to S508.
  • Step S502 The user enters the password setting module, and the setting module determines whether it is the first entry. If yes, the process goes to step S504, and if not, the process goes to step S508.
  • Step S504 Prompt the user whether to set an advanced password. If yes, go to step S506; if not, exit the password setting module.
  • Step S506 Perform advanced password setting processing, and exit the password setting module after setting.
  • Step S508 Determine whether the user inputs an advanced password. If the advanced password is entered, go to step S506, and if the advanced password is not entered, exit the password setting module.
  • Preferred Embodiment 3 This preferred embodiment 3 describes a process of performing file browsing after the password setting is completed based on the preferred embodiment 1.
  • FIG. 6 is a flow chart of file browsing according to an embodiment of the present invention, including the following steps S602 to S610.
  • Step S602 Enter a folder browser module to determine whether the user inputs a password of the mobile terminal. If the mobile terminal password is not input, go to step S604; if the password is entered, go to step S606.
  • Step S604 The folder browser displays the unencrypted content in the mobile terminal.
  • Step S606 Determine the type of the input password. If the input password is a normal password, go to step S608; if the input password is a high-level password, go to step S610.
  • Step S608 The folder browser displays unencrypted content and generally encrypted content in the mobile terminal.
  • Step S610 The folder browser displays all the contents. The preferred embodiment passes forces.
  • a secret password is distinguished to display a file of the corresponding encryption level. Specifically, when the user inputs the normal password in step S608, the mobile terminal only displays the unencrypted content and the normally encrypted content, and does not prompt the user to still have the advanced encrypted content.
  • the invention can easily distinguish the encryption setting (advanced password encryption or second password encryption) of the mobile terminal owner from the general mobile terminal encryption setting (usually password encryption or first password encryption), even if it is known that the encryption is usually Unable to detect the functionality of advanced encryption, and advanced encryption can have all the permissions normally encrypted, and vice versa. In addition, usually encryption and advanced encryption do not affect each other.
  • the password can be set whether the password is turned on or off, so that the average user seems to have no password protection.
  • the file display module only displays the file of the first encryption level according to the first password, and does not prompt that the file of the second encryption level still exists, and solves the related art.
  • the terminal discloses the operation of encrypting or decrypting, thereby causing anyone to know that the mobile terminal has been encrypted, avoiding the exposure of the second encryption level file in the mobile terminal, and ensuring file security.
  • modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices.
  • they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device, or they may be separately fabricated into individual integrated circuit modules, or they may be Multiple modules or steps are made into a single integrated circuit module.
  • the invention is not limited to any particular hardware and software. Piece combination.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention discloses a mobile terminal and an encryption method thereof. The mobile terminal includes: a password management module used for managing a first password and a second password of the mobile terminal, wherein the first password is used for encrypting a first encryption level file in the mobile terminal, the second password is used for encrypting a second encryption level file in the mobile terminal, and the second encryption level is higher than the first encryption level; a password receiving module used for receiving the first password or the second password input by a user of the mobile terminal; a file display module used for displaying the first encryption level file according to the first password and displaying the first encryption level file and the second encryption level file according to the second password. The present invention avoids exposure of the second encryption level file in the mobile terminal and ensures safety of the file.

Description

移动终端及其加密方法 技术领域 本发明涉及通信领域, 具体而言, 涉及一种移动终端及其加密方法。 背景技术 目前, 各种款式的移动终端都具有密码保护功能, 其通常可以对移动终 端中存储的重要文件或者信息通过设置密码进行保护, 只有输入正确的密码 才能查看加密的内容。 这种方式有效地阻止了信息的泄漏, 但同时也存在如下的隐患: 与移动 终端拥有者关系密切的人(如爱人、 子女等), 可能通过询问该移动终端拥有 者从而获取密码, 然后对移动终端进行解密从而得知该移动终端中的加密内 容。 由此可见, 目前的移动终端加密技术, 加密或者解密的操作是公开的, 任何人都可能知道该移动终端进行了加密, 从而造成上述在某些不得不告知 他人移动终端密码的情况下, 移动终端中的加密信息的曝光。 发明内容 针对相关技术中移动终端对加密或者解密的操作进行公开, 从而造成任 何人都知道该移动终端进行过加密的问题而提出本发明, 为此, 本发明的主 要目的在于提供一种移动终端及其加密方法, 以解决上述问题。 为了实现上述目的, 才艮据本发明的一个方面, 提供了一种移动终端。 居本发明的移动终端包括: 密码管理模块, 用于对移动终端的第一密 码和第二密码进行管理, 其中, 第一密码用于对移动终端中的第一加密级别 的文件进行加密, 第二密码用于对移动终端中的第二加密级别的文件进行加 密, 并且第二加密级别高于第一加密级别; 密码接收模块, 用于接收移动终 端的用户输入的第一密码或第二密码; 文件显示模块, 用于 居第一密码显 示第一加密级别的文件; 以及用于才艮据第二密码显示第一加密级别的文件和 第二加密级别的文件。 进一步地, 上述移动终端还包括: 接收模块, 用于接收对文件进行加密 的加密消息; 判断模块, 用于判断密码接收模块接收的密码是否为第二密码; 加密模块, 用于在判断结果为是时, 根据加密消息, 使用第二密码对文件进 行第二加密级别的加密。 进一步地, 密码管理模块还用于在首次使用移动终端时对第二密码进行 设置。 进一步地, 上述移动终端还包括密码修 丈模块, 用于提示用户 4爹改第一 密码和 /或第二密码。 为了实现上述目的, 根据本发明的另一个方面, 还提供了一种移动终端 力口密方法。 才艮据本发明的移动终端加密方法包括: 移动终端使用第一密码对第一加 密级别的文件进行加密, 并使用第二密码对第二加密级别的文件进行加密, 其中第二加密级别高于第一加密级别;移动终端接收到用户输入的第一密码, 并根据第一密码显示第一加密级别的文件; 或者移动终端接收到用户输入的 第二密码,并根据第二密码显示第一加密级别的文件和第二加密级别的文件。 进一步地, 在移动终端使用第二密码对第二加密级别的文件进行加密之 前, 还包括: 移动终端接收到用于对文件进行加密的加密消息, 以及用户输 入的密码; 移动终端判断密码是否为第二密码; 如果判断结果为是, 则移动 终端根据加密消息, 执行使用第二密码对文件进行加密的操作。 进一步地, 移动终端在首次使用时对第二密码进行设置。 进一步地,在移动终端在首次使用时对第二密码进行设置之前,还包括: 移动终端接收用户输入的第一密码; 移动终端提示用户选择是否进行第二密 码的设置, 并接收用户的选择结果; 如果选择结果为是, 则执行对第二密码 进行设置的操作。 进一步地, 如果选择结果为否, 则在后续使用中不再提示对第二密码进 行设置。 进一步地, 还包括: 移动终端提示用户 爹改第一密码和 /或第二密码。 通过本发明, 釆用文件显示模块 居第一密码仅仅显示第一加密级别的 文件, 并不提示还存在第二加密级别的文件, 解决了相关技术中移动终端对 加密或者解密的操作进行公开, 从而造成任何人都知道该移动终端进行过加 密的问题, 避免了移动终端中的第二加密级别的文件的曝光, 保证了文件安 全。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部 分, 本发明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的 不当限定。 在附图中: 图 1是 居本发明实施例的移动终端的结构框图; 图 2是 居本发明优选实施例的移动终端的结构框图; 图 3是才艮据本发明实施例的移动终端加密方法的流程图; 图 4是才艮据本发明实施例的通常密码功能开启时移动终端密码设置的流 程图; 图 5是才艮据本发明实施例的通常密码功能未开启时移动终端密码设置的 流程图; 图 6是 居本发明实施例的文件浏览的流程图。 具体实施方式 需要说明的是, 在不冲突的情况下, 本申请中的实施例及实施例中的特 征可以相互组合。 下面将参考附图并结合实施例来详细说明本发明。 4十对移动终端加密设置实现方式的一些问题, 本发明提出一种让移动终 端加密设置相对隐形化的实现方法, 利用本发明所描述的方法能够比较好的 实现他人即使获得移动终端并且熟悉移动终端加密操作的情况下, 也无法知 晓移动终端中是否设置有加密内容。 同时也能确保在别人知道移动终端密码 情况下仍然无法看到全部加密内容。 根据本发明的实施例, 提供了一种移动终端, 图 1是根据本发明实施例 的移动终端的结构框图, 包括密码管理模块 11 , 密码接收模块 12和文件显 示模块 13。 下面对其结构进行详细描述。 密码管理模块 11 , 用于对移动终端的第一密码和第二密码进行管理, 其 中, 第一密码用于对移动终端中的第一加密级别的文件进行加密, 第二密码 用于对移动终端中的第二加密级别的文件进行加密, 并且第二加密级别高于 第一加密级别。 密码接收模块 12 , 用于接收移动终端的用户输入的第一密码或第二密 码。 文件显示模块 13 , 连接至密码管理模块 11和密码接收模块 12 , 用于根 据密码接收模块 12接收的第一密码, 显示密码管理模块 11管理的第一密码 对应的第一加密级别的文件; 以及用于根据密码接收模块 12 接收的第二密 码,显示密码管理模块 11管理的第一密码对应的第一加密级别的文件和密码 管理模块 11管理的第二密码对应的第二加密级别的文件。 需要说明的是, 在文件显示模块 13根据密码接收模块 12接收的第一密 码, 显示密码管理模块 11 管理的第一密码对应的第一加密级别的文件的同 时, 并不提示还存在第二加密级别的文件。 相关技术中, 移动终端对加密或者解密的操作进行公开, 从而造成任何 人都知道该移动终端进行过加密。 本发明实施例中, 移动终端釆用了第一密 码和第二密码两套密码, 并且, 当用户输入第一密码时, 移动终端仅仅显示 第一密码对应的第一加密级别的文件, 并不提示该用户还存在第二加密级别 的文件。 由于知道第一密码的用户并不知道还存在第二加密级别的文件, 故 其不可能知道该移动终端还釆用第二密码进行过加密。 这样, 可以避免移动 终端中的第二加密级别的文件的曝光, 保证文件安全。 优选地, 上述移动终端还包括: 接收模块 14 , 判断模块 15和加密模块 16。 下面对其结构进行详细描述。 接收模块 14 , 用于接收对文件进行加密的加密消息; 判断模块 15 , 连 接至密码接收模块 14 , 用于判断密码接收模块 14接收的密码是否为第二密 码; 加密模块 16 , 连接至判断模块 15 , 用于在判断模块 15的判断结果为是 时, 根据接收模块 14 接收的加密消息, 使用第二密码对文件进行第二加密 级别的力口密。 需要说明的是, 本优选实施例描述了对第二加密级别的文件进行加密的 过程。 考虑到第二密码以及第二加密级别的文件的隐蔽性, 本移动终端不对 用户进行例如 "请输入第二密码"的明确提示。 因此, 密码接收模块 14接收到 的密码可能为第一密码也可能为第二密码, 当判断模块 15 判断密码接收模 块 14 接收到的密码为第二密码时, 则对文件进行第二加密级别的加密, 否 则对文件进行第一加密级别的加密, 以提高移动终端的安全性。 优选地,密码管理模块 11还用于在首次使用移动终端时对第二密码进行 设置。 需要说明的是, 本优选实施例中的移动终端在后续使用时将不再对设置 第二密码进行提示, 从而避免能够接触到该移动终端的他人得知该第二密码 的存在, 提高第二密码的隐蔽性。 优选地, 上述移动终端还包括密码修 丈模块 17 , 用于提示用户 4爹改第一 密码和 /或第二密码。 需要说明的是, 本优选实施例描述了对第二密码的 4爹改过程。 考虑到第 二密码的隐蔽性, 本移动终端不对用户进行例如"请输入第二密码"的明确提 示。 因此, 密码接收模块 14 接收到的密码可能为第一密码也可能为第二密 码, 当判断模块 15判断密码接收模块 14接收到的密码为第二密码时, 则允 许用户 4爹改第二密码, 否则仅仅允许用户 爹改第一密码, 从而提高第二密码 的隐蔽性。 本发明还提供了一个优选实施例, 结合了上述多个优选实施例的技术方 案, 下面结合图 2来详细描述。 图 2是根据本发明优选实施例的移动终端的结构框图, 包括密码设置模 块和密码管理模块, 其中, 密码设置模块负责完成用户进行通常密码和高级 密码的设置、 更改, 同时实现两套密码互不影响。 密码设置模块负责调用密 码管理模块, 实现密码保存功能和当前密码信息获取功能。 密码管理模块釆 用两块存取区域: 通常密码(对应于上述第一密码)保存区域和高级密码(对 应于上述第二密码) 保存区域。 文件夹浏览器通过调用密码管理模块来判断 当前输入的密码信息, 根据不同的密码信息进行不同内容的显示。 才艮据本发明的实施例, 还提供了一种移动终端加密方法。 图 3是才艮据本 发明实施例的移动终端加密方法的流程图, 包括如下的步 4聚 S302 至步骤 S304。 步骤 S302, 移动终端使用第一密码对第一加密级别的文件进行加密, 并 使用第二密码对第二加密级别的文件进行加密, 其中第二加密级别高于第一 加密级别。 步 4聚 S304, 移动终端接收到用户输入的第一密码, 并才艮据第一密码显示 第一加密级别的文件; 或者移动终端接收到用户输入的第二密码, 并根据第 二密码显示第一加密级别的文件和第二加密级别的文件。 需要说明的是,在移动终端根据第一密码显示第一加密级别的文件同时, 并不提示还存在第二加密级别的文件。 相关技术中, 移动终端对加密或者解密的操作进行公开, 从而造成任何 人都知道该移动终端进行过加密。 本发明实施例中, 移动终端釆用了第一密 码和第二密码两套密码, 并且, 当用户输入第一密码时, 移动终端仅仅显示 第一密码对应的第一加密级别的文件, 并不提示该用户还存在第二加密级别 的文件。 由于知道第一密码的用户并不知道还存在第二加密级别的文件, 故 其不可能知道该移动终端还釆用第二密码进行过加密。 这样, 可以避免移动 终端中的第二加密级别的文件的曝光, 保证文件安全。 优选地,在移动终端使用第二密码对第二加密级别的文件进行加密之前, 移动终端接收到用于对文件进行加密的加密消息, 以及用户输入的密码; 移 动终端判断密码是否为第二密码; 如果判断结果为是, 则移动终端根据加密 消息, 执行使用第二密码对文件进行加密的操作。 需要说明的是, 本优选实施例描述了对第二加密级别的文件进行加密的 过程。 考虑到第二密码以及第二加密级别的文件的隐蔽性, 本移动终端不对 用户进行例如 "请输入第二密码"的明确提示。 因此, 移动终端接收到的密码 可能为第一密码也可能为第二密码, 当移动终端判断该密码为第二密码时, 则对文件进行第二加密级别的加密, 否则对文件进行第一加密级别的加密, 以提高移动终端的安全性。 优选地, 移动终端在首次使用时对第二密码进行设置。 并且, 在对第二 密码进行设置之前, 移动终端接收用户输入的第一密码; 移动终端提示用户 选择是否进行第二密码的设置, 并接收用户的选择结果; 如果选择结果为是, 则执行对第二密码进行设置的操作。 如果选择结果为否, 则在后续使用中不 再提示对第二密码进行设置。 需要说明的是, 本优选实施例中的移动终端在后续使用时将不再对设置 第二密码进行提示, 从而避免能够接触到该移动终端的他人得知该第二密码 的存在, 提高第二密码的安全性。 优选地, 移动终端提示用户^ ί'爹改第一密码和 /或第二密码。 需要说明的是, 本优选实施例描述了对第二密码的 4爹改过程。 考虑到第 二密码的隐蔽性, 本移动终端不对用户进行例如"请输入第二密码"的明确提 示。 因此, 移动终端接收到的密码可能为第一密码也可能为第二密码, 当移 动终端判断接收到的密码为第二密码时, 则允许用户修改第二密码, 否则仅 仅允许用户^ ί'爹改第一密码, 从而提高第二密码的隐蔽性。 为了帮助理解上述实施例, 下面进一步描述本发明的其他多个优选实施 例。 优选实施例一 本优选实施例一描述了通常密码 (对应于上述第一密码) 功能开启时, 移动终端密码设置的过程。 图 4是才艮据本发明实施例的通常密码功能开启时移动终端密码设置的流 程图, 包括如下的步骤 S402至步骤 S410。 步骤 S402: 用户进入密码设置模块, 设置模块判断是否是第一次进入, 如果是转到步骤 S404, 如果不是则转到步骤 S408。 步骤 S404: 提示用户是否设置高级密码。 如果选择是则转到步骤 S406; 如果选择不是则退出密码设置模块。 步骤 S406: 进行高级密码设置处理, 设置完毕后退出密码设置模块。 步骤 S408: 等待用户输入移动终端密码。 如果输入密码是通常密码, 则 转到步骤 S410; 如果输入密码是高级密码, 则转到步骤 S406。 步骤 S410: 进行通常密码设置处理, 设置完毕后退出密码设置模块。 步骤 S412: 判断是否为高级密码? 如果判断结果为是, 执行步骤 S406, 否则执行步骤 S410。 优选实施例二 本优选实施例二描述了通常密码功能未开启时, 移动终端密码设置的过 程。 图 5是才艮据本发明实施例的通常密码功能未开启时移动终端密码设置的 流程图, 包括如下的步骤 S502至步骤 S508。 步骤 S502: 用户进入密码设置模块, 设置模块判断是否是第一次进入, 如果是则转到步骤 S504 , 如果不是则转到步骤 S508。 步骤 S504: 提示用户是否设置高级密码。 如果选择是则转到步骤 S506; 如果选择不是则退出密码设置模块。 步骤 S506: 进行高级密码设置处理, 设置完毕后退出密码设置模块。 步骤 S508: 判断用户是否输入高级密码。 如果输入高级密码则转到步骤 S506 , 如果没有输入高级密码则退出密码设置模块。 优选实施例三 本优选实施例三基于优选实施例一, 描述了在密码设置完成后进行文件 浏览的过程。 图 6 是才艮据本发明实施例的文件浏览的流程图, 包括如下的步骤 S602 至 S610。 步骤 S602: 进入文件夹浏览器模块, 判断用户是否输入移动终端密码。 如果未输入移动终端密码则转到步骤 S604; 如果输入密码则转到步骤 S606。 步骤 S604: 文件夹浏览器显示移动终端中未加密的内容。 步骤 S606: 判断输入密码的种类。 如果输入密码是通常密码, 则转到步 骤 S608; 如果输入密码是高级密码, 则转到步骤 S610。 步骤 S608 : 文件夹浏览器显示移动终端中未加密的内容和通常加密内 容。 步骤 S610: 文件夹浏览器显示全部内容。 本优选实施例通过对力。密密码进行区分,从而显示相应加密级别的文件。 具体地, 步骤 S608 中当用户输入通常密码时, 移动终端仅仅显示未加密的 内容和通常加密内容, 并不提示用户还存在高级加密内容。 由于知道通常密 码的用户并不知道还存在高级加密内容, 故其不可能知道该移动终端还釆用 高级密码进行过加密,从而可以避免移动终端中较高加密级别的文件的曝光, 保证文件安全。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本 领域的技术人员来说, 本发明可以有各种更改和变化, 本发明的保护范围以 权利要求为准。 需要说明的是, 在附图的流程图示出的步骤可以在诸如一组计算机可执 行指令的计算机系统中执行, 并且, 虽然在流程图中示出了逻辑顺序, 但是 在某些情况下, 可以以不同于此处的顺序执行所示出或描述的步骤。 本发明可以很容易的把移动终端主人私有的加密设置 (高级密码加密或 第二密码加密) 和一般移动终端加密设置 (通常密码加密或第一密码加密) 区分开来, 实现即使知道通常加密也无法发觉高级加密存在的功能, 并且高 级加密可以拥有通常加密的所有权限, 反之则不行。 另外通常加密和高级加 密相互之间不会影响, 通常密码无论是打开还是关闭都可以对高级密码进行 设置, 这样在一般用户看来移动终端就像没有设置密码保护一样。 综上所述, 居本发明的上述实施例, 釆用文件显示模块才艮据第一密码 仅仅显示第一加密级别的文件, 并不提示还存在第二加密级别的文件, 解决 了相关技术中移动终端对加密或者解密的操作进行公开, 从而造成任何人都 知道该移动终端进行过加密的问题, 避免了移动终端中的第二加密级别的文 件的曝光, 保证了文件安全。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可 以用通用的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布 在多个计算装置所组成的网络上, 可选地, 它们可以用计算装置可执行的程 序代码来实现, 从而, 可以将它们存储在存储装置中由计算装置来执行, 或 者将它们分别制作成各个集成电路模块, 或者将它们中的多个模块或步骤制 作成单个集成电路模块来实现。 这样, 本发明不限制于任何特定的硬件和软 件结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本 领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的 ^"神和 原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护 范围之内。 The present invention relates to the field of communications, and in particular to a mobile terminal and an encryption method thereof. BACKGROUND At present, various types of mobile terminals have a password protection function, which can generally protect important files or information stored in a mobile terminal by setting a password, and only the correct password can be input to view the encrypted content. This method effectively prevents the leakage of information, but at the same time, there are also hidden dangers: People who are closely related to the owner of the mobile terminal (such as a lover, a child, etc.) may obtain the password by asking the owner of the mobile terminal, and then The mobile terminal decrypts to know the encrypted content in the mobile terminal. It can be seen that the current mobile terminal encryption technology, encryption or decryption operation is public, and anyone may know that the mobile terminal is encrypted, thereby causing the above to move in the case that some people have to inform the mobile terminal of the password. Exposure of encrypted information in the terminal. SUMMARY OF THE INVENTION The present invention is directed to the disclosure of an operation of encrypting or decrypting a mobile terminal in the related art, thereby causing anyone to know that the mobile terminal has been encrypted. Therefore, the main object of the present invention is to provide a mobile terminal and Its encryption method to solve the above problems. In order to achieve the above object, according to an aspect of the present invention, a mobile terminal is provided. The mobile terminal of the present invention includes: a password management module, configured to manage a first password and a second password of the mobile terminal, where the first password is used to encrypt a file of a first encryption level in the mobile terminal, The second password is used to encrypt the file of the second encryption level in the mobile terminal, and the second encryption level is higher than the first encryption level; the password receiving module is configured to receive the first password or the second password input by the user of the mobile terminal. And a file display module, configured to display the first encryption level file in the first password; and a file for displaying the first encryption level and the second encryption level according to the second password. Further, the mobile terminal further includes: a receiving module, configured to receive an encrypted message that encrypts the file; a determining module, configured to determine whether the password received by the password receiving module is a second password; and the encryption module is configured to: Yes, according to the encrypted message, the second encryption level is used to encrypt the file with the second password. Further, the password management module is further configured to set the second password when the mobile terminal is used for the first time. Further, the mobile terminal further includes a password repairing module, configured to prompt the user 4 to tamper with the first password and/or the second password. In order to achieve the above object, according to another aspect of the present invention, a method for force density of a mobile terminal is also provided. The mobile terminal encryption method according to the present invention includes: the mobile terminal encrypts the file of the first encryption level using the first password, and encrypts the file of the second encryption level with the second password, wherein the second encryption level is higher than a first encryption level; the mobile terminal receives the first password input by the user, and displays the file of the first encryption level according to the first password; or the mobile terminal receives the second password input by the user, and displays the first encryption according to the second password Level file and file at the second encryption level. Further, before the mobile terminal encrypts the file of the second encryption level by using the second password, the method further includes: the mobile terminal receives the encrypted message for encrypting the file, and the password input by the user; the mobile terminal determines whether the password is The second password; if the judgment result is yes, the mobile terminal performs an operation of encrypting the file using the second password according to the encrypted message. Further, the mobile terminal sets the second password when it is first used. Further, before the second password is set by the mobile terminal during the first use, the method further includes: the mobile terminal receiving the first password input by the user; the mobile terminal prompting the user to select whether to perform the setting of the second password, and receiving the selection result of the user If the result of the selection is YES, the operation of setting the second password is performed. Further, if the result of the selection is no, the setting of the second password is no longer prompted in subsequent use. Further, the method further includes: the mobile terminal prompting the user to tamper with the first password and/or the second password. According to the present invention, the file display module has the first password and only displays the first encryption level. The file does not prompt that the file of the second encryption level still exists, which solves the problem that the mobile terminal discloses the operation of encrypting or decrypting in the related art, thereby causing anyone to know that the mobile terminal has been encrypted, and avoiding the problem in the mobile terminal. The exposure of the second encryption level file ensures file security. BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are set to illustrate,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram showing the structure of a mobile terminal according to an embodiment of the present invention; FIG. 2 is a block diagram showing the structure of a mobile terminal according to a preferred embodiment of the present invention; FIG. 3 is a mobile terminal encryption according to an embodiment of the present invention. FIG. 4 is a flowchart of a mobile terminal password setting when a normal password function is turned on according to an embodiment of the present invention; FIG. 5 is a mobile terminal password setting when a normal password function is not turned on according to an embodiment of the present invention; Figure 6 is a flow chart of file browsing in an embodiment of the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict. The invention will be described in detail below with reference to the drawings in conjunction with the embodiments. For some problems in the implementation of the encryption setting of the mobile terminal, the present invention provides an implementation method for making the encryption setting of the mobile terminal relatively invisible. The method described in the present invention can achieve better implementation of others even if the mobile terminal is obtained and is familiar with the mobile. In the case of the terminal encryption operation, it is also impossible to know whether or not the encrypted content is set in the mobile terminal. It also ensures that all encrypted content is still not visible when others know the mobile terminal password. According to an embodiment of the present invention, a mobile terminal is provided. FIG. 1 is a structural block diagram of a mobile terminal according to an embodiment of the present invention, including a password management module 11, a password receiving module 12, and a file display. Module 13. The structure is described in detail below. The password management module 11 is configured to manage the first password and the second password of the mobile terminal, where the first password is used to encrypt the file of the first encryption level in the mobile terminal, and the second password is used to the mobile terminal. The file of the second encryption level is encrypted, and the second encryption level is higher than the first encryption level. The password receiving module 12 is configured to receive a first password or a second password input by a user of the mobile terminal. The file display module 13 is connected to the password management module 11 and the password receiving module 12, and configured to display the first encryption level file corresponding to the first password managed by the password management module 11 according to the first password received by the password receiving module 12; For the second password received by the password receiving module 12, the file of the first encryption level corresponding to the first password managed by the password management module 11 and the file of the second encryption level corresponding to the second password managed by the password management module 11 are displayed. It should be noted that, when the file display module 13 displays the first encryption level file corresponding to the first password managed by the password management module 11 according to the first password received by the password receiving module 12, the second encryption is not prompted. Level file. In the related art, the mobile terminal discloses an operation of encrypting or decrypting, thereby causing anyone to know that the mobile terminal has been encrypted. In the embodiment of the present invention, the mobile terminal uses two sets of passwords of the first password and the second password, and when the user inputs the first password, the mobile terminal only displays the file of the first encryption level corresponding to the first password, and The user is prompted to have a second encryption level file. Since the user who knows the first password does not know that there is still a file of the second encryption level, it is impossible to know that the mobile terminal has also encrypted with the second password. In this way, the exposure of the file of the second encryption level in the mobile terminal can be avoided, and the file security is ensured. Preferably, the mobile terminal further includes: a receiving module 14, a determining module 15, and an encryption module 16. The structure is described in detail below. The receiving module 14 is configured to receive an encrypted message for encrypting the file, and the determining module 15 is connected to the password receiving module 14 for determining whether the password received by the password receiving module 14 is a second password. The encryption module 16 is connected to the determining module. 15 . When the determination result of the determination module 15 is YES, according to the encrypted message received by the receiving module 14 , the second encryption level is used to perform the second encryption level of the file. It should be noted that the preferred embodiment describes a process of encrypting a file of a second encryption level. Considering the concealment of the second password and the file of the second encryption level, the mobile terminal does not make a clear prompt for the user, for example, "Please enter the second password." Therefore, the password received by the password receiving module 14 may be the first password or the second password. When the determining module 15 determines that the password received by the password receiving module 14 is the second password, the file is subjected to the second encryption level. Encryption, otherwise the file is encrypted at the first encryption level to improve the security of the mobile terminal. Preferably, the password management module 11 is further configured to set the second password when the mobile terminal is used for the first time. It should be noted that, in the subsequent preferred use, the mobile terminal in the preferred embodiment will not prompt the setting of the second password, thereby preventing others who can access the mobile terminal from knowing the existence of the second password, and improving the second. The concealment of the password. Preferably, the mobile terminal further includes a password repairing module 17 for prompting the user 4 to tamper with the first password and/or the second password. It should be noted that the preferred embodiment describes a tampering process for the second password. In view of the concealment of the second password, the mobile terminal does not make a clear prompt for the user, for example, "Please enter the second password." Therefore, the password received by the password receiving module 14 may be the first password or the second password. When the determining module 15 determines that the password received by the password receiving module 14 is the second password, the user 4 is allowed to tamper with the second password. Otherwise, the user is only allowed to tamper with the first password, thereby improving the concealment of the second password. The present invention also provides a preferred embodiment, which incorporates the technical solutions of the above-mentioned plurality of preferred embodiments, which will be described in detail below with reference to FIG. 2 is a structural block diagram of a mobile terminal according to a preferred embodiment of the present invention, including a password setting module and a password management module, wherein the password setting module is responsible for completing setting and changing of a normal password and an advanced password, and simultaneously implementing two sets of passwords. Does not affect. The password setting module is responsible for calling the password management module to implement the password saving function and the current password information acquisition function. The password management module uses two access areas: a normal password (corresponding to the first password described above) storage area and an advanced password (corresponding to the second password described above) storage area. The folder browser determines the currently input password information by calling the password management module, and displays different contents according to different password information. According to an embodiment of the present invention, a mobile terminal encryption method is also provided. FIG. 3 is a flowchart of a method for encrypting a mobile terminal according to an embodiment of the present invention, including the following step 4: S302 to step S304. Step S302: The mobile terminal encrypts the file of the first encryption level by using the first password, and encrypts the file of the second encryption level by using the second password, where the second encryption level is higher than the first encryption level. Step 4: S304, the mobile terminal receives the first password input by the user, and displays the file of the first encryption level according to the first password; or the mobile terminal receives the second password input by the user, and displays the second password according to the second password. An encryption level file and a second encryption level file. It should be noted that, when the mobile terminal displays the file of the first encryption level according to the first password, it does not prompt that the file of the second encryption level still exists. In the related art, the mobile terminal discloses an operation of encrypting or decrypting, thereby causing anyone to know that the mobile terminal has been encrypted. In the embodiment of the present invention, the mobile terminal uses two sets of passwords of the first password and the second password, and when the user inputs the first password, the mobile terminal only displays the file of the first encryption level corresponding to the first password, and The user is prompted to have a second encryption level file. Since the user who knows the first password does not know that there is still a file of the second encryption level, it is impossible to know that the mobile terminal has also encrypted with the second password. In this way, the exposure of the file of the second encryption level in the mobile terminal can be avoided, and the file security is ensured. Preferably, before the mobile terminal encrypts the file of the second encryption level by using the second password, the mobile terminal receives the encrypted message for encrypting the file, and the password input by the user; the mobile terminal determines whether the password is the second password. If the judgment result is yes, the mobile terminal performs an operation of encrypting the file using the second password according to the encrypted message. It should be noted that the preferred embodiment describes a process of encrypting a file of a second encryption level. Considering the concealment of the second password and the file of the second encryption level, the mobile terminal does not make a clear prompt for the user, for example, "Please enter the second password." Therefore, the password received by the mobile terminal may be the first password or the second password. When the mobile terminal determines that the password is the second password, the file is encrypted by the second encryption level, otherwise the file is first encrypted. Level of encryption to improve the security of mobile terminals. Preferably, the mobile terminal sets the second password when it is first used. And, before setting the second password, the mobile terminal receives the first password input by the user; the mobile terminal prompts the user to select whether to perform the setting of the second password, and receives the selection result of the user; if the selection result is yes, the pair is executed The second password is set to operate. If the result of the selection is no, it will not be used in subsequent use. Then prompt to set the second password. It should be noted that, in the subsequent preferred use, the mobile terminal in the preferred embodiment will not prompt the setting of the second password, thereby preventing others who can access the mobile terminal from knowing the existence of the second password, and improving the second. Password security. Preferably, the mobile terminal prompts the user to tamper with the first password and/or the second password. It should be noted that the preferred embodiment describes a tampering process for the second password. In view of the concealment of the second password, the mobile terminal does not make a clear prompt for the user, for example, "Please enter the second password." Therefore, the password received by the mobile terminal may be the first password or the second password. When the mobile terminal determines that the received password is the second password, the user is allowed to modify the second password. Otherwise, the user is only allowed to ^^. Change the first password to improve the concealment of the second password. To assist in understanding the above embodiments, other preferred embodiments of the present invention are further described below. Preferred Embodiment 1 This preferred embodiment describes a process of setting a password of a mobile terminal when a normal password (corresponding to the first password described above) is turned on. FIG. 4 is a flowchart of the password setting of the mobile terminal when the normal password function is turned on according to the embodiment of the present invention, and includes the following steps S402 to S410. Step S402: The user enters the password setting module, and the setting module determines whether it is the first entry, if it is to go to step S404, if not, then to step S408. Step S404: Prompt the user whether to set an advanced password. If yes, go to step S406; if not, exit the password setting module. Step S406: Perform advanced password setting processing, and exit the password setting module after the setting is completed. Step S408: Wait for the user to input the password of the mobile terminal. If the input password is a normal password, go to step S410; if the input password is a high-level password, go to step S406. Step S410: Perform normal password setting processing, and exit the password setting module after setting. Step S412: Determine whether it is an advanced password? If the determination result is yes, step S406 is performed. Otherwise, step S410 is performed. Preferred Embodiment 2 This preferred embodiment 2 describes the process of setting the password of the mobile terminal when the normal password function is not turned on. FIG. 5 is a flowchart of the mobile terminal password setting when the normal password function is not turned on according to the embodiment of the present invention, and includes the following steps S502 to S508. Step S502: The user enters the password setting module, and the setting module determines whether it is the first entry. If yes, the process goes to step S504, and if not, the process goes to step S508. Step S504: Prompt the user whether to set an advanced password. If yes, go to step S506; if not, exit the password setting module. Step S506: Perform advanced password setting processing, and exit the password setting module after setting. Step S508: Determine whether the user inputs an advanced password. If the advanced password is entered, go to step S506, and if the advanced password is not entered, exit the password setting module. Preferred Embodiment 3 This preferred embodiment 3 describes a process of performing file browsing after the password setting is completed based on the preferred embodiment 1. FIG. 6 is a flow chart of file browsing according to an embodiment of the present invention, including the following steps S602 to S610. Step S602: Enter a folder browser module to determine whether the user inputs a password of the mobile terminal. If the mobile terminal password is not input, go to step S604; if the password is entered, go to step S606. Step S604: The folder browser displays the unencrypted content in the mobile terminal. Step S606: Determine the type of the input password. If the input password is a normal password, go to step S608; if the input password is a high-level password, go to step S610. Step S608: The folder browser displays unencrypted content and generally encrypted content in the mobile terminal. Step S610: The folder browser displays all the contents. The preferred embodiment passes forces. A secret password is distinguished to display a file of the corresponding encryption level. Specifically, when the user inputs the normal password in step S608, the mobile terminal only displays the unencrypted content and the normally encrypted content, and does not prompt the user to still have the advanced encrypted content. Since the user who knows the normal password does not know that there is still advanced encrypted content, it is impossible to know that the mobile terminal is also encrypted with the advanced password, thereby avoiding exposure of files with higher encryption levels in the mobile terminal, and ensuring file security. . The above description is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and the present invention may be variously modified and changed. The scope of the present invention is defined by the claims. It should be noted that the steps shown in the flowchart of the accompanying drawings may be performed in a computer system such as a set of computer executable instructions, and, although the logical order is shown in the flowchart, in some cases, The steps shown or described may be performed in an order different than that herein. The invention can easily distinguish the encryption setting (advanced password encryption or second password encryption) of the mobile terminal owner from the general mobile terminal encryption setting (usually password encryption or first password encryption), even if it is known that the encryption is usually Unable to detect the functionality of advanced encryption, and advanced encryption can have all the permissions normally encrypted, and vice versa. In addition, usually encryption and advanced encryption do not affect each other. Usually, the password can be set whether the password is turned on or off, so that the average user seems to have no password protection. In summary, in the foregoing embodiment of the present invention, the file display module only displays the file of the first encryption level according to the first password, and does not prompt that the file of the second encryption level still exists, and solves the related art. The terminal discloses the operation of encrypting or decrypting, thereby causing anyone to know that the mobile terminal has been encrypted, avoiding the exposure of the second encryption level file in the mobile terminal, and ensuring file security. Obviously, those skilled in the art should understand that the above modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device, or they may be separately fabricated into individual integrated circuit modules, or they may be Multiple modules or steps are made into a single integrated circuit module. Thus, the invention is not limited to any particular hardware and software. Piece combination. The above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the scope of the present invention are intended to be included within the scope of the present invention.

Claims

权 利 要 求 书 一种移动终端, 其特征在于, 包括: Claims A mobile terminal, characterized in that it comprises:
密码管理模块, 用于对移动终端的第一密码和第二密码进行管理, 其中, 所述第一密码用于对所述移动终端中的第一加密级别的文件进行 加密, 所述第二密码用于对所述移动终端中的第二加密级别的文件进行 加密, 并且所述第二加密级别高于所述第一加密级别;  a password management module, configured to manage a first password and a second password of the mobile terminal, where the first password is used to encrypt a file of a first encryption level in the mobile terminal, where the second password is And a file for encrypting a second encryption level in the mobile terminal, and the second encryption level is higher than the first encryption level;
密码接收模块, 用于接收所述移动终端的用户输入的所述第一密码 或所述第二密码;  a password receiving module, configured to receive the first password or the second password input by a user of the mobile terminal;
文件显示模块, 用于才艮据所述第一密码显示所述第一加密级别的文 件; 以及用于才艮据所述第二密码显示所述第一加密级别的文件和所述第 二加密级别的文件。 根据权利要求 1所述的移动终端, 其特征在于, 还包括:  a file display module, configured to display the file of the first encryption level according to the first password; and a file for displaying the first encryption level and the second encryption according to the second password Level file. The mobile terminal according to claim 1, further comprising:
接收模块, 用于接收对文件进行加密的加密消息;  a receiving module, configured to receive an encrypted message that encrypts the file;
判断模块, 用于判断所述密码接收模块接收的密码是否为所述第二 密码;  a determining module, configured to determine whether the password received by the password receiving module is the second password;
加密模块, 用于在判断结果为是时, 根据所述加密消息, 使用所述 第二密码对所述文件进行所述第二加密级别的加密。 才艮据权利要求 1所述的移动终端, 其特征在于, 所述密码管理模块还用 于在首次使用所述移动终端时对所述第二密码进行设置。 根据权利要求 1所述的移动终端, 其特征在于, 还包括:  And an encryption module, configured to perform, according to the encrypted message, the second encryption level of the file according to the encrypted message according to the encrypted message. The mobile terminal according to claim 1, wherein the password management module is further configured to set the second password when the mobile terminal is used for the first time. The mobile terminal according to claim 1, further comprising:
密码修 _?丈模块, 用于提示所述用户 4爹改所述第一密码和 /或所述第二 密码。 一种移动终端加密方法, 其特征在于, 包括: 移动终端使用第一密码对第一加密级别的文件进行加密, 并使用第 二密码对第二加密级别的文件进行加密, 其中所述第二加密级别高于所 述第一加密级别; 所述移动终端接收到用户输入的所述第一密码, 并 -据所述第一密 码显示所述第一加密级别的文件; 或者所述移动终端接收到所述用户输 入的所述第二密码, 并艮据所述第二密码显示所述第一加密级别的文件 和所述第二加密级别的文件。 根据权利要求 5所述的方法, 其特征在于, 在所述移动终端使用所述第 二密码对所述第二加密级别的文件进行加密之前, 还包括: Password repair _? The module is configured to prompt the user 4 to tamper with the first password and/or the second password. A mobile terminal encryption method, comprising: a mobile terminal encrypting a file of a first encryption level by using a first password, and encrypting a file of a second encryption level by using a second password, wherein the second encryption The level is higher than the first encryption level; Receiving, by the mobile terminal, the first password input by the user, and displaying the file of the first encryption level according to the first password; or receiving, by the mobile terminal, the second password input by the user And displaying the file of the first encryption level and the file of the second encryption level according to the second password. The method according to claim 5, further comprising: before the encrypting, by the mobile terminal, the file of the second encryption level by using the second password,
所述移动终端接收到用于对文件进行加密的加密消息, 以及所述用 户输入的密码;  The mobile terminal receives an encrypted message for encrypting a file, and a password input by the user;
所述移动终端判断所述密码是否为所述第二密码;  The mobile terminal determines whether the password is the second password;
如果判断结果为是, 则所述移动终端根据所述加密消息, 执行使用 所述第二密码对所述文件进行加密的操作。 根据权利要求 5所述的方法, 其特征在于, 所述移动终端在首次使用时 对所述第二密码进行设置。 根据权利要求 7所述的方法, 其特征在于, 在所述移动终端在首次使用 时对所述第二密码进行设置之前, 还包括:  If the result of the determination is yes, the mobile terminal performs an operation of encrypting the file using the second password according to the encrypted message. The method according to claim 5, wherein the mobile terminal sets the second password when it is first used. The method according to claim 7, wherein before the setting, by the mobile terminal, the second password is used for the first time, the method further includes:
所述移动终端接收用户输入的所述第一密码;  Receiving, by the mobile terminal, the first password input by a user;
所述移动终端提示所述用户选择是否进行所述第二密码的设置, 并 接收所述用户的选择结果;  The mobile terminal prompts the user to select whether to perform setting of the second password, and receives a selection result of the user;
如果所述选择结果为是, 则执行对所述第二密码进行设置的操作。 根据权利要求 8所述的方法, 其特征在于, 如果所述选择结果为否, 则 在后续使用中不再提示对所述第二密码进行设置。 根据权利要求 5所述的方法, 其特征在于, 还包括:  If the result of the selection is YES, an operation of setting the second password is performed. The method according to claim 8, wherein if the selection result is no, the setting of the second password is no longer prompted in subsequent use. The method according to claim 5, further comprising:
所述移动终端提示所述用户 4爹改所述第一密码和 /或所述第二密码。  The mobile terminal prompts the user 4 to tamper with the first password and/or the second password.
PCT/CN2010/077893 2010-07-14 2010-10-19 Mobile terminal and encryption method thereof WO2012006830A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010230249.3 2010-07-14
CN2010102302493A CN101895396A (en) 2010-07-14 2010-07-14 Mobile terminal and encryption method thereof

Publications (1)

Publication Number Publication Date
WO2012006830A1 true WO2012006830A1 (en) 2012-01-19

Family

ID=43104475

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/077893 WO2012006830A1 (en) 2010-07-14 2010-10-19 Mobile terminal and encryption method thereof

Country Status (2)

Country Link
CN (1) CN101895396A (en)
WO (1) WO2012006830A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102542210A (en) * 2010-12-31 2012-07-04 富泰华工业(深圳)有限公司 Electronic device and method for managing file permissions
CN102271332B (en) * 2011-07-18 2017-09-12 中兴通讯股份有限公司 End message time slot scrambling and device
CN103377332B (en) * 2012-04-26 2016-04-20 腾讯科技(深圳)有限公司 The method of access application and device
CN103455737A (en) * 2012-05-28 2013-12-18 百度在线网络技术(北京)有限公司 User information protection method and device
KR101416540B1 (en) * 2012-07-12 2014-07-09 주식회사 로웸 System for verifying password using continuous verification of password and method thereof
CN102750497B (en) 2012-07-20 2014-04-16 腾讯科技(深圳)有限公司 Method and device for deciphering private information
CN104134046B (en) * 2014-07-29 2017-03-29 努比亚技术有限公司 encryption method and device
CN106209896B (en) * 2016-07-29 2020-02-18 网宿科技股份有限公司 Streaming media encryption method and module based on audio and video formats
CN111385656A (en) * 2020-03-04 2020-07-07 四川长虹电器股份有限公司 Authority management and control method for program file imported by outdoor electronic advertising machine

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1959693A (en) * 2006-11-29 2007-05-09 北京飞天诚信科技有限公司 Method of realizing intelligence cryptographic key set of fingerprint for multiple users to use
CN101005661A (en) * 2006-11-15 2007-07-25 深圳凯虹移动通信有限公司 Mobile terminal with data and menu hidden function and its enciphering hiding method
CN101257681A (en) * 2008-03-26 2008-09-03 宇龙计算机通信科技(深圳)有限公司 Private data protecting equipment, mobile terminal, private data memory and read method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI268081B (en) * 2005-06-24 2006-12-01 Hitrust Com Inc Data-encrypting/decrypting method, data-saving media using the method, and data-encrypting/decrypting module

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005661A (en) * 2006-11-15 2007-07-25 深圳凯虹移动通信有限公司 Mobile terminal with data and menu hidden function and its enciphering hiding method
CN1959693A (en) * 2006-11-29 2007-05-09 北京飞天诚信科技有限公司 Method of realizing intelligence cryptographic key set of fingerprint for multiple users to use
CN101257681A (en) * 2008-03-26 2008-09-03 宇龙计算机通信科技(深圳)有限公司 Private data protecting equipment, mobile terminal, private data memory and read method

Also Published As

Publication number Publication date
CN101895396A (en) 2010-11-24

Similar Documents

Publication Publication Date Title
WO2012006830A1 (en) Mobile terminal and encryption method thereof
CN108781163B (en) Method, system and computer readable medium for data communication
US10182255B2 (en) Method, terminal, and system for communication pairing of a digital television terminal and a mobile terminal
KR101343264B1 (en) Secure device authentication
JP6509197B2 (en) Generating working security key based on security parameters
CN111404696B (en) Collaborative signature method, security service middleware, related platform and system
US9742565B2 (en) Method and system for backing up private key of electronic signature token
EP3437288A1 (en) Transport layer security token binding and trusted signing
CN110719173B (en) Information processing method and device
JP2004513420A (en) Method and apparatus for leveled security access control
US9712326B2 (en) Method and system for backing up private key of electronic signature token
US8397281B2 (en) Service assisted secret provisioning
WO2015180689A1 (en) Method and apparatus for acquiring verification information
CN112003697B (en) Encryption and decryption method and device for cryptographic module, electronic equipment and computer storage medium
CN113378119A (en) Software authorization method, device, equipment and storage medium
CN107784209A (en) For preventing the method for security breaches and information appliance device in information appliance device
CN114221764A (en) Public key updating method, device and equipment based on block chain
JP2004015077A (en) Security system for portable communication terminal and its method
JP6201835B2 (en) Information processing apparatus, information processing method, and computer program
CN113032753A (en) Identity verification method and device
WO2015124798A2 (en) Method & system for enabling authenticated operation of a data processing device
WO2012065422A1 (en) Method for updating key of mobile terminal, and mobile terminal
US20150222433A1 (en) Method and apparatus for disabling algorithms in a device
CN112637140A (en) Password transmission method, terminal, server and readable storage medium
US20120106734A1 (en) Safe handover method and system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10854622

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10854622

Country of ref document: EP

Kind code of ref document: A1