WO2012048537A1 - 数据加密方法及移动终端 - Google Patents

数据加密方法及移动终端 Download PDF

Info

Publication number
WO2012048537A1
WO2012048537A1 PCT/CN2011/070101 CN2011070101W WO2012048537A1 WO 2012048537 A1 WO2012048537 A1 WO 2012048537A1 CN 2011070101 W CN2011070101 W CN 2011070101W WO 2012048537 A1 WO2012048537 A1 WO 2012048537A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
mobile terminal
data format
encryption
password
Prior art date
Application number
PCT/CN2011/070101
Other languages
English (en)
French (fr)
Inventor
陈国强
齐旭亮
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2012048537A1 publication Critical patent/WO2012048537A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the present invention relates to the field of communications, and in particular to a data encryption method and a mobile terminal.
  • a multimedia application of a mobile terminal is frequently used by many users.
  • the data recorded by the camera is generally stored locally in the mobile terminal or stored in a memory card (T card).
  • T card memory card
  • data such as audio and video images left by the original user may be seen and used by others due to the loss of the mobile terminal or the borrowing of the memory card (T card) to others.
  • the data preservation method in the related art brings hidden dangers to the user's privacy and data security, and the user body-risk is relatively poor.
  • a main object of the present invention is to provide a data encryption method and a mobile terminal, which solve the problem that the data storage method in the related art brings hidden dangers to the user's privacy and data security, and the user experience is relatively poor.
  • a data encryption method is provided.
  • the data encryption method according to the present invention comprises: setting a data encryption data format and a corresponding encryption password on the mobile terminal; and encrypting data of the corresponding data format using the encryption password.
  • encrypting the data of the corresponding data format by using the encrypted password comprises: encrypting the data of the mobile terminal and the data format corresponding to the corresponding data format on the memory card connected to the mobile terminal by using the encrypted password. Further, encrypting the data of the corresponding data format by using the encrypted password comprises: encrypting the data belonging to the corresponding data format generated by the mobile terminal multimedia application by using the encrypted password. Further, after encrypting the data of the corresponding data format by using the encrypted password, the method further includes: acquiring the encrypted password, decrypting and opening all or part of the data format. Further, the data format includes at least one of the following: MP3, MP4, H.263, H.264, AMR, JPEG.
  • a mobile terminal includes: a setting module, configured to set a data encrypted data format and a corresponding encrypted password on the mobile terminal; and an encryption module, configured to encrypt data of the corresponding data format using the encrypted password.
  • the foregoing encryption module includes: a first encryption submodule, configured to encrypt, by using an encrypted password, data of a data format belonging to the mobile terminal and the corresponding data format on the memory card connected to the mobile terminal.
  • the foregoing encryption module includes: a second encryption submodule, configured to encrypt, by using an encrypted password, data belonging to the corresponding data format generated by the mobile terminal multimedia application.
  • the mobile terminal further includes: a decryption module, configured to acquire an encrypted password, decrypt and open all or part of the data format.
  • the data format includes one of the following: MP3, MP4, H.263, H.264, AMR, JPEG.
  • the encrypted password corresponding to the data format is set, and the data corresponding to the data format is encrypted by using the encrypted password, which solves the hidden dangers of the user's privacy and data security by the data saving method in the related art. The problem of poor user experience, and thus the effect of improving data security and user experience.
  • FIG. 1 is a flowchart of a data encryption method according to an embodiment of the present invention
  • 2 is a schematic structural diagram of positions of functional application modules in a software system according to an embodiment of the present invention
  • FIG. 3 is a flowchart of encryption and decryption selection according to an embodiment of the present invention
  • FIG. 4 is an embodiment of the present invention. Flowchart of the encryption application process.
  • FIG. 5 is a flowchart of a decryption application process according to an embodiment of the present invention
  • FIG. 6 is a structural block diagram of a mobile terminal according to an embodiment of the present invention
  • FIG. 7 is a preferred embodiment of the mobile terminal according to the embodiment of the present invention.
  • Structure diagram. BEST MODE FOR CARRYING OUT THE INVENTION Hereinafter, the present invention will be described in detail with reference to the accompanying drawings. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict.
  • Step S102 Set a data format of a data encryption and a corresponding encryption password on the mobile terminal.
  • Step S104 Encrypt data of its corresponding data format using an encrypted password.
  • the data can be encrypted according to the data format on the mobile terminal, and the problem of relatively low data security in the related technology is overcome. Improve data security and user experience.
  • a preferred embodiment of step S104 is described below.
  • Encrypted passwords are used to encrypt data on the memory card local to the mobile terminal and its corresponding data format on the memory card connected to the mobile terminal.
  • the data in the mobile terminal and the connected memory card are encrypted according to the data format, thereby improving the security of the data thereon and improving the user experience.
  • step S104 a preferred embodiment of step S104 is described below.
  • the data generated by the mobile terminal multimedia application and belonging to its corresponding data format is encrypted using an encrypted password.
  • the data generated by the multimedia application on the mobile terminal is encrypted according to the data format, thereby ensuring the security of the multimedia application data and improving the user body risk.
  • the method further includes: obtaining an encrypted password, decrypting and opening all or part of the data format.
  • the mobile terminal can flexibly decrypt all or part of the data, improving the utility of decryption.
  • the data format includes one of the following: Moving Picture Experts Group Audio Layer 3 (MP3), MP4 (MPEG partl4), H.263, H.264, Broadband Language Compilation Standard (Adaptive Multi-Rate, AMR for short), Joint Photographic Experts Group (JPEG).
  • MP3 Moving Picture Experts Group Audio Layer 3
  • MP4 MPEG partl4
  • H.263, H.264 Broadband Language Compilation Standard (Adaptive Multi-Rate, AMR for short)
  • JPEG Joint Photographic Experts Group
  • the mobile terminal can set a corresponding password for the data of the data format and perform corresponding encryption protection, thereby ensuring the privacy of the user data and improving the user experience.
  • Embodiment 1 This embodiment combines the above embodiments and preferred embodiments thereof.
  • a data encryption method is provided in this embodiment. Step 1: When the user clicks the encryption option, a selection box of various data format types pops up, and the user determines the data format to be encrypted and then performs the encryption process.
  • FIG. 3 is a flowchart of the encryption selection according to the embodiment of the present invention. As shown in FIG. 3, the following steps are included: Step S302: The user performs an encryption operation. Step S304: Enter a password. Step S306: The password setting is completed. Step S308: Completing the force secret process.
  • Table 1 Table 1: Schematic diagram of the file data format saved under various multimedia applications.
  • Step 2 After the user encrypts, the data format of all mobile phones on the local side and the T card side that meets the user requirements begins to be encrypted.
  • the encryption process is to add a password in the data header file of the file.
  • the user first sets the encrypted file data format to MP3. After the user confirms, the mobile phone starts to open the MP3 file, and inserts the password in a certain position of the data header of the file. Due to the presence of the password, the user actually changes this. The file data format, so the encrypted data cannot be opened normally in other places such as a computer.
  • Step 3 When opening these encrypted files on this machine, you need to pop up a password prompt box. If the password entered by the user and the password saved in the file header in the encrypted file are correct, it can be opened normally.
  • the open fails. If the user performs the decryption option, the password is correctly decrypted first, and all previously encrypted files are automatically removed from the file header for decryption. For example: When opening on the mobile phone, you need to enter a password. When the password is normal, the password segment loaded in the file header is removed first and then the file data stream is played. When the user does not need to encrypt, the decryption operation is performed, and after confirming, the encrypted segment data removal work in the file header is uniformly performed on all the encrypted files. This completes the entire encryption and decryption process. It should be noted that the setting of the encrypted data format may be determined according to the actual application, and the user may set the data format to be encrypted according to the situation.
  • the user can set the password switch, and the user can also decide to turn the encryption application on or off according to the situation.
  • the encryption application is enabled, the data saved by the user after the multimedia operation is encrypted according to the preset setting, and the original data is also encrypted. If it is off, it will not work, and all the original files need to be decrypted.
  • the application set by encryption and decryption can perform certain filtering management on the multimedia data used by the user, and greatly improves the security and user experience of the data.
  • after the mobile phone performs the encryption operation if the mobile phone is lost, if other people want to use the mobile phone, the password cannot be decrypted because the password cannot be known, thereby ensuring data security.
  • the utility model solves the weakness that the original mobile terminal (mobile phone) cannot safely protect the generated data after using the multimedia, and also solves the security problem that the data placed on the memory card (T card) is played on the computer, so that the user can The data used is safely stored, ensuring the privacy of user data.
  • the user mobile mobile terminal mobile phone
  • the multimedia recording, the camera, the photographing, the encryption and decryption process, and the like belong to the software layer of the terminal, and FIG.
  • FIG. 2 is the function application module in the software system according to the embodiment of the present invention.
  • the structure diagram of the location, as shown in Figure 2, multimedia application recording and multimedia application camera, provides users with multimedia functions, when the user can save various audio and video and image data, can be stored in the memory card as needed ( T card) or mobile terminal (mobile phone side) local, and through the encryption and decryption application module for encryption and decryption operations.
  • Embodiment 2 This embodiment provides a data encryption method.
  • FIG. 4 is a flowchart of a specific process of an encryption application according to an embodiment of the present invention. As shown in FIG. 4, the method includes: Step S402: A user performs an encryption option. Action, select the type of data you want to encrypt.
  • Step S404 After the user confirms, the password is entered and the encryption setting is completed.
  • Step S406 After the completion, it is determined whether there is a data type that meets the requirements. If the determination result is yes, step S408 is performed; otherwise, step S410 is performed.
  • Step S408 Open a file in a format that meets the requirements, and add a password segment in the file header to complete the encryption operation.
  • Step 4 S410: If not, complete the encryption process directly.
  • Step S412 The user performs a multimedia operation to leave corresponding multimedia data. Then, when performing multimedia operations to save audio and video data or photos, add a password segment before saving, and then save the file.
  • Step S414 When the user needs to open the encrypted data file, the user is first required to input a password. If the password is correct, step S416 is performed; otherwise, step S418 is performed. Step 4: S416: If the password is correct, the file is opened, the password segment in the file header is removed, and the file browsing operation is performed normally on the removed data. Step S418: If the password is incorrect or is opened on a mobile phone or other media that does not have this function, the error is directly reported, and the browsing cannot be performed normally. Step S420: The process ends. Embodiment 3 This embodiment provides a decryption method.
  • FIG. 5 is a flowchart of a decryption application process according to an embodiment of the present invention. As shown in FIG.
  • Step 4 S 502: A user performs a decryption operation.
  • Step S504 The user inputs a password.
  • Step S506 Determine whether the current password is correct. If the result of the determination is yes, step S508 is performed, otherwise, step 4 is performed S510.
  • Step S508 If the password is correct, it is detected whether there is currently encrypted file data. If yes, the password segment in the encrypted file is deleted and re-saved, and the data file saved after all media operations is no longer encrypted. operating.
  • Step S510 If the judgment result is no, the user directly exits.
  • Step S512 The process ends. With the preferred embodiment, decryption of encrypted data in the mobile terminal and its memory card is achieved, thereby improving the user experience.
  • FIG. 6 is a structural block diagram of a mobile terminal according to an embodiment of the present invention.
  • the mobile terminal includes: a setting module 62 and an encryption module 64.
  • a setting module 62 is configured to The data format of the data encryption and the corresponding encryption password are set on the mobile terminal;
  • the encryption module 64 is connected to the setting module 62 for encrypting the data of the corresponding data format by using the encryption password set by the setting module 62.
  • FIG. 7 is a block diagram of a preferred structure of a mobile terminal according to an embodiment of the present invention.
  • the encryption module 64 includes: a first encryption submodule 642 and a second encryption submodule 644.
  • the mobile terminal further includes: decrypting Module 72, the above structure will be described in detail below.
  • the encryption module 64 includes: a first encryption sub-module 642, configured to encrypt, by using an encrypted password, data of a data format belonging to the mobile terminal and the corresponding data format on the memory card connected to the mobile terminal.
  • the encryption module 64 includes: a second encryption sub-module 644, configured to encrypt, by using an encrypted password, data generated by the mobile terminal multimedia application and belonging to its corresponding data format.
  • the mobile terminal further includes: a decryption module 72, connected to the setting module 62, configured to acquire an encrypted password set by the setting module 62, and decrypt and open all or part of the data format.
  • the above data format includes one of the following: MP3, MP4, H.263, H.264, AMR, JPEG.
  • the above embodiment of the present invention provides a data encryption method and a mobile terminal. By encrypting the data according to the data format on the mobile terminal, the problem of relatively low data security in the related art is overcome. Improve data security and user experience.
  • the above modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices.
  • the computing device may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the scope of the present invention are intended to be included within the scope of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Description

数据加密方法及移动终端 技术领域 本发明涉及通信领域, 具体而言, 涉及一种数据加密方法及移动终端。 背景技术 移动终端的多媒体应用是被许多用户经常使用的, 拍照摄像录音后的数 据一般存放在移动终端本地或者存放于存储卡 (T卡) 中。 这样由于移动终 端遗失或者存储卡 ( T卡)借用给他人等原因, 使得原来使用者留下的音视 频图像等数据就有可能被他人看到和使用。 相关技术中的数据保存方法对用户的私密性和数据安全带来隐患, 用户 体-险度比较差。 发明内容 本发明的主要目的在于提供一种数据加密方法及移动终端, 以解决相关 技术中的数据保存方法对用户的私密性和数据安全带来隐患, 用户体验度比 较差的问题。 为了实现上述目的,根据本发明的一个方面,提供了一种数据加密方法。 根据本发明的数据加密方法包括: 在移动终端上设置数据加密的数据格 式及其对应的加密密码;使用加密密码将其对应的数据格式的数据进行加密。 进一步地, 使用加密密码将其对应的数据格式的数据进行加密包括: 使 用加密密码将移动终端本地及与移动终端相连的存储卡上的属于其对应的数 据格式的数据进行加密。 进一步地, 使用加密密码将其对应的数据格式的数据进行加密包括: 使 用加密密码将移动终端多媒体应用生成的属于其对应的数据格式的数据进行 加密。 进一步地, 在使用加密密码将其对应的数据格式的数据进行加密之后, 上述方法还包括: 获取加密密码, 将数据格式的全部或部分数据进行解密并 打开。 进一步地, 数据格式包括以下至少之一: MP3、 MP4、 H.263、 H.264、 AMR、 JPEG。 为了实现上述目的, 才艮据本发明的一个方面, 提供了一种移动终端。 根据本发明的移动终端包括: 设置模块, 用于在移动终端上设置数据加 密的数据格式及其对应的加密密码; 加密模块, 用于使用加密密码将其对应 的数据格式的数据进行加密。 进一步地, 上述加密模块包括: 第一加密子模块, 用于使用加密密码将 移动终端本地及与移动终端相连的存储卡上的属于其对应的数据格式的数据 进行加密。 进一步地, 上述加密模块包括: 第二加密子模块, 用于使用加密密码将 移动终端多媒体应用生成的属于其对应的数据格式的数据进行加密。 进一步地, 上述移动终端还包括: 解密模块, 用于获取加密密码, 将数 据格式的全部或部分数据进行解密并打开。 进一步地, 数据格式包括以下之一: MP3、 MP4、 H.263、 H.264、 AMR、 JPEG。 通过本发明, 釆用设置对应于数据格式的加密密码, 并对该数据格式对 应的数据使用该加密密码进行加密, 解决了相关技术中的数据保存方法对用 户的私密性和数据安全带来隐患, 用户体验度比较差的问题, 进而达到了提 高数据安全性及用户体验的效果。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部 分, 本发明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的 不当限定。 在附图中: 图 1是根据本发明实施例的数据加密方法的流程图; 图 2是根据本发明实施例的各功能应用模块在软件系统中所处位置的结 构示意图; 图 3是根据本发明实施例的加解密选择的流程图; 图 4是才艮据本发明实施例的加密应用过程的流程图。 图 5是才艮据本发明实施例的解密应用过程的流程图; 图 6是才艮据本发明实施例的移动终端的结构框图; 以及 图 7是 居本发明实施例的移动终端的优选的结构框图。 具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在 不冲突的情况下, 本申请中的实施例及实施例中的特征可以相互组合。 本实施例提供了一种数据加密方法。 图 1是才艮据本发明实施例的数据加 密方法的流程图, 该流程包括如下步 4聚: 步骤 S 102: 在移动终端上设置数据加密的数据格式及其对应的加密密 码。 步骤 S 104: 使用加密密码将其对应的数据格式的数据进行加密。 通过上述步骤, 在移动终端上可以才艮据数据格式对数据进行加密, 克月艮 了相关技术中数据安全性比较低的问题。 提高了数据的安全性及用户体验。 优选地, 下面对步骤 S 104的一个优选的实施方式进行说明。 使用加密 密码将移动终端本地及与移动终端相连的存储卡上的属于其对应的数据格式 的数据进行加密。 通过该优选实施例, 根据数据格式对移动终端及其连接的 存储卡中的数据进行加密, 提高了其上数据的安全性, 提高了用户体验。 优选地, 下面对步骤 S 104的一个优选的实施方式进行说明。 使用加密 密码将移动终端多媒体应用生成的属于其对应的数据格式的数据进行加密。 通过该优选实施例, 根据数据格式将移动终端上多媒体应用生成的数据进行 加密, 保证了多媒体应用数据的安全性, 提高了用户体 -险。 优选地, 在步骤 S 104之后, 上述方法还包括: 获取加密密码, 将数据 格式的全部或部分数据进行解密并打开。 通过该优选实施例, 移动终端可以 灵活地将全部或部分数据进行解密, 提高了解密的实用性。 优选地, 数据格式包括以下之一: 动态影像专家压缩标准音频层面 3 ( Moving Picture Experts Group Audio Layer 3 , 简称为 MP3 ), MP4 ( MPEG partl4 )、 H.263、 H.264、 宽带语言编解标准 ( Adaptive Multi-Rate , 简称为 AMR )、联合图像专家小组(Joint Photographic Experts Group,简称为 JPEG )。 通过该优选实施例, 移动终端可以对上述数据格式的数据设定对应的密码, 并进行相应的加密保护, 保证了用户数据的私密性, 提高了用户体验。 实施例一 本实施例结合了上述实施例及其中的优选实施方法。 在本实施例中提供 了一种数据加密方法。 步骤 1: 用户在点击加密选项时, 弹出各种数据格式类型的选择框, 由 用户确定需要加密的数据格式然后进行加密流程。 图 3是才艮据本发明实施例 的加密选择的流程图, 如图 3所示, 包括如下步 4聚: 步骤 S302: 用户进行加密操作。 步骤 S304: 输入密码。 步骤 S306: 密码设置完成。 步骤 S308: 完成力口密流程。 在本实施例中的数据格式如表 1所示: 表 1 : 多媒体各种应用下保存的文件数据格式示意表。
Figure imgf000005_0001
步骤 2: 当用户加密后, 则所有手机本地侧和 T卡侧的符合用户要求的 数据格式开始进行加密, 加密过程是在文件的数据头文件中加入密码。 例如: 用户先将加密文件数据格式设为 MP3 , 用户确认后, 手机开始打 开这个 MP3文件, 在此文件的数据头某个位置插入加密码, 由于有加密码的 存在, 实际上是改变了这个文件数据格式, 因此在其他地方比如电脑上是无 法正常打开这些加密后的数据。 步骤 3: 在本机打开这些加密文件时需要弹出密码提示框, 对用户输入 的密码和加密文件里文件头中保存的密码比较正确的话则可以正常打开, 否 则打开失败。 如果用户进行解密选项, 则首先输入密码正确的话则解密, 所 有之前加过密的文件自动去除文件头中的密码进行解密。 例如: 当在手机上打开时需要输入密码, 当密码正常, 则先去除加载在 文件头中的密码段然后将文件数据流进行播放操作。 当用户不需要加密, 则 进行解密操作, 确认后统一对所有加密过的文件进行文件头中的密码段数据 去除工作。 这样就完成了整个加解密流程。 需要说明的是, 加密的数据格式的设置可以根据实际应用情况而定, 用 户可以根据自身情况设定需要加密的数据格式。 优选地, 用户可以设置密码开关, 同时用户也可以才艮据情况决定开启或 关闭这个加密应用。 当这个加密应用开启, 则用户多媒体操作后保存的数据 就会按照预先设置进行数据的加密, 同时原有的数据也要进行加密的过程。 如果关闭, 则不起作用, 同时原有的所有文件需要进行解密过程。 加解密设 置的应用能够对用户使用的多媒体数据进行一定过滤管理, 对数据的安全和 用户体验有很大提高。 通过本优选实施例, 手机进行加密操作后, 如果手机丢失, 其他人若想 使用手机, 则由于无法得知密码而无法解密, 从而保证了数据安全。 而如果 T卡丢失, 就算 fc T卡放到手机或电脑中, 由于加密是加密在文件中, 则也 同样无法打开文件, 最大程度的保证了数据安全。 解决了原先移动终端 (手 机) 多媒体使用后对产生的数据无法进行安全保护的弱点, 同时也解决了放 置在存储卡 (T卡) 的数据一旦放在电脑上播放的安全问题, 使得用户能够 对使用的数据进行安全保存, 确保了用户数据的私密性。 需要说明的是, 在本实施例中, 用户移动移动终端 (手机) 具有多媒体 录音摄像拍照功能。 且多媒体录音, 摄像, 拍照, 加密解密流程等都属于终 端的软件层, 图 2是根据本发明实施例的各功能应用模块在软件系统中所处 位置的结构示意图, 如图 2所示, 多媒体应用录音和多媒体应用拍照摄像, 提供给用户多媒体功能,当用户使用后可以保存下来各种音视频和图像数据, 可以分别按照需要存储在存储卡 (T卡) 或移动终端 (手机侧) 本地中, 并 通过加解密应用模块进行加解密操作。 实施例二 本实施例提供了一种数据加密方法, 图 4是才艮据本发明实施例的加密应 用具体过程的流程图, 如图 4所示, 该方法包括: 步骤 S402: 用户进行加密选项操作, 选择需要加密的数据类型。 步一骤 S404: 用户确认后输入密码, 加密设置完成。 步骤 S406: 完成后判断当前是否有符合要求的数据类型存在, 如果判断 结果为是, 执行步骤 S408, 否则, 执行步骤 S410。 步骤 S408: 打开符合要求的格式的文件, 在文件头加入密码段, 完成加 密操作。 步 4聚 S410: 如果没有, 直接完成加密流程。 步骤 S412: 用户进行多媒体操作, 留下相应的多媒体数据。 那么当进行 多媒体操作保存下音视频数据或照片时, 在保存前先加入密码段, 然后对文 件进行保存。 步骤 S414: 当用户需要打开加密的数据文件时,首先要求用户输入密码, 如果密码正确, 执行步骤 S416, 否则, 执行步骤 S418。 步 4聚 S416: 密码正确则打开文件, 去除文件头中密码段, 然后对去除后 的数据正常进行文件浏览操作。 步骤 S418: 密码不正确或者在不具有此功能的手机或其他媒体上打开则 直接报错, 无法正常浏览。 步骤 S420: 流程结束。 实施例三 本实施例提供了一种解密方法。 图 5是根据本发明实施例的解密应用过 程的流程图, 如图 5所示, 该方法包括: 步 4聚 S 502: 用户进行解密操作。 步骤 S504: 用户输入密码。 步骤 S506:判断当前密码是否正确。如果判断结果为是,执行步骤 S508, 否则, 执行步 4聚 S510。 步骤 S508: 如密码正确, 则检测当前是否有加过密的文件数据, 如有, 则将加密文件里的密码段删除, 重新保存, 之后的所有媒体操作后保存的数 据文件则不再进行加密操作。 步骤 S510: 判断结果为否, 直接退出。 步骤 S512: 流程结束。 通过本优选实施例, 实现了对移动终端及其存储卡中的加密数据进行解 密, 提高了用户体验。 本实施例提供了一种移动终端。 图 6是 居本发明实施例的移动终端的 结构框图, 如图 6所示, 该移动终端包括: 设置模块 62和加密模块 64 , 下 面对上述结构进行详细说明: 设置模块 62 , 用于在移动终端上设置数据加密的数据格式及其对应的加 密密码; 加密模块 64 , 连接至设置模块 62 , 用于使用设置模块 62设置的加 密密码将其对应的数据格式的数据进行加密。 图 7是才艮据本发明实施例的移动终端的优选的结构框图, 如图 7所示, 加密模块 64包括: 第一加密子模块 642和第二加密子模块 644; 移动终端还 包括: 解密模块 72 , 下面对上述结构进行详细说明。 加密模块 64包括: 第一加密子模块 642 , 用于使用加密密码将移动终端 本地及与移动终端相连的存储卡上的属于其对应的数据格式的数据进行加 密。 加密模块 64包括: 第二加密子模块 644 , 用于使用加密密码将移动终端 多媒体应用生成的属于其对应的数据格式的数据进行加密。 移动终端还包括: 解密模块 72 , 连接至设置模块 62, 用于获取设置模 块 62设置的加密密码, 将数据格式的全部或部分数据进行解密并打开。 优选地,上述数据格式包括以下之一: MP3、 MP4、 H.263、 H.264、 AMR、 JPEG。 综上所述, 居本发明的上述实施例, 提供了一种数据加密方法及移动 终端。 通过在移动终端上可以才艮据数据格式对数据进行加密, 克艮了相关技 术中数据安全性比较低的问题。 提高了数据的安全性及用户体验。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可 以用通用的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布 在多个计算装置所组成的网络上, 可选地, 它们可以用计算装置可执行的程 序代码来实现, 从而, 可以将它们存储在存储装置中由计算装置来执行, 并 且在某些情况下, 可以以不同于此处的顺序执行所示出或描述的步骤, 或者 将它们分别制作成各个集成电路模块, 或者将它们中的多个模块或步骤制作 成单个集成电路模块来实现。 这样, 本发明不限制于任何特定的硬件和软件 结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本 领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的^"神和 原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护 范围之内。

Claims

权 利 要 求 书
1. 一种数据加密方法, 其特征在于, 包括:
在移动终端上设置数据加密的数据格式及其对应的加密密码; 使用所述加密密码将其对应的所述数据格式的数据进行加密。
2. 根据权利要求 1所述的方法, 其特征在于, 使用所述加密密码将其对 应的所述数据格式的数据进行加密包括:
使用所述加密密码将所述移动终端本地及与所述移动终端相连的 存储卡上的属于其对应的所述数据格式的数据进行加密。
3. 根据权利要求 1所述的方法, 其特征在于, 使用所述加密密码将其对 应的所述数据格式的数据进行加密包括:
使用所述加密密码夺移动终端多媒体应用生成的属于其对应的所 述数据格式的数据进行加密。
4. 根据权利要求 1所述的方法, 其特征在于, 在使用所述加密密码将其 对应的所述数据格式的数据进行加密之后, 所述方法还包括:
获取所述加密密码, 将所述数据格式的全部或部分数据进行解密 并打开。
5. 根据权利要求 1至 4所述的方法, 其特征在于,
所述数据格式包括以下至少之一: 动态影像专家压缩标准音频层 面 3 MP3、 MP4、 H.263、 H.264、 宽带语言编解标准 AMR、 联合图像 专家小组 JPEG。
6. —种移动终端 , 其特征在于, 包括: 设置模块 , 用于在移动终端上设置数据加密的数据格式及其对应 的力口密密码; 加密模块 , 用于使用所述加密密码将其对应的所述数据格式的数 据进行加密。
7. 根据权利要求 6所述的移动终端, 其特征在于, 所述加密模块包括: 第一加密子模块, 用于使用所述加密密码将所述移动终端本地及 与所述移动终端相连的存储卡上的属于其对应的所述数据格式的数据 进行加密。
8. 根据权利要求 6所述的移动终端, 其特征在于, 所述加密模块包括: 第二加密子模块, 用于使用所述加密密码将移动终端多媒体应用 生成的属于其对应的所述数据格式的数据进行加密。
9. 根据权利要求 6所述的移动终端, 其特征在于, 还包括:
解密模块, 用于获取所述加密密码, 将所述数据格式的全部或部 分数据进行解密并打开。
10. 根据权利要求 6至 9所述的移动终端, 其特征在于,
所述数据格式包括以下之一: 动态影像专家压缩标准音频层面 3 MP3、 MP4、 H.263、 H.264、 宽带语言编解标准 AMR、 联合图像专家 小组 JPEG。
PCT/CN2011/070101 2010-10-13 2011-01-07 数据加密方法及移动终端 WO2012048537A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010506246.8 2010-10-13
CN2010105062468A CN101980237A (zh) 2010-10-13 2010-10-13 数据加密方法及移动终端

Publications (1)

Publication Number Publication Date
WO2012048537A1 true WO2012048537A1 (zh) 2012-04-19

Family

ID=43600739

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/070101 WO2012048537A1 (zh) 2010-10-13 2011-01-07 数据加密方法及移动终端

Country Status (2)

Country Link
CN (1) CN101980237A (zh)
WO (1) WO2012048537A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104348954B (zh) * 2013-07-29 2019-06-07 腾讯科技(深圳)有限公司 一种拍照界面启动的检测方法及装置、终端设备
CN106096334B (zh) * 2016-06-02 2021-11-19 中国传媒大学 超媒体数据的加密方法及加密装置、解密方法及解密装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1885279A (zh) * 2005-06-21 2006-12-27 达智科技股份有限公司 Mp3文件的加密及解密方法
CN101183937A (zh) * 2007-12-27 2008-05-21 中兴通讯股份有限公司 转发禁止与混合发送方式drm文件的加解密方法及终端
CN101295341A (zh) * 2008-06-25 2008-10-29 腾讯科技(深圳)有限公司 一种便携式设备及其数据保护方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101430752B (zh) * 2008-12-22 2010-09-15 哈尔滨工业大学 计算机与移动存储设备的敏感数据交换控制模块及方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1885279A (zh) * 2005-06-21 2006-12-27 达智科技股份有限公司 Mp3文件的加密及解密方法
CN101183937A (zh) * 2007-12-27 2008-05-21 中兴通讯股份有限公司 转发禁止与混合发送方式drm文件的加解密方法及终端
CN101295341A (zh) * 2008-06-25 2008-10-29 腾讯科技(深圳)有限公司 一种便携式设备及其数据保护方法

Also Published As

Publication number Publication date
CN101980237A (zh) 2011-02-23

Similar Documents

Publication Publication Date Title
TWI294072B (en) Method of communicating digital data, method of processing a data file and digital rights management module
JP4060271B2 (ja) コンテンツ処理装置およびコンテンツ保護プログラム
US8166300B2 (en) Extending the DRM realm to external devices
US9325505B2 (en) Apparatus and method for content encryption and decryption based on storage device ID
US20110093714A1 (en) Systems and methods for asymmetric cryptographic accessory authentication
JP2007328777A (ja) 移動体電子装置、データ保護方法、保護データ出力方法、制御プログラム、および、記録媒体
EP2696305A2 (en) Method and device for file protection
WO2012009917A1 (zh) 数字版权管理的应用方法及终端设备
CN1406422A (zh) 发送内容数据的方法和装置,及记录和/或还原装置
WO2014169610A1 (zh) 移动终端的数据加、解密方法、装置及保护系统
TW201329776A (zh) 保護檔案內容安全的方法和系統
US9083685B2 (en) Method and system for content replication control
US20080270792A1 (en) System and method of encrypting and decrypting digital files produced by digital still devices
WO2011023051A1 (zh) 数据加密方法、解密方法及移动终端
US9137219B1 (en) Methods and systems for securely managing multimedia data captured by mobile computing devices
JP2007156523A (ja) 情報端末装置
KR102328057B1 (ko) 단말 정보에 기반하여 문서 파일의 암호화가 수행되도록 지원하는 문서 보안 서비스 서버 및 그 동작 방법
WO2012048537A1 (zh) 数据加密方法及移动终端
WO2006135078A1 (ja) コンテンツの利用端末を制限する方法、記憶装置およびシステム
US20090268056A1 (en) Digital camera with portrait image protecting function and portrait image protecting method thereof
US10944544B2 (en) Reducing variable-length pre-key to fix-length key
WO2014201801A1 (zh) 文件保护方法、装置与文件解密方法、装置及终端
US20150269360A1 (en) Control method and system
US20100241863A1 (en) Device for reproducing digital content, secure electronic entity, system comprising said elements and method for reproducing digital content
JP2009026267A (ja) 加入者識別モジュール、加入者識別モジュール用プログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11831934

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11831934

Country of ref document: EP

Kind code of ref document: A1