WO2013182103A2 - 加密、解密终端及应用于终端的加密和解密方法 - Google Patents
加密、解密终端及应用于终端的加密和解密方法 Download PDFInfo
- Publication number
- WO2013182103A2 WO2013182103A2 PCT/CN2013/078287 CN2013078287W WO2013182103A2 WO 2013182103 A2 WO2013182103 A2 WO 2013182103A2 CN 2013078287 W CN2013078287 W CN 2013078287W WO 2013182103 A2 WO2013182103 A2 WO 2013182103A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- terminal
- encryption
- encryption key
- decryption
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
Definitions
- the embodiments of the present invention relate to the field of communication terminal technologies, and in particular, to an encryption and decryption terminal and an encryption and decryption method applied to the terminal. Background technique
- Intelligent terminals have developed rapidly in recent years, and users can freely select and install applications on intelligent terminals based on open operating system platforms, greatly expanding the functions of the terminals and bringing convenience to daily life work.
- the terminal device management object can be easily accessed, for example, the application in the terminal and the personal data information stored in the terminal, and there is a risk of leakage of privacy information.
- the information security of the smart phone terminal is generally encrypted for the address book and the short message, but does not support the specific protection of the application and other information of the user.
- the encryption key is not easy to retrieve once it is lost. Therefore, how to improve the security of device management objects in intelligent terminals and how to easily retrieve lost keys becomes an urgent problem to be solved.
- Embodiments of the present invention provide an encryption, decryption terminal and method for encryption and decryption applied to a terminal.
- An embodiment of the present invention provides a terminal and an encryption method applied to the terminal, including: determining, by the terminal, an object to be encrypted in the terminal;
- the terminal acquires an encryption key, the encryption key includes a first encryption key, and the first plus The secret key is the user identification card key;
- the step of encrypting the object to be encrypted according to the encryption key further includes:
- the subscriber identity card key comprises at least one of an ADM code, a PIN1 code, a PIN2 code, a PUK code, a PUK2 code and an IMSI code of the subscriber identity card.
- the encryption key further includes a second encryption key.
- the second encryption key is an identification number of the terminal.
- an embodiment of the present invention further provides a decryption method applied to a terminal, including:
- the terminal acquires a decryption key
- the encryption key includes a first encryption key, and the first encryption key Identify the card key for the user.
- the decryption key includes a first decryption key
- the step of decrypting the object to be decrypted according to the decryption key and the encryption key comprises:
- Determining whether the first decryption key matches the first encryption key and determining whether the first encryption key matches a key of a user identification card in the terminal, and if all match, The object to be decrypted is decrypted;
- the decryption key further includes a second decryption key; and the encryption key includes a second encryption key.
- the waiting for the decryption key and the encryption key The steps of decrypting the object for decryption include:
- the second decryption key is an identification number of the terminal
- the second encryption key is an identification number of a terminal where the object to be decrypted is located when encrypting.
- an embodiment of the present invention further provides a terminal, including: an encryption object determining module: configured to determine an object to be encrypted in the terminal;
- An encryption key acquisition module configured to acquire an encryption key, the encryption key includes a first encryption key, and the first encryption key is a user identification card key;
- Encryption module It is arranged to encrypt the object to be encrypted according to the encryption key.
- the encryption module is configured to: determine whether the first encryption key matches a user identification card key in the terminal, and if yes, the object to be encrypted Carry out the force p dense.
- the encryption key further includes a second encryption key.
- the second encryption key is an identification number of the terminal.
- an embodiment of the present invention further provides a terminal, including: a decryption object determining module: configured to determine an object to be decrypted in the terminal;
- a decryption key acquisition module configured to obtain a decryption key
- a decryption module configured to decrypt the object to be decrypted according to the decryption key and an encryption key used when encrypting the object to be decrypted; the encryption key includes a first encryption key, The first encryption key is a subscriber identity card key.
- the decryption key includes a first decryption key
- the decryption module is configured to:
- Determining whether the first decryption key matches the first encryption key and determining whether the first encryption key matches a key of a user identification card in the terminal, and if all match, The object to be decrypted is decrypted;
- the decryption key further includes a second decryption key; and the encryption key includes a second encryption key.
- the decryption module is configured to:
- the embodiment of the present invention provides a terminal and an encryption and decryption method applied to the terminal, which uses the user identification card as a key, which not only improves the security strength of the management object, but also effectively enhances the security of the management object access or use;
- the user identification card key is also not easily lost. Even if the user forgets the key information, it is easy to retrieve and reset the key information by the corresponding operator, thereby improving the satisfaction of the user experience.
- FIG. 1 is a schematic flowchart of encrypting an object to be encrypted by using key information according to Embodiment 1 of the present invention
- FIG. 2 is a schematic flowchart of encrypting an encrypted object by using a user identification card key and a terminal identification number according to Embodiment 2 of the present invention
- FIG. 3 is a schematic flowchart of decrypting an object to be decrypted by using a user identification card key according to Embodiment 3 of the present invention
- FIG. 4 is a schematic flowchart of decrypting an object to be decrypted by using a user identification card key and a terminal identification number according to Embodiment 4 of the present invention
- FIG. 5 is a schematic structural diagram of a terminal provided in Embodiment 6 of the present invention.
- Embodiment 1
- FIG. 1 is a schematic flowchart of implementing encryption for an object to be encrypted according to the embodiment, which includes the following steps:
- Step 101 The terminal determines an object to be encrypted in the terminal.
- This step can be performed as follows:
- the terminal selects an object to be encrypted on the terminal according to a judgment rule set by a third-party software, and prompts the user to select an object to be encrypted.
- Step 102 Obtain an encrypted password.
- the terminal obtains the encryption password.
- the encryption password in this embodiment includes the first encryption key, and the first encryption key may be the user identification card key.
- the encryption password is acquired. It can be obtained according to the user's input, or it can be automatically extracted from the terminal.
- Step 103 Perform an encryption operation
- the selected encrypted object is encrypted with the obtained encryption password using the corresponding encryption algorithm.
- step 101 and the above step 102 have no strict timing limitation, and may be executed first 101, then executed 102, or may be executed first 102, then executed 101, etc., and are not described herein again;
- the encryption algorithm can be selected according to the specific application scenario, and will not be described here.
- the solution provided in this embodiment can use the first encryption key (ie, the user identification card key) to encrypt the management object of the terminal, and the management object is not limited to the address book, the short message, the picture, etc. in the terminal. It can also be an application within the terminal, and the like. It can more fully protect the privacy of users' data and improve the user experience.
- the first encryption key ie, the user identification card key
- the object to be encrypted may be bound to the user identification card in the current terminal in the encryption process.
- the method may further include:
- a process of authenticating the obtained first encryption key (which may be a user identification card key input by the user) and the key of the user identification card in the current terminal the process may be: determining the obtained first encryption key and Whether the key of the user identification card in the current terminal matches, and if yes, the authentication is passed, and then the determined encrypted object is encrypted based on the obtained encrypted password; if not, the authentication fails, and the first encryption key needs to be re-acquired. For example, the user is prompted to re-enter the first encryption key or the like.
- the user identification card in this embodiment includes a SIM, UIM, USIM card, a user identification card that can be set on the terminal for verification and matching, and the user identification card key can be a user identification card.
- the unique identification numbers such as the PIN1 code, the PIN2 code, the PUK code, the PUK2, the ADM code, and the IMSI code
- the user identification card key used in this embodiment may be private and The PIN1 code or PIN2 code that is easy to retrieve after forgetting, at this time, avoiding the situation that the user cannot forget the password and causing the normal decryption to occur; of course, the first encryption key may also be a combination of the PIN1 code and the PIN2 code, or the PIN1 code and Combination of PUK1 codes, etc.
- the acquisition may be performed by multiple times, or by inputting a plurality of keys separated by a separator.
- the threshold of the number of verification failures may be set. When the number of verifications exceeds the set threshold, the application ends. Encryption of the program.
- the encrypted information used in the encryption process may be saved for use in a subsequent decryption process, and the encrypted information may include an encryption state of the management object and used in encryption. Encrypt passwords, etc.
- Embodiment 2 is a diagrammatic representation of Embodiment 1:
- the encrypted password in this embodiment may include a second encryption key in addition to the first encryption key in the first embodiment, and the second encryption key may be any set by the user.
- a key when encrypting, combining the first key and the second key as an encryption key
- the code encrypts the encrypted object. See Figure 2, the process includes:
- Step 201 The terminal determines an object to be encrypted in the terminal.
- This step can be performed as follows:
- the object to be encrypted is automatically determined. For example, the terminal determines whether the object existing on the terminal needs to be encrypted according to the judgment rule set by the third party software, and prompts the user to select the object to be encrypted.
- Step 202 Obtain an encrypted password.
- the terminal After the encryption object is selected, the terminal obtains the encryption password.
- the encryption password in this embodiment includes the first encryption key, and the second encryption key.
- the first encryption key is the user identification card key, and the second encryption key is used.
- the key may be any other key set by the user, for example, a birthday key that may be set by the user.
- the second encryption key is preferably the identification number of the terminal, so as to be implemented in the encryption process.
- the encrypted object is bound to the terminal where the object to be encrypted is currently located;
- Step 203 Encrypt the object to be encrypted.
- the encrypted object is encrypted with the obtained encrypted password including the subscriber identification card key and the terminal identification number.
- step 201 and the above step 202 do not have strict timing constraints, and may be performed first 201, then 202, or 202 first, then 201, etc., and will not be described again.
- the encryption object may be bound to the user identification card in the current terminal.
- the method further includes:
- the process of authenticating the obtained first encryption key ie, the user identification card key input by the user
- the process may be: determining the obtained first encryption key and current Whether the key of the subscriber identity card in the terminal matches, if yes, the authentication is passed, and then the determined encrypted object is encrypted based on the obtained encrypted password; if not, the authentication fails, and the first encryption key needs to be re-acquired.
- the encrypted object and the encrypted object can be simultaneously implemented.
- the terminal at the terminal and the subscriber identity card in the terminal are simultaneously bound; correspondingly, when decrypting the terminal, the terminal identification number of the terminal and the subscriber identification card key used by the terminal in the encryption process must be verified.
- the matching second decryption key and the first decryption key can be decrypted. It can be seen that, by using the encryption method provided in this embodiment, when the terminal or the user identification card used in the encryption is changed, the encrypted object cannot be normally opened, and security can be ensured.
- the implementation manner of the encrypted entry mode in this embodiment is not unique.
- the following is an example of the application of the encrypted menu through the terminal.
- the user enters the application encryption menu through the interactive menu of the terminal, and the selection operation of the menu is performed. Start the relevant background program for related processing; it can be assumed that the menu lists the application that the terminal has installed at this time, and the user selects the application that needs to be encrypted.
- the terminal displays a prompt box, prompting the user to input the PIN1 code of the SIM card. .
- the terminal extracts the PIN1 code information input by the user, and applies for the PIN1 code verification to the SIM card.
- the terminal saves the valid PIN1 code input by the user, and the terminal extracts the IMEI number, and the two parameters are used as keys.
- the application performs an encryption operation. After encryption, the terminal records and saves the encryption status information of the application as the basis for processing and judgment when the user accesses the application next time. If the PIN verification returns a failed result, the encryption operation fails.
- Embodiment 3 is a diagrammatic representation of Embodiment 3
- the decrypted process shown in FIG. 3 can be used to decrypt the encrypted object to be decrypted, and the process includes:
- Step 301 The terminal determines an object to be decrypted in the terminal.
- the object to be decrypted may be determined according to the user's selection, for example: when the user selects an object as the access object, after receiving the corresponding access instruction, determining whether the access object is encrypted (according to the access object) If the encryption status is determined, if yes, it is determined that the access object is the object to be decrypted.
- Step 302 Obtain a decryption password.
- the decryption password can be obtained according to the input of the user, and of course, it is not excluded to be automatically acquired by means of pre-built-in and automatic acquisition;
- the decryption password obtained in this embodiment includes a first decryption key, and the first decryption key is a user.
- the entered key, for the encrypted access object, the terminal acquires the first decryption key in the decrypted password.
- Step 303 Perform a decryption operation on the object to be decrypted;
- the obtained decryption password and the encryption key used for encrypting the object to be decrypted are decrypted by the corresponding decryption algorithm.
- the solution provided in this embodiment can use the first encryption key (ie, the user identification card key) to add and decrypt the management object of the terminal, and the management object is not limited to the address book, the short message, and the picture in the terminal. Etc., it can also be an application and a memory card in the terminal. It can protect the privacy of users' data more comprehensively and improve the user experience.
- the first encryption key ie, the user identification card key
- the encryption object is bound to the user identification card used in the terminal where the object is located.
- the current terminal may also be included.
- the process of verifying the user identification card in the verification process may be: matching the obtained first decryption key with the first encryption key saved during encryption, and storing the first encryption key saved in the first encryption process The key is matched with the key of the user identification card in the current terminal. If all the matches are passed, the subsequent decryption process is performed by the corresponding decryption algorithm.
- the matching step of the first decryption key with the first encryption key and the matching step of the first encryption key with the user identification card in the current terminal are not strictly time-limited.
- the first encryption key saved during encryption is directly matched with the key of the user identification card in the current terminal, when the matching fails. , the user can be directly reminded to identify the card change, and the decryption cannot be completed; if the match is passed, the user is reminded to input the decryption key and match the first decryption key input by the user.
- the user identification card in this embodiment includes a user identification card that can be set on the terminal, such as SIM, UIM, USIM, etc., to verify and match the verification function, and the user identification card key can be the above-mentioned cards.
- the user identification card key used in this embodiment may be private and after forgetting Easy to retrieve the PIN1 code or PIN2 code. At this time, it is avoided that the user cannot forget the password and the normal decryption cannot be achieved.
- the decryption process may be a combination of a PIN1 code and a PIN2 code, a combination of a PIN1 code and a PUK1 code, or other multiple passwords.
- the other way corresponds to decryption.
- the acquisition may be performed by multiple times, or by inputting multiple keys separated by a separator.
- a matching and/or verification failure threshold may be set, when matching And/or when the number of verifications exceeds the set threshold, restrictive measures such as ending the access to the object, locking the user identification card, and forcibly shutting down can be performed.
- Embodiment 4 is a diagrammatic representation of Embodiment 4:
- the decryption password in this embodiment may include the first decryption key in the third embodiment.
- the second decryption key is included, and the second decryption key corresponds to the second encryption key used in the second embodiment.
- the first decryption key and the second decryption key are combined as the decryption password. Decrypt the object to be decrypted. See Figure 4, the process includes:
- Step 401 The terminal determines an object to be decrypted in the terminal.
- the object to be decrypted may be determined according to the user's selection, for example: when the user selects an object as the access object, after receiving the corresponding access instruction, determining whether the access object is encrypted (according to the access object) If the encryption status is determined, if yes, it is determined that the access object is the object to be decrypted.
- Step 402 Obtain a decryption password.
- the decryption password can be obtained according to the input of the user, and of course, it is not excluded to be acquired by pre-built-in automatic acquisition or the like;
- the decryption password obtained in this embodiment includes a first decryption key, and further includes a second decryption key, which may be a key input by the user, and the second decryption key may also be a secret input by the user.
- the key may also be a key that is automatically obtained from the current terminal.
- the second decryption key is preferably an identification number of the terminal that is automatically obtained from the current terminal.
- Step 403 Perform a decryption operation on the decrypted object
- the process includes:
- the above three steps do not have strict timing constraints, and the order of execution can be flexibly selected according to the actual application scenario.
- the decryption key is given, and the decryption algorithm corresponding to the encryption algorithm is used to decrypt the object to be decrypted.
- the threshold of the number of verification failures may be set, when the number of verifications exceeds
- restrictive measures such as ending the access to the object, locking the user identification card, and forcibly shutting down can be taken.
- Embodiment 5 is a diagrammatic representation of Embodiment 5:
- the third encryption key input by the user may be acquired, or even more dense. key.
- the prompt entry may be prompted.
- the third encryption key, the combination of the first encryption key, the second encryption key, and the third encryption key is used as an encryption key to perform an encryption operation on the encrypted object.
- the method further includes acquiring and matching a third decryption password process corresponding to the third encrypted password, and no longer cites the description here. .
- the fourth password, the fifth password, and the like may be separately set on the basis of the above different management objects in the terminal.
- FIG. 5 is a schematic structural diagram of a terminal according to the embodiment.
- the terminal 500 in this embodiment is a terminal that supports a user identification card, for example, a mobile terminal, an IPAD terminal, and the like.
- the terminal 500 may be an encrypted terminal, including: An object determination module 510, an encryption key acquisition module 511, and an encryption module 512, where
- the encrypted object determining module 510 is configured to determine the terminal according to the method shown in each of the above embodiments.
- the encryption key acquisition module 511 is arranged to acquire an encrypted password according to the method shown in each of the above embodiments;
- the encryption module 512 is arranged to encrypt the determined object to be encrypted according to the method shown in the above embodiments in accordance with the encryption key acquired by the encryption key acquisition module 511.
- the terminal 500 shown in the figure may also be a decryption terminal, that is, the terminal 500 has the above-mentioned encryption function and the above-mentioned decryption function.
- the terminal 500 in this embodiment may also have only One of the above two functions.
- the terminal 500 includes: a decryption object determination module 520, a decryption key acquisition module 521, and a decryption module 522, where:
- the decrypted object determining module 520 is configured to determine an object to be decrypted in the terminal according to the method shown in each of the above embodiments;
- the decryption key acquisition module 521 is arranged to acquire the decryption key according to the method shown in the above embodiments;
- the decryption module 522 is arranged to decrypt the selected object to be decrypted according to the decryption key acquired by the decryption key acquisition module 521 in accordance with the method shown in the above embodiments.
- modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
- the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module.
- the invention is not limited to any particular combination of hardware and software.
- An embodiment of the present invention provides a terminal and an encryption and decryption method applied to the terminal.
- the user identification card is used as a key, which not only improves the security strength of the management object, but also enhances the access or use of the management object. Security; Moreover, the user identification card key is not easily lost. Even if the user forgets the key information, it is easy to retrieve and reset the key information by the corresponding operator, thereby improving the satisfaction of the user experience.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
一种终端及应用于终端的加密和解密方法,所述方法包括:终端确定所述终端中的待加密对象;所述终端获取加密密钥,所述加密密钥包括第一加密密钥,所述第一加密密钥为用户识别卡密钥;以及根据所述加密密钥对所述待加密对象进行加密。使用用户识别卡作为密钥,不仅可以提高管理对象的保密强度,有效的增强管理对象访问或使用的安全性;而且该用户识别卡密钥也不容易丟失,即使用户忘记密钥信息时,也很容易到相应的运营商找回并重置密钥信息,因此可提高用户体验的满意度。
Description
加密、 解密终端及应用于终端的加密和解密方法
技术领域
本发明实施例涉及通讯终端技术领域, 尤其涉及一种加密、 解密终端及 应用于终端的加密和解密方法。 背景技术
智能终端近年来发展迅速, 用户可以在基于开放操作系统平台的智能终 端上自由选择和安装应用程序, 极大的扩展了终端的功能, 给日常生活工作 带来便利。 但同时也存在针对智能终端设备管理对象访问权限的问题, 即对 智能终端设备管理对象的控制没有很好的方法, 随之产生信息数据安全隐患 的问题。 一旦他人获得该设备, 就可以轻易的访问终端设备管理对象, 例如: 终端中的应用程序以及终端中所保存的个人数据信息, 存在隐私信息泄露的 风险。 针对该问题, 就需要有一种方法能够实现对终端设备管理对象进行权 限设置, 避免终端设备管理对象被他人访问, 进而造成个人数据信息以及私 密信息的泄漏。
目前, 针对智能终端设备管理对象的访问权限设置, 以智能手机终端为 例, 智能手机终端的信息安全一般是对通讯录与短信加密, 但都不支持对应 用程序及用户其他信息进行特定的保护, 同时在相关技术中也存在, 加密密 钥一旦丟失就不容易找回的问题。 所以如何提高智能终端中设备管理对象的 安全性以及如何方便的找回丟失的密钥成为一个亟待解决的问题。
发明内容
本发明的实施例提供了一种加密、 解密终端及应用于终端的加密和解密 的方法。
本发明的实施例提供了一种终端及应用于终端的加密方法, 包括: 终端确定所述终端中的待加密对象;
所述终端获取加密密钥, 所述加密密钥包括第一加密密钥, 所述第一加
密密钥为用户识别卡密钥; 以及
根据所述加密密钥对所述待加密对象进行加密。
在本发明的一种实施例中, 根据所述加密密钥对所述待加密对象进行加 密的步骤还包括:
判断所述第一加密密钥与所述终端内的用户识别卡密钥是否匹配, 若匹 配 , 则对所述待加密对象进行加密。
在本发明的一种实施例中,所述用户识别卡密钥包括用户识别卡的 ADM 码、 PIN1码、 PIN2码、 PUK码、 PUK2码和 IMSI码中的至少一种。
在本发明的一种实施例中, 所述加密密钥还包括第二加密密钥。
在本发明的一种实施例中, 所述第二加密密钥为所述终端的识别号。 为了解决上述问题, 本发明的实施例还提供了一种应用于终端的解密方 法, 包括:
终端确定所述终端中的待解密对象;
所述终端获取解密密钥; 以及
根据所述解密密钥和对所述待解密对象进行加密时釆用的加密密钥对所 述待解密对象进行解密; 所述加密密钥包括第一加密密钥, 所述第一加密密 钥为用户识别卡密钥。
在本发明的一种实施例中, 所述解密密钥包括第一解密密钥, 根据所述 解密密钥和所述加密密钥对所述待解密对象进行解密的步骤包括:
判断所述第一解密密钥与所述第一加密密钥是否匹配, 并判断所述第一 加密密钥与所述终端内的用户识别卡的密钥是否匹配, 若都匹配, 对所述待 解密对象进行解密;
或判断所述第一加密密钥与当前终端内的用户识别卡的密钥是否匹配, 若是, 对所述待解密对象进行解密。
在本发明的一种实施例中, 所述解密密钥还包括第二解密密钥; 以及所 述加密密钥包括第二加密密钥。
在本发明的一种实施例中, 根据所述解密密钥和所述加密密钥对所述待
解密对象进行解密的步骤包括:
判断所述第二解密密钥与所述第二加密密钥是否匹配, 若是, 对所述待 解密对象进行解密。
在本发明的一种实施例中, 所述第二解密密钥为所述终端的识别号, 所 述第二加密密钥为加密时所述待解密对象所在终端的识别号。
为了解决上述问题, 本发明的实施例还提供了一种终端, 包括: 加密对象确定模块: 其设置成确定所述终端中的待加密对象;
加密密钥获取模块: 其设置成获取加密密钥, 所述加密密钥包括第一加 密密钥, 所述第一加密密钥为用户识别卡密钥; 以及
加密模块: 其设置成根据所述加密密钥对所述待加密对象进行加密。 在本发明的一种实施例中, 所述加密模块是设置为: 判断所述第一加密 密钥与所述终端内的用户识别卡密钥是否匹配, 若匹配, 则对所述待加密对 象进行力 p密。
在本发明的一种实施例中, 所述加密密钥还包括第二加密密钥。
在本发明的一种实施例中, 所述第二加密密钥为所述终端的识别号。 为了解决上述问题, 本发明的实施例还提供了一种终端, 包括: 解密对象确定模块: 其设置成确定所述终端中的待解密对象;
解密密钥获取模块: 其设置成获取解密密钥; 以及
解密模块: 其设置成根据所述解密密钥和对所述待解密对象进行加密时 釆用的加密密钥对所述待解密对象进行解密; 所述加密密钥包括第一加密密 钥, 所述第一加密密钥为用户识别卡密钥。
在本发明的一种实施例中, 所述解密密钥包括第一解密密钥, 所述解密 模块是设置为:
判断所述第一解密密钥与所述第一加密密钥是否匹配, 并判断所述第一 加密密钥与所述终端内的用户识别卡的密钥是否匹配, 若都匹配, 对所述待 解密对象进行解密;
或判断所述第一加密密钥与当前终端内的用户识别卡的密钥是否匹配,
若是, 对所述待解密对象进行解密。
在本发明的一种实施例中, 所述解密密钥还包括第二解密密钥; 以及所 述加密密钥包括第二加密密钥。
在本发明的一种实施例中, 所述解密模块是设置为:
判断所述第二解密密钥与所述第二加密密钥是否匹配, 若是, 对所述待 解密对象进行解密。
本发明的实施例提供一种终端及应用于终端的加密和解密方法, 其使用 用户识别卡作为密钥, 不仅可以提高管理对象的保密强度, 有效的增强管理 对象访问或使用的安全性; 而且该用户识别卡密钥也不容易丟失, 即使用户 忘记密钥信息时, 也很容易到相应的运营商找回并重置密钥信息, 因此可提 高用户体验的满意度。
附图概述
图 1为本发明实施例一中提供的利用密钥信息对待加密对象进行加密的 流程示意图;
图 2为本发明实施例二中提供的利用用户识别卡密钥和终端识别号对待 加密对象进行加密的流程示意图;
图 3 为本发明实施例三中提供的利用用户识别卡密钥完成对待解密对象 进行解密的流程示意图;
图 4为本发明实施例四中提供的利用用户识别卡密钥和终端识别号对待 解密对象进行解密的流程示意图;
图 5为本发明实施例六中提供的终端的结构示意图。
本发明的较佳实施方式
下面结合附图以及优选实施例, 对本发明的实施例的内容进行详细的说 明。 在不冲突的情况下, 本申请中的实施例及实施例中的特征可以相互组合。
实施例一:
图 1为本实施例提供的对待加密对象实现加密的流程示意图, 包括以下 步骤:
步骤 101 : 终端确定终端中的待加密对象;
该步骤的执行方式可以为:
手动确定待加密对象, 例如, 用户根据自己需求在终端上选择需要加密 的对象;
自动确定, 例如, 终端根据第三方软件设定的判断规则等在终端上选择 需要加密的对象, 并提示用户所选定的需要加密的对象。
步骤 102: 获取加密密码;
选择加密对象后, 终端获取加密密码, 本实施例中的加密密码包括第一 加密密钥, 且该第一加密密钥可为用户识别卡密钥; 另外, 本实施例中, 加 密密码的获取可以是根据用户的输入获取, 也可以是从终端内自动提取。
步骤 103: 执行加密操作;
用获取的加密密码釆用相应的加密算法对选定加密对象进行加密。
应当理解的是, 上述步骤 101与上述步骤 102并无严格的时序限制, 可 以先执行 101 , 然后在执行 102, 也可以先执行 102, 再执行 101等, 在此不 再赘述; 且本实施例中的加密算法可根据具体的应用场景选取, 在此也不再 赘述。
本实施例中提供的方案可利用第一加密密钥 (即用户识别卡密钥) 实现 对终端的管理对象进行加密, 且该管理对象并不仅局限于终端内的通讯录、 短信、 图片等, 还可为终端内的应用程序等。 可更全面的保护用户的数据的 私密性, 提高用户的体验。
同时, 由于用户识别卡密钥的唯一性且用户可更改、 设置, 所以利用用 户识别卡作为密钥, 不仅可以提高管理对象的保密强度, 有效的增强管理对 象访问或使用的安全性; 而且该用户识别卡密钥也不容易丟失, 即使用户忘 记密钥信息时, 也很容易到相应的运营商找回并重置密钥信息, 因此可提高 用户体验的满意度。
为了提高加密可靠性, 本实施例还可在加密过程中, 实现将待加密对象 与当前终端内的用户识别卡进行绑定, 此时, 在上述步骤 102之后, 步骤 103 之前, 还可包括:
将获取的第一加密密钥 (可为用户输入的用户识别卡密钥)与当前终端 内的用户识别卡的密钥进行认证的过程, 该过程可为: 判断获取的第一加密 密钥与当前终端内的用户识别卡的密钥是否匹配, 如是, 则认证通过, 然后 才基于获取的加密密码对确定的加密对象进行加密; 如果否, 认证不通过, 需重新获取第一加密密钥, 例如, 提示用户重新输入第一加密密钥等。
应当理解的是, 本实施例中的用户识别卡包括 SIM、 UIM、 USIM卡在 内的能设置于终端上的起验证、 匹配作用的用户识别卡, 而用户识别卡密钥 可为用户识别卡的 PIN1码、 PIN2码、 PUK码、 PUK2、 ADM码和 IMSI码 等具有唯一识别性号码的中的至少一个或多个, 本实施例中釆用的用户识别 卡密钥可为私密性良好且遗忘后易找回的 PIN1码或 PIN2码, 此时避免用户 遗忘密码后导致无法实现正常解密的情况发生; 当然, 第一加密密钥还可为 PIN1码与 PIN2码的组合, 或 PIN1码与 PUK1码的组合等。 当为上述各用户 识别卡密钥中的多个组合时, 获取的方式可以是多次获取多个, 也可以是一 次输入釆用分隔符区分的多个密钥等。
在本实施例中对加密对象执行加密操作过程中, 为提高安全性能, 如果 第一加密密钥验证失败, 可以设置验证失败次数门限, 当验证次数超出设置 的门限值时, 则结束对应用程序的加密。
在本实施例中, 当对待加密对象完成加密后, 还可将该加密过程中使用 的加密信息保存起来供后续解密过程中使用, 保存的加密信息可包括管理对 象的加密状态以及加密时使用的加密密码等。
实施例二:
为了提高用户数据的安全性, 本实施例中的加密密码除了包括上述实施 例一中的第一加密密钥, 还可包括第二加密密钥, 该第二加密密钥可以是用 户设置的任何密钥, 在加密时, 将第一密钥和所述第二密钥组合作为加密密
码对加密对象进行加密。 请参见图 2所示, 该过程包括:
步骤 201 : 终端确定终端中的待加密对象;
该步骤的执行方式可以为:
手动确定待加密对象, 例如, 用户根据自己需求在终端上选择需要加密 的对象;
自动确定待加密对象, 例如, 终端根据第三方软件设定的判断规则判断 在终端上存在的对象是否需要加密, 并提示用户所选定的需要加密的对象。
步骤 202: 获取加密密码;
选择加密对象后, 终端获取加密密码, 本实施例中的加密密码包括上述 的第一加密密钥, 还包括第二加密密钥, 第一加密密钥为用户识别卡密钥, 第二加密密钥可为用户设置的其他任何密钥, 例如, 可为用户的设置的生日 密钥等; 本实施例中优选第二加密密钥为该终端的识别号, 以实现在加密过 程中, 将待加密对象与该待加密对象当前所在的终端进行绑定;
步骤 203: 对该待加密对象加密;
用获取的包括用户识别卡密钥与终端识别号的加密密码对加密对象进行 加密。
应当理解的是, 上述步骤 201与上述步骤 202并无严格的时序限制, 可 以先执行 201 , 然后在执行 202, 也可以先执行 202, 再执行 201等, 在此不 再赘述。
为了提高加密可靠性, 本实施例还可在加密过程中, 实现将加密对象与 当前终端内的用户识别卡进行绑定, 此时, 在上述步骤 202之后, 步骤 203 之前, 还包括:
将获取的第一加密密钥 (即用户输入的用户识别卡密钥)与当前终端内 的用户识别卡的密钥进行认证的过程, 该过程可为: 判断获取的第一加密密 钥与当前终端内的用户识别卡的密钥是否匹配, 如果是, 则认证通过, 然后 才基于获取的加密密码对确定的加密对象进行加密; 如果否, 认证不通过, 需重新获取第一加密密钥。
可见, 在本实施例加密过程中, 可同时实现将加密对象与该加密对象所
在的终端以及该终端内的用户识别卡同时进行绑定; 对应的, 在对其解密时, 则必须验证与该终端的终端识别号以及在加密过程中该终端所使用的用户识 别卡密钥相匹配的第二解密密钥和第一解密密钥才能实现解密。 可见, 釆用 本实施例提供的加密方法, 当在加密时使用的终端或者用户识别卡变更的话, 被加密对象都不能正常打开, 可保证安全性。
值得注意的是, 本实施例中加密入口方式的实现方式不唯一, 下面以通 过终端的应用加密菜单进入为例进行说明: 用户通过终端的交互菜单进入应 用加密菜单, 通过该菜单的选择操作会启动相关的后台程序进行相关处理; 可假定该菜单此时列举出本终端已经安装过的应用程序, 用户选择需要加密 的应用程序, 此时终端显示出提示框, 提示用户输入 SIM卡的 PIN1码。 用 户输入后终端提取用户输入的 PIN1码信息, 向 SIM卡申请 PIN1码验证, 如 果验证成功, 终端保存用户输入的该有效 PIN1码, 同时终端提取 IMEI号, 将这两个参数作为密钥对该应用程序进行加密操作。 加密后, 终端记录并保 存该应用程序的加密状态信息, 作为下次用户访问该应用程序时的处理和判 断的依据。 如果 PIN码验证返回失败的结果, 则加密操作失败。
实施例三:
在本实施例中, 在上述实施例一所示的加密方法基础上, 可釆用图 3所 示的解密过程对已加密的待解密对象实现解密, 该过程包括:
步骤 301 : 终端确定终端中的待解密对象;
本实施例中确定待解密对象可根据用户的选择确定, 例如: 当用户选定 一个对象作为访问对象时, 在接收到相应的访问指令后, 判断该访问对象是 否被加密 (可根据该访问对象的加密状态来判断) , 如是, 则确定该访问对 象为待解密对象。
步骤 302: 获取解密密码;
本实施例中解密密码的获取可根据用户的输入获取, 当然, 也不排除通 过预先内置后自动获取等方式获取;
本实施例中获取的解密密码包括第一解密密钥, 该第一解密密钥为用户
输入的密钥, 对被加密的访问对象, 终端获取解密密码中的第一解密密钥。 步骤 303: 对待解密对象执行解密操作;
用获取的解密密码和对该待解密对象加密时所釆用的加密密钥, 并釆用 对应的解密算法对待解密对象解密。
本实施例中提供的方案可利用第一加密密钥 (即用户识别卡密钥) 实现 对终端的管理对象进行加、 解密, 且该管理对象并不仅局限于终端内的通讯 录、 短信、 图片等, 还可为终端内的应用程序及储存卡等。 可更全面的保护 用户的数据的私密性, 提高用户的体验。
当加密过程中利用加密时使用的第一加密密钥实现了将加密对象与该对 象当时所在终端内使用的用户识别卡进行绑定, 在本实施例的解密过程中, 还可包括对当前终端中的用户识别卡进行验证的过程, 该验证过程可为: 将获取的第一解密密钥与加密时保存的第一加密密钥进行匹配, 并将第 一加密过程中保存的第一加密密钥与当前终端内的用户识别卡的密钥进行匹 配, 若都匹配通过, 则釆用相应的解密算法该对待解密对象进行后续的解密 过程。 在本实施例中, 第一解密密钥与第一加密密钥的匹配步骤和第一加密 密钥与当前终端内的用户识别卡的匹配步骤并无严格的时序限制。
在本实施例中, 还可在用户输入解密密钥之前或输入密码之后, 直接将 加密时保存的第一加密密钥与当前终端内的用户识别卡的密钥进行匹配, 当 匹配未通过时, 则可直接提醒用户识别卡变更, 不能完成解密; 若匹配通过, 再提醒用户输入解密密钥以及对用户输入的第一解密密钥进行匹配等过程。
应当理解的是, 本实施例中的用户识别卡包括 SIM、 UIM、 USIM等在 内的能设置于终端上, 起验证匹配验证作用的用户识别卡, 用户识别卡密钥 可为上述这些卡里面的 PIN1码、 PIN2码、 PUK码、 PUK2码和 IMSI码等 具有唯一识别性号码的中的至少一个或多个, 本实施例中釆用的用户识别卡 密钥可为私密性良好且遗忘后易找回的 PIN1码或 PIN2码, 此时避免用户遗 忘密码后导致无法实现正常解密的情况发生;
在本实施例中, 当加密过程中釆用至少一个加密密码时, 解密过程对应 的可为 PIN1码与 PIN2码的组合、 PIN1码与 PUK1码或其他多个密码的组合
等方式对应解密。 当解密密钥为多个组合时, 获取的方式可以是多次获取多 个, 也可以是一次输入釆用分隔符区分的多个密钥等。
在本实施例中对待解密对象执行解密操作过程中, 为提高安全性能, 如 果第一解密密钥匹配失败, 或第一加密密钥验证失败, 可以设置匹配和 /或验 证失败次数门限, 当匹配和 /或验证次数超出设置的门限值时, 可执行结束对 对象的访问、 锁定用户识别卡、 强制关机等限制性措施。
实施例四:
在本实施例中, 在上述实施例二所示的加密方法基础上, 为了提高用户 数据的安全性, 本实施例中的解密密码除了包括上述实施例三中的第一解密 密钥, 还可包括第二解密密钥, 该第二解密密钥对应于实施例二中釆用的第 二加密密钥, 在解密时, 将第一解密密钥和所述第二解密密钥结合作为解密 密码对待解密对象进行解密。 请参见图 4所示, 该过程包括:
步骤 401 : 终端确定终端中待解密对象;
本实施例中确定待解密对象可根据用户的选择确定, 例如: 当用户选定 一个对象作为访问对象时, 在接收到相应的访问指令后, 判断该访问对象是 否被加密 (可根据该访问对象的加密状态来判断) , 如是, 则确定该访问对 象为待解密对象。
步骤 402: 获取解密密码;
本实施例中解密密码的获取可才艮据用户的输入获取, 当然, 也不排除通 过预先内置后自动获取等方式获取;
本实施例中获取的解密密码包括第一解密密钥, 还包括第二解密密钥, 该第一解密密钥可为用户输入的密钥, 该第二解密密钥也可以是用户输入的 密钥, 还可以是自动从当前终端内获取的密钥; 本实施例中优选第二解密密 钥为自动从当前终端内获取的该终端的识别号;
步骤 403: 对待解密对象执行解密操作;
该过程包括:
判断第二解密密钥与第二加密密钥是否匹配;
第一解密密钥与第一加密密钥是否匹配;
第一加密密钥与当前终端内的用户识别卡的密钥是否匹配。
在本实施例中, 上述三个步骤并无严格的时序限制, 执行的顺序可根据 实际的应用场景灵活选择设置。 当上述的匹配结果都为是时, 给予解密密钥 釆用与加密算法对应的解密算法完成对待解密对象的解密。
在本实施例中对待解密对象执行解密操作过程中, 为提高安全性能, 如 果第一解密密钥匹配失败和 /或第二解密密钥匹配失败时, 可以设置验证失败 次数门限, 当验证次数超出设置的门限值时, 可釆取结束对对象的访问、 锁 定用户识别卡、 强制关机等限制性措施。
实施例五:
在本实施例中, 在对加密对象进行加密时, 除了可釆用上述第一加密密 钥和上述第二加密密钥外, 还可获取用户输入的第三加密密钥, 甚至更多的 密钥。 例如: 在对待加密对象执行加密操作过程中, 对获取的用户识别卡密 钥 (即第一加密密钥 ) 与终端识别号 (即第二加密密钥 )进行匹配通过后, 可再提示输入第三加密密钥, 釆用第一加密密钥、 第二加密密钥和第三加密 密钥的组合作为加密密钥对加密对象执行加密操作。 对应的, 在解密时, 除 了获取、 匹配上述第一解密密码、 第二解密密码外, 还对应包括获取、 匹配 与上述第三加密密码对应的第三解密密码过程, 在此不再进行赞述。
可针对终端中的不同的管理对象在上述基础上分别设置第四密码、 第五 密码等。
实施例六
图 5为本实施例提供的一种终端结构示意图, 本实施例中的终端 500为 支持用户识别卡的所有终端, 例如, 手机终端、 IPAD终端等; 该终端 500可 为加密终端, 包括: 加密对象确定模块 510、 加密密钥获取模块 511 以及加 密模块 512, 其中,
加密对象确定模块 510设置成按照上述各实施例中所示的方法确定终端
中的待加密的对象;
加密密钥获取模块 511设置成按照上述各实施例中所示的方法获取加密 密码;
加密模块 512设置成根据加密密钥获取模块 511获取的加密密钥按照上 述各实施例中所示的方法对确定的待加密对象进行加密。
请参见图 5所示,该图所示的终端 500还可为解密终端,也即该终端 500 既具有上述加密功能, 也具有上述解密功能; 当然, 本实施例中的终端 500 也可仅具有上述两个功能之一。 当该终端 500具备上述解密功能时, 该终端 500包括:解密对象确定模块 520、解密密钥获取模块 521以及解密模块 522, 其中:
解密对象确定模块 520设置成按照上述各实施例中所示的方法确定终端 中待解密的对象;
解密密钥获取模块 521设置成按照上述各实施例中所示的方法获取解密 密钥;
解密模块 522设置成根据解密密钥获取模块 521获取的解密密钥, 按照 上述各实施例中所示的方法对选定的待解密对象进行解密。
显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可 以用通用的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布 在多个计算装置所组成的网络上, 可选地, 它们可以用计算装置可执行的程 序代码来实现, 从而, 可以将它们存储在存储装置中由计算装置来执行, 并 且在某些情况下, 可以以不同于此处的顺序执行所示出或描述的步骤, 或者 将它们分别制作成各个集成电路模块, 或者将它们中的多个模块或步骤制作 成单个集成电路模块来实现。 这样, 本发明不限制于任何特定的硬件和软件 结合。
以上所述, 仅是本发明的较佳实施例而已, 并非对本发明作任何形式上 的限制, 虽然本发明的较佳实施例已揭露如上, 然而并非用以限定本发明, 任何熟悉本领域的技术人员, 在不脱离本发明的实施例的技术方案范围内,
可利用上述揭示的方法及技术做出些许的更改或修饰为等同变化的等效实施 例, 在不脱离本发明的实施例的技术发明内容的情况下, 依据本发明的实施 例的技术实质对以上实施例所做出的任何修改、 等同变化与修饰, 均属于本 发明的实施例的技术方案的范围。
工业实用性 本发明的实施例提供了一种终端及应用于终端的加密和解密方法, 其使 用用户识别卡作为密钥, 不仅可以提高管理对象的保密强度, 有效的增强管 理对象访问或使用的安全性; 而且该用户识别卡密钥也不容易丟失, 即使用 户忘记密钥信息时, 也很容易到相应的运营商找回并重置密钥信息, 因此可 提高用户体验的满意度。
Claims
1、 一种应用于终端的加密方法, 包括:
终端确定所述终端中的待加密对象;
所述终端获取加密密钥, 所述加密密钥包括第一加密密钥, 所述第一加 密密钥为用户识别卡密钥; 以及
根据所述加密密钥对所述待加密对象进行加密。
2、 如权利要求 1所述的应用于终端的加密方法, 其中, 根据所述加密密 钥对所述待加密对象进行加密的步骤包括:
判断所述第一加密密钥与所述终端内的用户识别卡密钥是否匹配, 若匹 配, 则对所述待加密对象进行加密。
3、 如权利要求 1或 2所述的应用于终端的加密方法, 其中,
所述用户识别卡密钥包括用户识别卡的 ADM码、 PIN1码、 PIN2码、 PUK 码、 PUK2码和 IMSI码中的至少一种。
4、 如权利要求 1或 2所述的应用于终端的加密方法, 其中,
所述加密密钥还包括第二加密密钥。
5、 如权利要求 4所述的应用于终端的加密方法, 其中,
所述第二加密密钥为所述终端的识别号。
6、 一种应用于终端的解密方法, 包括:
终端确定所述终端中的待解密对象;
所述终端获取解密密钥; 以及
根据所述解密密钥和对所述待解密对象进行加密时釆用的加密密钥对所 述待解密对象进行解密; 所述加密密钥包括第一加密密钥, 所述第一加密密 钥为用户识别卡密钥。
7、 如权利要求 6所述的应用于终端的解密方法, 其中,
所述解密密钥包括第一解密密钥, 根据所述解密密钥和所述加密密钥对 所述待解密对象进行解密的步骤包括:
判断所述第一解密密钥与所述第一加密密钥是否匹配, 并判断所述第一 加密密钥与所述终端内的用户识别卡的密钥是否匹配, 若都匹配, 对所述待 解密对象进行解密;
或判断所述第一加密密钥与当前终端内的用户识别卡的密钥是否匹配, 若是, 对所述待解密对象进行解密。
8、 如权利要求 6或 7所述的应用于终端的解密方法, 其中,
所述解密密钥还包括第二解密密钥; 以及
所述加密密钥包括第二加密密钥。
9、 如权利要求 8所述的对终端解密的方法, 其中,
根据所述解密密钥和所述加密密钥对所述待解密对象进行解密的步骤包 括:
判断所述第二解密密钥与所述第二加密密钥是否匹配, 若是, 对所述待 解密对象进行解密。
10、 如权利要求 8所述的应用于终端的解密方法, 其中,
所述第二解密密钥为所述终端的识别号, 所述第二加密密钥为加密时所 述待解密对象所在终端的识别号。
11、 一种终端, 包括:
加密对象确定模块: 其设置成确定所述终端中的待加密对象;
加密密钥获取模块: 其设置成获取加密密钥, 所述加密密钥包括第一加 密密钥, 所述第一加密密钥为用户识别卡密钥; 以及
加密模块: 其设置成根据所述加密密钥对所述待加密对象进行加密。
12、 如权利要求 11所述的终端, 其中,
所述加密模块是设置为: 判断所述第一加密密钥与所述终端内的用户识 别卡密钥是否匹配, 若匹配, 则对所述待加密对象进行加密。
13、 如权利要求 11或 12所述的终端, 其中,
所述加密密钥还包括第二加密密钥。
14、 如权利要求 13所述的终端, 其中,
所述第二加密密钥为所述终端的识别号。
15、 一种终端, 包括:
解密对象确定模块: 其设置成确定所述终端中的待解密对象;
解密密钥获取模块: 其设置成获取解密密钥; 以及
解密模块: 其设置成根据所述解密密钥和对所述待解密对象进行加密时 釆用的加密密钥对所述待解密对象进行解密; 所述加密密钥包括第一加密密 钥, 所述第一加密密钥为用户识别卡密钥。
16、 如权利要求 15所述的终端, 其中,
所述解密密钥包括第一解密密钥, 所述解密模块是设置为:
判断所述第一解密密钥与所述第一加密密钥是否匹配, 并判断所述第一 加密密钥与所述终端内的用户识别卡的密钥是否匹配, 若都匹配, 对所述待 解密对象进行解密;
或判断所述第一加密密钥与当前终端内的用户识别卡的密钥是否匹配, 若是, 对所述待解密对象进行解密。
17、 如权利要求 15或 16所述的终端, 其中,
所述解密密钥还包括第二解密密钥; 以及
所述加密密钥包括第二加密密钥。
18、 如权利要求 17所述的终端, 其中,
所述解密模块是设置为:
判断所述第二解密密钥与所述第二加密密钥是否匹配, 若是, 对所述待 解密对象进行解密。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310166791.0A CN104144411B (zh) | 2013-05-08 | 2013-05-08 | 加密、解密终端及应用于终端的加密和解密方法 |
CN201310166791.0 | 2013-05-08 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2013182103A2 true WO2013182103A2 (zh) | 2013-12-12 |
WO2013182103A3 WO2013182103A3 (zh) | 2014-03-20 |
Family
ID=49712746
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/078287 WO2013182103A2 (zh) | 2013-05-08 | 2013-06-28 | 加密、解密终端及应用于终端的加密和解密方法 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104144411B (zh) |
WO (1) | WO2013182103A2 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160055339A1 (en) * | 2013-04-07 | 2016-02-25 | Zte Corporation | Encryption Processing Method and Device for Application, and Terminal |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105763523A (zh) * | 2014-12-19 | 2016-07-13 | 中国电信股份有限公司 | 防范应用信息泄露的方法、装置和移动终端 |
CN105022965B (zh) * | 2015-07-14 | 2019-09-06 | Oppo广东移动通信有限公司 | 一种数据加密方法及装置 |
CN106707978B (zh) * | 2015-11-13 | 2021-10-22 | 北京奇虎科技有限公司 | 通过通讯录转移智能家居控制权的方法及通讯录 |
CN106845264A (zh) * | 2015-12-03 | 2017-06-13 | 中兴通讯股份有限公司 | 应用加密方法、装置和应用访问方法、装置 |
CN107920069A (zh) * | 2017-11-15 | 2018-04-17 | 中国联合网络通信集团有限公司 | 加密终端内应用程序安全处理方法及装置 |
CN112566124B (zh) * | 2019-09-25 | 2024-06-18 | 紫光同芯微电子有限公司 | 密钥生成及加解密方法、装置以及sim卡芯片 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101727547A (zh) * | 2008-10-30 | 2010-06-09 | 爱思开电讯投资(中国)有限公司 | 一种用于保护drm许可文件的装置和方法 |
CN102799540A (zh) * | 2012-06-21 | 2012-11-28 | 中兴通讯股份有限公司 | 利用用户识别卡密钥对存储卡加解密的方法、系统和终端 |
CN102938032A (zh) * | 2012-10-17 | 2013-02-20 | 中兴通讯股份有限公司 | 一种对通讯终端上应用程序加、解密的方法、系统和终端 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8364975B2 (en) * | 2006-12-29 | 2013-01-29 | Intel Corporation | Methods and apparatus for protecting data |
CN102026174B (zh) * | 2009-09-17 | 2014-03-12 | 中兴通讯股份有限公司 | 一种寻呼过程中用户标识的保密方法及装置 |
CN102866960A (zh) * | 2012-09-05 | 2013-01-09 | 中兴通讯股份有限公司 | 一种在存储卡中实现加密的方法、解密的方法和装置 |
-
2013
- 2013-05-08 CN CN201310166791.0A patent/CN104144411B/zh active Active
- 2013-06-28 WO PCT/CN2013/078287 patent/WO2013182103A2/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101727547A (zh) * | 2008-10-30 | 2010-06-09 | 爱思开电讯投资(中国)有限公司 | 一种用于保护drm许可文件的装置和方法 |
CN102799540A (zh) * | 2012-06-21 | 2012-11-28 | 中兴通讯股份有限公司 | 利用用户识别卡密钥对存储卡加解密的方法、系统和终端 |
CN102938032A (zh) * | 2012-10-17 | 2013-02-20 | 中兴通讯股份有限公司 | 一种对通讯终端上应用程序加、解密的方法、系统和终端 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160055339A1 (en) * | 2013-04-07 | 2016-02-25 | Zte Corporation | Encryption Processing Method and Device for Application, and Terminal |
US9977907B2 (en) * | 2013-04-07 | 2018-05-22 | Zte Corporation | Encryption processing method and device for application, and terminal |
Also Published As
Publication number | Publication date |
---|---|
CN104144411B (zh) | 2019-09-24 |
CN104144411A (zh) | 2014-11-12 |
WO2013182103A3 (zh) | 2014-03-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102307665B1 (ko) | 신원 인증 | |
EP2905715B1 (en) | Method, system and terminal for encrypting/decrypting application program on communication terminal | |
CN107113175B (zh) | 多用户强认证令牌 | |
US9372977B2 (en) | Screen unlocking method, device and terminal | |
WO2013182103A2 (zh) | 加密、解密终端及应用于终端的加密和解密方法 | |
CN109714769B (zh) | 信息绑定方法、装置、设备及存储介质 | |
CN107864124B (zh) | 一种终端信息安全保护方法、终端及蓝牙锁 | |
WO2014169610A1 (zh) | 移动终端的数据加、解密方法、装置及保护系统 | |
WO2019109640A1 (zh) | 一种锁定sim卡的方法及装置 | |
US20170026385A1 (en) | Method and system for proximity-based access control | |
CN106650373A (zh) | 一种sim卡信息保护方法及装置 | |
US20170201528A1 (en) | Method for providing trusted service based on secure area and apparatus using the same | |
CN109977039A (zh) | 硬盘加密密钥存储方法、装置、设备及可读存储介质 | |
US20170091483A1 (en) | Method and Device for Protecting Address Book, and Communication System | |
CN101815292A (zh) | 一种移动终端的数据保护装置及方法 | |
US9977907B2 (en) | Encryption processing method and device for application, and terminal | |
CN110287725B (zh) | 一种设备及其权限控制方法、计算机可读存储介质 | |
US10181951B2 (en) | Protected encryption key recovery | |
CN110807854A (zh) | 一种开锁策略配置方法及设备 | |
US20150302506A1 (en) | Method for Securing an Order or Purchase Operation Means of a Client Device | |
CN107862209B (zh) | 一种文件加解密方法、移动终端和具有存储功能的装置 | |
WO2015131585A1 (zh) | 一种保证sd卡安全的方法和装置 | |
KR101298216B1 (ko) | 복수 카테고리 인증 시스템 및 방법 | |
CN104134048A (zh) | 存储卡的加密方法和加密装置 | |
WO2005050910A1 (en) | A method for authenticating the device’s self-validity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13800014 Country of ref document: EP Kind code of ref document: A2 |