WO2015117437A1 - 一种文件加密方法、解密方法及装置 - Google Patents

一种文件加密方法、解密方法及装置 Download PDF

Info

Publication number
WO2015117437A1
WO2015117437A1 PCT/CN2014/090634 CN2014090634W WO2015117437A1 WO 2015117437 A1 WO2015117437 A1 WO 2015117437A1 CN 2014090634 W CN2014090634 W CN 2014090634W WO 2015117437 A1 WO2015117437 A1 WO 2015117437A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
key
party
decryption
encrypted
Prior art date
Application number
PCT/CN2014/090634
Other languages
English (en)
French (fr)
Inventor
巫江
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2015117437A1 publication Critical patent/WO2015117437A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a file encryption method, a decryption method, and a device.
  • Encryption technology is a common security measure when files are transferred between users.
  • a file is often forwarded repeatedly with its decryption key, and some relatively private content cannot be effectively protected.
  • the encryption of the file requires the user to perform cumbersome operations to complete, and the user experience is poor.
  • an embodiment of the present invention provides a file encryption method, a decryption method, and an apparatus.
  • the embodiment of the present invention provides a file encryption method, including: an encryption party receives a directional encryption instruction of a user, where the directional encryption instruction carries a decryption party communication mode of a file to be encrypted; and the encryption party uses the first key. Encrypting the file to be encrypted to form a first encrypted file; the encrypting party encrypts the first encrypted file, the first key, and the decrypting party communication manner together by using a second key to form Second encrypting the file and decrypting according to the The party communication method transmits the second key information to the decrypting party.
  • the decryption party communication method includes at least one of a decryption party's telephone number, a mailbox, and an instant communication tool.
  • the encrypting party encrypting the first encrypted file, the first key, and the decrypting party communication manner together using the second key specifically includes: the encrypting party uses the decrypting party The communication mode is used as a third key, and the first key is encrypted to form a third encrypted file; the encrypting party uses the second key to pair the first encrypted file and the third encrypted file Encrypt together.
  • the sending, by the encrypting party, the second key to the decrypting party according to the decrypting party communication manner includes: sending, by the encrypting party, the decrypting party to the decrypting party according to the decrypting party communication manner The second key and the decryption party communication mode.
  • the embodiment of the present invention further provides a file decryption method, including: the decrypting party receives a fourth key sent by the encrypting party by using a preset communication manner; and the decrypting party decrypts the decrypted file by using the fourth key.
  • Obtaining a first decrypted file where the first decrypted file includes a core to be decrypted file, a fifth key, and a decrypting party communication manner; and in a case where the decrypting party communication manner is the same as the preset communication manner, using the same
  • the fifth key decrypts the core file to be decrypted.
  • the embodiment of the present invention further provides a file encryption apparatus, including: an instruction receiving unit, configured to receive a directional encryption instruction of a user, where the directional encryption instruction carries a decryption party communication mode of the file to be encrypted; a unit configured to encrypt the to-be-encrypted file by using a first key to form a first encrypted file, and a second encryption unit configured to use the second key to use the first encrypted file, the first key And the decrypting party communication mode is encrypted together to form a second encrypted file; and the sending unit is configured to send the second key to the decrypting party according to the decrypting party communication manner.
  • an instruction receiving unit configured to receive a directional encryption instruction of a user, where the directional encryption instruction carries a decryption party communication mode of the file to be encrypted
  • a unit configured to encrypt the to-be-encrypted file by using a first key to form a first encrypted file
  • a second encryption unit configured to use the second key to use the first encrypted file
  • the decryption party communication method includes at least one of a decryption party's telephone number, a mailbox, and an instant communication tool.
  • the second encryption unit is specifically configured to: encrypt the first key to form a third encrypted file by using the decryption party communication mode as a third key; The second key encrypts the first encrypted file and the third encrypted file together to form the second encrypted file.
  • the sending unit is specifically configured to send the second key and the decrypting party communication manner to the decrypting party according to the decrypting party communication manner.
  • the embodiment of the present invention further provides a file decryption apparatus, including: a key receiving unit configured to receive a fourth key sent by an encrypting party by using a preset communication manner; and a first decrypting unit configured to use the The fourth key decrypts the decrypted file to obtain a first decrypted file; the first decrypted file includes a core to be decrypted file, a fifth key, and a decryption party communication mode; and a second decryption unit configured to perform the decryption If the party communication mode is the same as the preset communication mode, the core to be decrypted file is decrypted by using the fifth key.
  • a file decryption apparatus including: a key receiving unit configured to receive a fourth key sent by an encrypting party by using a preset communication manner; and a first decrypting unit configured to use the The fourth key decrypts the decrypted file to obtain a first decrypted file; the first decrypted file includes
  • the file encryption method, the decryption method and the device provided by the embodiment of the invention can perform two-layer encryption on the encrypted file according to the directional encryption instruction of the encryption side, and the operation is simple and safe.
  • the second encrypted file formed by the second layer encryption operation includes a corresponding decryption party communication manner, so that different decryption parties can receive different second encrypted files; and, by using the second key correspondingly
  • the decryption party can decrypt the file according to the correspondence between the communication method used when receiving the second key and the decryption party communication method carried in the second encrypted file, and the decryption party Because other users do not have the corresponding relationship of the communication mode, the file cannot be decrypted, thereby realizing the decryption of the specified file by the designated user, effectively enhancing the privacy protection during the file transmission process of the mobile terminal, and greatly improving the user experience.
  • FIG. 1 is a flowchart of a file encryption method according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a file decryption method according to an embodiment of the present invention
  • FIG. 3 is a detailed flowchart of a file encryption method and a decryption method according to an embodiment of the present invention
  • FIG. 4 is a schematic diagram of a user interface for selecting an encrypted file in a file encryption method according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram of a user interface for selecting an authorization object in a file encryption method according to an embodiment of the present invention
  • FIG. 6 is a schematic diagram of a user interface for viewing a file list in a file encryption method and a decryption method according to an embodiment of the present invention
  • FIG. 7 is a schematic diagram of a user interface for viewing file content in a file encryption method and a decryption method according to an embodiment of the present invention
  • FIG. 8 is a schematic diagram of a user interface for viewing file content in a file decryption method according to an embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of a file encryption apparatus according to an embodiment of the present invention.
  • FIG. 10 is a schematic structural diagram of a file decryption apparatus according to an embodiment of the present invention.
  • an embodiment of the present invention provides a file encryption method, including:
  • the encrypting party receives the directional encryption instruction of the user, where the directional encryption instruction carries a decryption party communication mode of the file to be encrypted;
  • the encrypting party encrypts the file to be encrypted by using a first key to form a first encrypted file.
  • the encrypting party encrypts the first encrypted file, the first key, and the decrypting party communication manner together with a second key to form a second encrypted file, and according to the decrypting party communication manner.
  • the decrypting party sends the second key information.
  • the file encryption method provided by the embodiment of the invention can perform two-layer encryption on the encrypted file according to the directional encryption instruction of the encryption side, and the operation is simple and safe.
  • the second encrypted file formed by the second layer encryption operation includes a corresponding decryption party communication mode, so that different decryption parties can receive different second encrypted files; and, by corresponding communication by the second key
  • the method is sent to different decrypting parties, so that the decrypting party can decrypt the file according to the correspondence between the communication method used when receiving the second key and the decrypting party communication method carried in the second encrypted file, except for the decrypting party.
  • the file cannot be decrypted, thereby realizing the decryption of the specified file by the designated user, effectively enhancing the privacy protection during the file transmission process of the mobile terminal, and greatly improving the user experience.
  • the decryption party communication mode may include one or more of a communication method of a decryption party's telephone number, a mailbox, an instant communication tool, and the like. These communication methods can be stored in a mobile terminal such as a mobile phone in the form of a communication book. Since different decrypting parties have different communication modes, the information of the decrypting party communication mode is added to the encrypted file to distinguish different decrypting parties, so that only the corresponding decrypting party can successfully decrypt the file, thereby greatly enhancing the file. privacy protection.
  • the encrypting party encrypts the first encrypted file, the first key, and the decrypting party communication manner together using a second key to form a specific form of the second encrypted file.
  • the first key and the decryption side communication method may be encrypted by the second key together with the first encrypted file in the form of plain text, or may be first used as the third key by using the decryption side communication method to perform the first key. Encrypted to form a third encrypted file; the first encrypted file and the third encrypted file are then encrypted together using the second key. In this way, since the first key is encrypted again by the decryption side communication method, the privacy protection of the file is further strengthened.
  • the decryption side communication method is the decryption party's telephone number, and then the file to be encrypted is encrypted by the first key to form the first encrypted file, and then the first A key, the decryption party telephone number is placed together with the first encrypted file, and the three types of information are encrypted together by the second key to form a second encrypted file, and the second key is sent to the phone as a short message.
  • the mobile terminal corresponding to the number, that is, the decrypting party causes the decrypting party to know the second key.
  • the decrypting party communication method may further be an email box, and after the file to be encrypted is encrypted by the first key to form the first encrypted file, the first key, the first encrypted file, and the decrypted file are then decrypted.
  • the party email addresses are put together, the three keys are encrypted together by the second key, and the second key is sent to the email address in the form of an email, that is, the decrypting party, so that the decrypting party knows the second Key.
  • the decryption side communication manner may further include other, only the corresponding communication manner is included in the second encrypted file, and the second key is sent to the decryption through the communication manner.
  • the embodiment of the present invention does not limit this.
  • the decryption party can be made aware of its own communication mode, and the file is decrypted by using the communication method and the second key, but the present invention is not limited to the present invention. Therefore, the decryption party can also know its own communication method by other means. For example, in order to enable the decrypting party to learn its own communication mode more quickly, in an embodiment, in step S13, the encrypting party sends the second key to the decrypting party according to the decrypting party communication manner.
  • the method includes: the encrypting party transmitting the second key and the decrypting party communication manner to the decrypting party according to the decrypting party communication manner. In this way, the decryption party can directly decrypt the communication method of the decryption party without further querying, thereby decrypting the file.
  • the encryption side and the decryption side may be respectively set on different mobile terminals, and the encryption side is also the provider of the file, and the decryption side is also the receiver of the file.
  • the encrypted file ie, the second encrypted file
  • the transmission of the second encrypted file and the transmission of the second key are performed separately, and the transmission manners thereof may be the same.
  • the transmission may be performed by mail or sequentially, for example, the second encrypted file is transmitted by using WeChat, and the second key is used.
  • Mobile phone short message transmission embodiment of the present invention There is no limit to this.
  • an embodiment of the present invention further provides a file decryption method, including:
  • the decrypting party receives the fourth key sent by the encrypting party by using a preset communication manner.
  • the decrypting party decrypts the decrypted file by using the fourth key to obtain a first decrypted file;
  • the first decrypted file includes a core to be decrypted file, a fifth key, and a decrypting party communication manner;
  • decryption party communication mode If the decryption party communication mode is the same as the preset communication mode, decrypt the core to-be-decrypted file by using the fifth key.
  • the file decryption method provided by the embodiment of the present invention receives the fourth key by using a preset communication manner, and uses the fourth key to perform initial decryption on the decrypted file to obtain a first decrypted file, where the first decrypted file includes a decryption party communication.
  • the decryption mode is the same as the preset communication mode used for receiving the fourth key, the core to be decrypted file is decrypted by using the fifth key, and the entire decryption process does not require any active operation by the user, and the user may not In the case of sensing, the file is directly decrypted and read, which greatly improves the user experience; and if the decrypting party communicates with the preset communication method of receiving the fourth key, the user cannot decrypt the core file to be decrypted, Only the specified decryption party can successfully decrypt the file, which effectively enhances the privacy protection during the file transfer process of the mobile terminal.
  • the decrypting party receives the fourth key sent by the encrypting party by using a preset communication manner, where the preset communication manner may include a decryption party's telephone number, a mailbox, an instant communication tool, and the like. One or several.
  • the decryption party also knows the preset communication mode information, such as knowing its mobile phone number, email address, WeChat account number, etc., while receiving the fourth key through the preset communication mode.
  • the decryption party communication mode carried in the file to be decrypted can be known, and then the preset communication mode is compared with the decryption party communication mode, and when the two are the same, Using the fifth key pair core to be solved
  • the secret file is decrypted; when the two are different, it indicates that the user is not the file reader specified by the encrypting party, and the decryption operation is terminated, thereby protecting the core file to be decrypted and protecting the privacy of the user.
  • the decrypting party can know that its preset communication mode is the key to decrypting the core file to be decrypted.
  • the decrypting party can learn its own communication method by receiving the fourth key, the present invention is not limited thereto.
  • the decrypting party may also learn the preset communication manner by other means. For example, the decrypting party may obtain its own telephone number by using the support of the telecommunications carrier, or may be verified by some network session or registration information. Wait until you know your instant messaging account and so on.
  • a file encryption method and a file decryption method are involved.
  • the first key, the second key, and the fourth key are respectively used in the foregoing embodiments.
  • the fifth key is described.
  • the two methods are reciprocal processes, wherein the first key of the encryption method corresponds to the fifth key of the decryption method, and the second key of the encryption method corresponds to the fourth key of the decryption method.
  • the second encrypted file in the encryption method corresponds to the file to be decrypted in the decryption method
  • the first encrypted file in the encryption method corresponds to the core to be decrypted file in the decryption method.
  • User A has some photos to be sent to his two friends, but because of the personal privacy of User A, he hopes that the two friends will not forward the photos to others. Then, the file encryption method and the decryption method provided by the embodiments of the present invention can easily and safely help the user A achieve the above-mentioned goals by the following operations.
  • the file encryption method and the decryption method provided in this embodiment include the following steps:
  • Figures 4-8 are schematic diagrams of user interfaces for performing encryption operations and viewing encrypted files.
  • the user can separately select an encrypted file and an authorized object corresponding to the encrypted file through the two interfaces in FIG. 4 and FIG. 5 .
  • the address book of the mobile terminal can be automatically linked when the user selects an authorized object.
  • Li Si (or Xiao Ming) mobile terminal respectively receives the encrypted second encrypted file and the second key
  • step S308 the communication mode used to receive the second key is compared with the communication mode carried in the second encrypted file, if the two are the same, step S309 is performed, if not, step 310 is performed;
  • an embodiment of the present invention further provides a file encryption device 4.
  • the device includes:
  • the instruction receiving unit 40 is configured to receive a directional encryption instruction of the user, where the directional encryption instruction carries a decryption party name of the file to be encrypted and a decryption party communication mode;
  • the first encryption unit 42 is configured to encrypt the file to be encrypted using a first key to form a first encrypted file
  • the second encryption unit 44 is configured to encrypt the first encrypted file, the first key, and the decryption party communication manner together using a second key to form a second encrypted file;
  • the sending unit 46 is configured to send the second key information to the decrypting party according to the decrypting party communication manner.
  • the instruction receiving unit 40, the first encryption unit 42 and the transmitting unit 46 may be implemented by a central processing unit (CPU), a digital signal processor (DSP) in the file encryption device 4. Or a Field-Programmable Gate Array (FPGA) implementation.
  • CPU central processing unit
  • DSP digital signal processor
  • FPGA Field-Programmable Gate Array
  • the first encryption unit 42 and the second encryption unit 44 only need to perform two-layer encryption on the encrypted file according to the directional encryption instruction of the encryption party received by the instruction receiving unit 40, which is easy to operate.
  • the second encrypted file formed by the second layer encryption operation includes a corresponding decryption party communication manner, so that different decryption parties can receive different second encrypted files; and the second key is The corresponding communication method is sent to different decryption parties, so that the decryption party can decrypt the file according to the correspondence between the communication method used when receiving the second key and the decryption party communication method carried in the second encrypted file, and decrypt the file.
  • the decryption party communication method includes at least one of a decryption party's telephone number, a mailbox, and an instant communication tool.
  • the second encryption unit 44 may be specifically configured to: encrypt the first key to form a third encrypted file by using the decryption party communication mode as a third key; and use the second secret The key encrypts the first encrypted file and the third encrypted file together to form a The second encrypted file is described.
  • the sending unit 46 may be further configured to send, according to the decrypting party communication manner, the second key information and the text information of the decrypting party communication manner to the decrypting party.
  • an embodiment of the present invention further provides a file decryption apparatus 6, including:
  • the key receiving unit 60 receives the fourth key sent by the encrypting party by using a preset communication manner
  • the first decrypting unit 62 is configured to use the fourth key to decrypt the decrypted file to obtain a first decrypted file;
  • the first decrypted file includes a core to be decrypted file, a fifth key, and the decrypting party communication the way;
  • the second decryption unit 64 is configured to decrypt the core to-be-decrypted file by using the fifth key if the decryption side communication mode is the same as the preset communication mode.
  • the key receiving unit 60, the first decrypting unit 62, and the second decrypting unit 64 may be implemented by a CPU, DSP, or FPGA in the file decrypting device 6.
  • the file decryption method provided by the embodiment of the present invention receives the fourth key by using a preset communication manner, and uses the fourth key to perform initial decryption on the decrypted file to obtain a first decrypted file, where the first decrypted file includes a decryption party communication.
  • the decryption mode is the same as the preset communication mode of receiving the fourth key, the core to be decrypted file is decrypted by using the fifth key, and the entire decryption process does not require any active operation by the user, and the user may not be aware.
  • the user experience is greatly improved; and if the decrypting party communicates with the preset communication method of receiving the fourth key, the user cannot decrypt the core file to be decrypted, so that only The specified decryption party can successfully decrypt the file, which effectively enhances the privacy protection during the file transfer process of the mobile terminal.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may employ hardware embodiments, software embodiments, or junctions. In the form of an embodiment of the software and hardware aspects. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本发明提供文件加密方法、解密方法及装置,所述文件加密方法包括:加密方接收用户的定向加密指令,所述定向加密指令中携带有待加密文件的解密方通信方式;所述加密方使用第一密钥对所述待加密文件进行加密,形成第一加密文件;所述加密方使用第二密钥将所述第一加密文件、所述第一密钥以及所述解密方通信方式一同加密,形成第二加密文件,并根据所述解密方通信方式向所述解密方发送所述第二密钥信息。

Description

一种文件加密方法、解密方法及装置 技术领域
本发明涉及通信技术领域,特别是涉及一种文件加密方法、解密方法及装置。
背景技术
在移动互联时代,人们通过各种移动终端进行广泛的沟通和信息分享,但在沟通变得异常便利的同时,网络安全隐患和个人隐私的保护也引起人们越来越多的关注。
加密技术是文件在用户之间传输时的一种常用的安全防护措施。但传统的加密技术中,一个文件往往会随着其解密密钥被一再转发,一些比较私密的内容无法得到有效的保护。而且,文件的加密还需要用户进行繁琐的操作才能完成,用户体验差。
针对移动终端文件传输过程中隐私保护差,用户体验差的问题,现有技术中尚没有很好的解决办法。
发明内容
为解决现有存在的技术问题,本发明实施例提供一种文件加密方法、解密方法及装置。
一方面,本发明实施例提供一种文件加密方法,包括:加密方接收用户的定向加密指令,所述定向加密指令中携带有待加密文件的解密方通信方式;所述加密方使用第一密钥对所述待加密文件进行加密,形成第一加密文件;所述加密方使用第二密钥将所述第一加密文件、所述第一密钥以及所述解密方通信方式一起加密,以形成第二加密文件,并根据所述解密 方通信方式向所述解密方发送所述第二密钥信息。
在一个实施例中,所述解密方通信方式包括解密方的电话号码、邮箱、即时通信工具中的至少一种。
在一个实施例中,所述加密方使用第二密钥将所述第一加密文件、所述第一密钥以及所述解密方通信方式一起加密具体包括:所述加密方使用所述解密方通信方式作为第三密钥,对所述第一密钥进行加密,以形成第三加密文件;所述加密方使用所述第二密钥对所述第一加密文件和所述第三加密文件一起加密。
在一个实施例中,所述加密方根据所述解密方通信方式向所述解密方发送所述第二密钥具体包括:所述加密方根据所述解密方通信方式,向所述解密方发送所述第二密钥和所述解密方通信方式。
另一方面,本发明实施例还提供一种文件解密方法,包括:解密方通过预设通信方式接收加密方发送的第四密钥;所述解密方使用所述第四密钥对待解密文件解密,得到第一解密文件;所述第一解密文件包括核心待解密文件、第五密钥以及解密方通信方式;在所述解密方通信方式与所述预设通信方式相同的情况下,使用所述第五密钥解密所述核心待解密文件。
另一方面,本发明实施例还提供一种文件加密装置,包括:指令接收单元,配置为接收用户的定向加密指令,所述定向加密指令中携带有待加密文件的解密方通信方式;第一加密单元,配置为使用第一密钥对所述待加密文件进行加密,形成第一加密文件;第二加密单元,配置为使用第二密钥将所述第一加密文件、所述第一密钥以及所述解密方通信方式一起加密,以形成第二加密文件;发送单元,配置为根据所述解密方通信方式向所述解密方发送所述第二密钥。
在一个实施例中,所述解密方通信方式包括解密方的电话号码、邮箱、即时通信工具中的至少一种。
在一个实施例中,所述第二加密单元具体配置为:使用所述解密方通信方式作为第三密钥,对所述第一密钥进行加密,以形成第三加密文件;使用所述第二密钥对所述第一加密文件和所述第三加密文件一起加密,以形成所述第二加密文件。
在一个实施例中,所述发送单元,具体配置为根据所述解密方通信方式,向所述解密方发送所述第二密钥和所述解密方通信方式。
另一方面,本发明实施例还提供一种文件解密装置,包括:密钥接收单元,配置为通过预设通信方式接收加密方发送的第四密钥;第一解密单元,配置为使用所述第四密钥对待解密文件解密,以得到第一解密文件;所述第一解密文件中包括核心待解密文件、第五密钥以及解密方通信方式;第二解密单元,配置为在所述解密方通信方式与所述预设通信方式相同的情况下,使用所述第五密钥解密所述核心待解密文件。
本发明实施例提供的文件加密方法、解密方法及装置,只需根据加密方的定向加密指令即可对待加密文件进行两层加密,操作简便安全性高。其中第二层加密操作形成的第二加密文件中包含对应的解密方通信方式,这样,就能使不同的解密方接收到不同的第二加密文件;而且,通过将第二密钥以对应的通信方式发送给不同的解密方,就能够使解密方根据接收第二密钥时所使用的通信方式与第二加密文件中携带的解密方通信方式的对应关系对文件进行解密,而解密方以外的其他用户由于不具备这种通信方式的对应关系,也就无法解密文件,从而实现了指定用户对指定文件的解密,有效加强了移动终端文件传输过程中隐私保护,大大提高了用户体验。
附图说明
图1是本发明实施例提供的文件加密方法的一种流程图;
图2是本发明实施例提供的文件解密方法的一种流程图;
图3是本发明实施例提供的文件加密方法和解密方法的一种详细流程图;
图4是本发明实施例提供的文件加密方法中选择加密文件的一种用户界面示意图;
图5是本发明实施例提供的文件加密方法中选择授权对象的一种用户界面示意图;
图6是本发明实施例提供的文件加密方法和解密方法中查看文件列表的一种用户界面示意图;
图7是本发明实施例提供的文件加密方法和解密方法中查看文件内容的一种用户界面示意图;
图8是本发明实施例提供的文件解密方法中查看文件内容的一种用户界面示意图;
图9是本发明实施例提供的文件加密装置的一种结构示意图;
图10是本发明实施例提供的文件解密装置的一种结构示意图。
具体实施方式
以下结合附图对本发明进行详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不限定本发明。
如图1所示,本发明的实施例提供一种文件加密方法,包括:
S11,加密方接收用户的定向加密指令,所述定向加密指令中携带有待加密文件的解密方通信方式;
S12,所述加密方使用第一密钥对所述待加密文件加密以形成第一加密文件;
S13,所述加密方使用第二密钥将所述第一加密文件、所述第一密钥以及所述解密方通信方式一起加密,形成第二加密文件,并根据所述解密方通信方式向所述解密方发送所述第二密钥信息。
本发明实施例提供的文件加密方法,只需根据加密方的定向加密指令即可对待加密文件进行两层加密,操作简便安全性高。其中第二层加密操作形成的第二加密文件中包含对应的解密方通信方式,这样就能使不同的解密方接收到不同的第二加密文件;而且,通过将第二密钥以对应的通信方式发送给不同的解密方,就能够使解密方根据接收第二密钥时所使用的通信方式与第二加密文件中携带的解密方通信方式的对应关系对文件进行解密,而解密方以外的其他用户由于不具备这种通信方式的对应关系,也就无法解密文件,从而实现了指定用户对指定文件的解密,有效加强了移动终端文件传输过程中隐私保护,大大提高了用户体验。
在本发明一个实施例中,在步骤S11中,所述解密方通信方式可以包括解密方的电话号码、邮箱、即时通信工具等通信方式中的一种或几种。这些通信方式可以以通信录的形式存储在手机等移动终端中。由于不同的解密方具有不同的通信方式,在加密文件中加入解密方通信方式的信息就可以将不同的解密方进行区分,从而使得只有对应的解密方才能够将文件成功解密,大大加强了文件的隐私保护。
具体而言,在步骤S12中,加密方使用第二密钥将所述第一加密文件、所述第一密钥以及所述解密方通信方式一起加密,以形成第二加密文件的具体形式不限,只要在形成的第二加密文件中包括以上三种信息即可。例如,第一密钥和解密方通信方式既可以以明文的形式与第一加密文件一起被第二密钥加密,也可以先使用解密方通信方式作为第三密钥,对第一密钥进行加密,以形成第三加密文件;再使用第二密钥对第一加密文件和第三加密文件一起加密。这样,由于用解密方通信方式对第一密钥进行又一次加密,进一步加强了文件的隐私保护力度。
举例说明,在本发明的一个实施例中,解密方通信方式为解密方的电话号码,则在待加密文件被第一密钥加密形成第一加密文件后,接着将第 一密钥、解密方电话号码与第一加密文件放在一起,由第二密钥对这三种信息一起加密,形成第二加密文件,并且将第二密钥以短信的形式发送给该电话号码对应的移动终端,也就是解密方,从而使解密方获知第二密钥。
在本发明的另一个实施例中,解密方通信方式还可以为电子邮箱,在待加密文件被第一密钥加密形成第一加密文件后,接着将第一密钥、第一加密文件以及解密方电子邮箱地址放在一起,由第二密钥对这三种信息一起加密,并且将第二密钥以邮件的形式发送给该电子邮箱地址,也就是解密方,从而使解密方获知第二密钥。
当然,在本发明的其他实施例中,所述解密方通信方式还可以包括其他,只需将对应的通信方式包括在第二加密文件中,并将第二密钥通过该通信方式发送给解密方即可,本发明的实施例对此不做限制。
在上述实施例中,虽然通过对应的解密方通信方式发送第二密钥,能够使解密方获知自己的通信方式,并利用该通信方式和第二密钥对文件进行解密,但本发明不限于此,解密方还可以通过其他方式获知自己的通信方式。例如,为了使解密方能够更迅速的获知自己的通信方式,在一个实施例中,在步骤S13中,加密方根据所述解密方通信方式向所述解密方发送所述第二密钥具体可包括:加密方根据所述解密方通信方式,向所述解密方发送所述第二密钥和所述解密方通信方式。这样,解密方无需通过进一步查询即可直接获知解密方通信方式,从而对文件进行解密。
需要说明的是,上述实施例中,加密方和解密方可分别设置于不同的移动终端上,加密方也就是文件的提供方,解密方也就是文件的接收方。文件加密后,可以通过现有的各种文件传输方法将加密好的文件(即第二加密文件)传输给解密方。第二加密文件的传输与第二密钥的传输是分别进行的,其传输方式可以相同,如可以先后都通过邮件传输,也可以不同,如第二加密文件用微信传输,第二密钥用手机短信传输,本发明的实施例 对此不做限定。
相应的,如图2所示,本发明的实施例还提供一种文件解密方法,包括:
S21,解密方通过预设通信方式接收加密方发送的第四密钥;
S22,所述解密方使用所述第四密钥对待解密文件解密,以得到第一解密文件;所述第一解密文件中包括核心待解密文件、第五密钥以及解密方通信方式;
S23,在所述解密方通信方式与所述预设通信方式相同的情况下,使用所述第五密钥解密所述核心待解密文件。
本发明实施例提供的文件解密方法,通过预设通信方式接收第四密钥,并利用该第四密钥对待解密文件进行初次解密得到第一解密文件,第一解密文件中包含有解密方通信方式,如果该解密方通信方式与接收第四密钥使用的预设通信方式相同,则利用第五密钥对核心待解密文件进行解密,整个解密过程无需用户进行任何主动操作,用户可以在没有感知的情况下直接对文件进行解密阅读,大大提高了用户体验;而如果该解密方通信方式与接收第四密钥的预设通信方式不同,该用户就无法对核心待解密文件进行解密,这样只有指定的解密方才能对文件成功解密,有效加强了移动终端文件传输过程中隐私保护。
在一个实施例中,在步骤S21中,解密方通过预设通信方式接收加密方发送的第四密钥,其中预设通信方式可以包括解密方的电话号码、邮箱、即时通信工具等通信方式中的一种或几种。解密方在通过预设通信方式接收第四密钥的同时,也获知了该预设通信方式信息,如获知自己的手机号,邮箱地址,微信账号等等。使用第四密钥对待解密文件进行初次解密后,即可获知携带在待解密文件中的解密方通信方式,接着将预设通信方式与解密方通信方式相比较,当二者相同时,则可以利用第五密钥对核心待解 密文件进行解密;当二者不同时,说明该用户并不是加密方指定的文件阅读者,则终止解密操作,从而保护了核心待解密文件,也保护了用户的隐私。
从上述实施例可以看出,解密方能够获知其预设通信方式是实现对核心待解密文件进行解密的关键。虽然解密方可以通过接收第四密钥来获知自己的通信方式,但本发明不限于此。在本发明的其他实施例中,解密方还可以通过其他方式来获知该预设通信方式,例如,解密方可以借助电信运营商的支持获知自己的电话号码,或者借助一些网络会话或注册信息验证等获知自己的即时通信账号等等。
需要说明的是,上述实施例中,涉及了文件加密方法和文件解密方法,为了对每种方法加以区分,上述实施例中分别使用了第一密钥、第二密钥、第四密钥以及第五密钥来描述。但其实这两种方法是互逆过程,其中,加密方法的第一密钥也就对应着解密方法的第五密钥,加密方法的第二密钥也就对应着解密方法的第四密钥。同样道理,加密方法中的第二加密文件对应着解密方法中的待解密文件,加密方法中的第一加密文件对应着解密方法中的核心待解密文件。
下面通过具体实施例,对本发明实施例提供的文件加密方法、解密方法进行详细说明。
在本发明的一个实施例中,用户A有一些照片要发送给自己的两个朋友看,但由于涉及用户A的个人隐私,他希望这两个朋友不要再把照片转发给别人看。那么,本发明实施例提供的文件加密方法和解密方法就可以通过以下操作轻易而又安全地帮用户A实现自己的上述目标。
如图3所示,本实施例提供的文件加密方法和解密方法包括如下步骤:
S301、接收用户A的定向加密指令,所述定向加密指令中携带有待加密文件的解密方通信方式;
图4-图8为进行加密操作和查看加密文件的用户界面示意图。结合图4至图8,本步骤中,用户可以通过图4和图5中的两个界面分别选择加密文件以及该加密文件对应的授权对象。在一个实施例中,在用户选择授权对象时,可以自动链接到移动终端的通讯录。
S302、根据用户A的定向加密指令,使用第一密钥对所选择的照片进行加密,形成第一加密文件;
S303、将第一密钥、第一加密文件、以及选择的授权对象(李四和小明)的通信方式一起,分别进行第二次加密形成两个第二加密文件,加密密钥为第二密钥;
S304、将第二密钥信息通过通讯录中保存的通信方式分别发送给对应的解密方(李四和小明);
S305、将加密好的两个第二加密文件分别发送给李四的移动终端和小明的移动终端;
S306、李四(或小明)的移动终端分别接收加密好的第二加密文件和第二密钥;
S307、使用第二密钥对第二加密文件进行解密,获得了第一加密文件,第一密钥以及李四自己的通信方式;
S308、将接收第二密钥使用的通信方式与在第二加密文件中携带的通信方式相比较,如果二者相同,执行步骤S309,如果不同,执行步骤310;
S309、使用第一密钥对第一加密文件(照片)进行解密;
S310、终止解密操作,提示用户没有阅读权限。
与前述的文件加密方法相对应,本发明的实施例还提供一种文件加密装置4,如图9所示,该装置包括:
指令接收单元40,配置为接收用户的定向加密指令,所述定向加密指令中携带有待加密文件的解密方姓名和解密方通信方式;
第一加密单元42,配置为使用第一密钥对所述待加密文件加密以形成第一加密文件;
第二加密单元44,配置为使用第二密钥将所述第一加密文件、所述第一密钥以及所述解密方通信方式一起加密,以形成第二加密文件;
发送单元46,配置为根据所述解密方通信方式向所述解密方发送所述第二密钥信息。
在实际应用时,所述指令接收单元40、第一加密单元42和发送单元46可由文件加密装置4中的中央处理器(Central Processing Unit,CPU)、数字信号处理器(Digital Signal Processor,DSP)或可编程逻辑阵列(Field-Programmable Gate Array,FPGA)实现。
本发明实施例提供的文件加密装置4,第一加密单元42和第二加密单元44只需根据指令接收单元40接收的加密方的定向加密指令,即可对待加密文件进行两层加密,操作简便安全性高。其中第二层加密操作形成的第二加密文件中包含对应的解密方通信方式,这样就能使不同的解密方接收到不同的第二加密文件;而且,通过发送单元46将第二密钥以对应的通信方式发送给不同的解密方,就能够使解密方根据接收第二密钥时所使用的通信方式与第二加密文件中携带的解密方通信方式的对应关系对文件进行解密,而解密方以外的其他用户由于不具备这种通信方式的对应关系,也就无法解密文件,从而实现了指定用户对指定文件的解密,有效加强了移动终端文件传输过程中隐私保护,大大提高了用户体验。
在一个实施例中,所述解密方通信方式包括解密方的电话号码、邮箱、即时通信工具中的至少一种。
具体而言,第二加密单元44可具体配置为:使用所述解密方通信方式作为第三密钥,对所述第一密钥进行加密,以形成第三加密文件;使用所述第二密钥对所述第一加密文件和所述第三加密文件一起加密,以形成所 述第二加密文件。
在一个实施例中,发送单元46,还可具体配置为根据所述解密方通信方式,向所述解密方发送所述第二密钥信息和所述解密方通信方式的文本信息。
相应的,如图10所示,本发明的实施例还提供一种文件解密装置6,包括:
密钥接收单元60,通过预设通信方式接收加密方发送的第四密钥;
第一解密单元62,配置为使用所述第四密钥对待解密文件解密,以得到第一解密文件;所述第一解密文件中包括核心待解密文件、第五密钥以及所述解密方通信方式;
第二解密单元64,配置为在所述解密方通信方式与预设通信方式相同的情况下,使用所述第五密钥解密所述核心待解密文件。
在实际应用时,所述密钥接收单元60、第一解密单元62和第二解密单元64可由文件解密装置6中的CPU、DSP或FPGA实现。
本发明实施例提供的文件解密方法,通过预设通信方式接收第四密钥,并利用该第四密钥对待解密文件进行初次解密得到第一解密文件,第一解密文件中包含有解密方通信方式,如果该解密方通信方式与接收第四密钥的预设通信方式相同,则利用第五密钥对核心待解密文件进行解密,整个解密过程无需用户进行任何主动操作,用户可以在没有感知的情况下直接对文件进行解密阅读,大大提高了用户体验;而如果该解密方通信方式与接收第四密钥的预设通信方式不同,该用户就无法对核心待解密文件进行解密,这样只有指定的解密方才能对文件成功解密,有效加强了移动终端文件传输过程中隐私保护。
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用硬件实施例、软件实施例、或结 合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
以上所述,仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围。

Claims (10)

  1. 一种文件加密方法,该方法包括:
    加密方接收用户的定向加密指令,所述定向加密指令中携带有待加密文件的解密方通信方式;
    所述加密方使用第一密钥对所述待加密文件进行加密,形成第一加密文件;
    所述加密方使用第二密钥将所述第一加密文件、所述第一密钥以及所述解密方通信方式一同加密,形成第二加密文件,并根据所述解密方通信方式向所述解密方发送所述第二密钥信息。
  2. 根据权利要求1所述的方法,其中,所述解密方通信方式,包括:解密方的电话号码、邮箱、即时通信工具中的至少一种。
  3. 根据权利要求1所述的方法,其中,所述加密方使用第二密钥将所述第一加密文件、所述第一密钥以及所述解密方通信方式一同加密,包括:
    所述加密方使用所述解密方通信方式作为第三密钥,对所述第一密钥进行加密,形成第三加密文件;
    所述加密方使用所述第二密钥对所述第一加密文件和所述第三加密文件一同加密。
  4. 根据权利要求1所述的方法,其中,所述加密方根据所述解密方通信方式向所述解密方发送所述第二密钥,包括:
    所述加密方根据所述解密方通信方式,向所述解密方发送所述第二密钥和所述解密方通信方式。
  5. 一种文件解密方法,该方法包括:
    解密方通过预设通信方式接收加密方发送的第四密钥;
    所述解密方使用所述第四密钥对待解密文件解密,得到第一解密文件;所述第一解密文件包括:核心待解密文件、第五密钥以及解密方通信方式;
    在所述解密方通信方式与所述预设通信方式相同的情况下,使用所述第五密钥解密所述核心待解密文件。
  6. 一种文件加密装置,该装置包括:
    指令接收单元,配置为接收用户的定向加密指令,所述定向加密指令中携带有待加密文件的解密方通信方式;
    第一加密单元,配置为使用第一密钥对所述待加密文件进行加密,形成第一加密文件;
    第二加密单元,配置为使用第二密钥将所述第一加密文件、所述第一密钥以及所述解密方通信方式一同加密,形成第二加密文件;
    发送单元,配置为根据所述解密方通信方式向所述解密方发送所述第二密钥。
  7. 根据权利要求6所述的装置,其中,所述解密方通信方式,包括:解密方的电话号码、邮箱、即时通信工具中的至少一种。
  8. 根据权利要求6所述的装置,其中,所述第二加密单元,配置为使用所述解密方通信方式作为第三密钥,对所述第一密钥进行加密,形成第三加密文件;
    使用所述第二密钥对所述第一加密文件和所述第三加密文件一同加密,形成所述第二加密文件。
  9. 根据权利要求6所述的装置,其中,所述发送单元,配置为根据所述解密方通信方式,向所述解密方发送所述第二密钥和所述解密方通信方式。
  10. 一种文件解密装置,该装置包括:
    密钥接收单元,配置为通过预设通信方式接收加密方发送的第四密钥;
    第一解密单元,配置为使用所述第四密钥对待解密文件解密,得到第一解密文件;所述第一解密文件包括:核心待解密文件、第五密钥以及解 密方通信方式;
    第二解密单元,配置为在所述解密方通信方式与所述预设通信方式相同的情况下,使用所述第五密钥解密所述核心待解密文件。
PCT/CN2014/090634 2014-07-22 2014-11-07 一种文件加密方法、解密方法及装置 WO2015117437A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410349854.0 2014-07-22
CN201410349854.0A CN105281897A (zh) 2014-07-22 2014-07-22 一种文件加密方法、解密方法及装置

Publications (1)

Publication Number Publication Date
WO2015117437A1 true WO2015117437A1 (zh) 2015-08-13

Family

ID=53777247

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/090634 WO2015117437A1 (zh) 2014-07-22 2014-11-07 一种文件加密方法、解密方法及装置

Country Status (2)

Country Link
CN (1) CN105281897A (zh)
WO (1) WO2015117437A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112637230A (zh) * 2020-12-29 2021-04-09 北京天融信网络安全技术有限公司 一种即时通信方法及系统

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411888B (zh) * 2016-09-29 2020-01-03 恒大智慧科技有限公司 签核文档加密装置与方法
CN106549858B (zh) * 2016-12-08 2019-12-10 深圳奥联信息安全技术有限公司 一种基于标识密码的即时通信加密方法
CN108664798B (zh) 2017-03-31 2021-06-29 北京京东尚科信息技术有限公司 信息加密方法和装置
CN111193659B (zh) * 2019-12-30 2022-07-26 广东盈世计算机科技有限公司 一种基于即时聊天工具的文件处理方法及装置
CN114124880B (zh) * 2021-11-29 2023-07-18 北京天融信网络安全技术有限公司 基于公有云的保密通信方法、装置及计算机设备及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1326157A2 (en) * 2001-12-12 2003-07-09 Pervasive Security Systems Inc. Method and apparatus for securing digital assets
CN101123503A (zh) * 2007-06-12 2008-02-13 深圳市融合视讯科技有限公司 一种电子文件在通讯网络中传播时的加解密方法
CN102142072A (zh) * 2010-11-15 2011-08-03 华为软件技术有限公司 电子文件的加密处理、解密处理方法及装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1326157A2 (en) * 2001-12-12 2003-07-09 Pervasive Security Systems Inc. Method and apparatus for securing digital assets
CN101123503A (zh) * 2007-06-12 2008-02-13 深圳市融合视讯科技有限公司 一种电子文件在通讯网络中传播时的加解密方法
CN102142072A (zh) * 2010-11-15 2011-08-03 华为软件技术有限公司 电子文件的加密处理、解密处理方法及装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112637230A (zh) * 2020-12-29 2021-04-09 北京天融信网络安全技术有限公司 一种即时通信方法及系统

Also Published As

Publication number Publication date
CN105281897A (zh) 2016-01-27

Similar Documents

Publication Publication Date Title
CN105553951B (zh) 数据传输方法和装置
US9602277B2 (en) User interface systems and methods for secure message oriented communications
WO2015117437A1 (zh) 一种文件加密方法、解密方法及装置
JP6138958B2 (ja) 指紋認証による図面管理システム及び図面管理方法
CN104144049A (zh) 一种加密通信方法、系统和装置
JP2009532970A5 (zh)
JP6404481B2 (ja) クラウドコンピューティングにおける異種混合データ記憶管理方法および装置
CN105812349B (zh) 一种基于身份信息的非对称密钥分发及消息加密方法
WO2020155812A1 (zh) 一种数据存储方法、装置及设备
SE1451213A1 (en) Improved system for establishing a secure communication channel
CN112291268A (zh) 信息的传输方法、装置、设备以及存储介质
KR101541165B1 (ko) 모바일 메시지 암호화 방법, 이 방법을 수행하는 프로그램을 기록한 컴퓨터 판독가능 기록매체 및 이 방법을 저장한 다운로드 서버
WO2018014785A1 (zh) 一种子账号信息处理系统、方法及装置
JP2009515393A (ja) デジタル・データの安全な寄託方法、関連するデジタル・データの復元方法、これらの方法を実施する関連装置、ならびに前記装置を備えるシステム
CN103916834A (zh) 一种用户独享密钥的短信加密方法和系统
WO2012139427A1 (zh) 媒体消息处理方法、系统及装置
CN108933758A (zh) 可分享云存储加解密方法、装置和系统
KR20070062632A (ko) 암호화를 통한 이동통신 메시지 및 파일 보안 제공 방법
WO2012075761A1 (zh) 一种加密mms的方法及系统
CN104243291A (zh) 一种可保障用户通讯内容安全的即时通讯方法及其系统
TWI577145B (zh) 近場通訊設備資料之加密傳輸方法及其系統
US20150089217A1 (en) Method and System for Data Protection
KR20170103323A (ko) 준동형 암호화 기법을 이용한 경매 서비스 제공 장치 및 방법
TWI524291B (zh) Message encryption method applied to communication software
JP6953680B2 (ja) 鍵管理装置、通信システム、端末装置、鍵管理方法、通信方法、処理方法、プログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14881434

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14881434

Country of ref document: EP

Kind code of ref document: A1