WO2016045504A1 - Method and system for transmitting information safely, receiving terminal and transmission terminal - Google Patents

Method and system for transmitting information safely, receiving terminal and transmission terminal Download PDF

Info

Publication number
WO2016045504A1
WO2016045504A1 PCT/CN2015/089173 CN2015089173W WO2016045504A1 WO 2016045504 A1 WO2016045504 A1 WO 2016045504A1 CN 2015089173 W CN2015089173 W CN 2015089173W WO 2016045504 A1 WO2016045504 A1 WO 2016045504A1
Authority
WO
WIPO (PCT)
Prior art keywords
module
application
control
user
information
Prior art date
Application number
PCT/CN2015/089173
Other languages
French (fr)
Chinese (zh)
Inventor
陈璐
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016045504A1 publication Critical patent/WO2016045504A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols

Definitions

  • This document relates to, but is not limited to, the field of communications, and specifically relates to an information security transmission method and system, a receiving terminal, and a transmitting terminal.
  • the user On the terminal, the user often needs to transmit text information, such as through short messages or applications such as QQ and WeChat, which are all personal privacy of the user, and the user is unwilling to let others know. It used to be thought that the transmission channel for this information was secure, and some applications claimed that the way they transmitted information was secure. They often claimed that the information was encrypted from the client to their servers, but Snowden revealed the United States.
  • the network as the transmission channel of information is very insecure, and the user's privacy may still be leaked on the server, for example, it may be obtained by the hacker to break the server; or, for example, may be Untrustworthy third-party companies obtain and use them directly from the server (similar to the behavior of the US government directly asking the Internet giant for user privacy). Therefore, the intermediate transmission channel for transmitting data is not trusted, becomes unsafe and cannot be satisfied. The need for users to protect privacy.
  • the embodiments of the present invention provide a method and system for transmitting information security, a receiving terminal, and a sending terminal, to solve the technical problem of how to protect information security and privacy during information transmission.
  • An embodiment of the present invention provides an information security delivery method, including:
  • control module in a system control of the sending terminal, when the control of the application of the sending terminal is triggered, the control module intercepts the triggering event, and notifies the bottom security module of the sending terminal;
  • the underlying security module After receiving the notification from the control module, the underlying security module encrypts the information related to the trigger event to generate an encrypted ciphertext, and sends the encrypted ciphertext to the control module;
  • the control module sends the encrypted ciphertext to the receiving terminal through the application.
  • the triggering event includes that the user is to add information to the control of the application; the information related to the triggering event is information that the user will add in the control of the application.
  • the method further includes: after the bottom security module receives the notification from the control module, and encrypts the information related to the trigger event to generate the encrypted ciphertext, the method further includes:
  • the enabling the security mode to trigger the startup of the underlying security module comprises:
  • the underlying security module After determining that the received security mode open password input by the sending terminal user is consistent with the preset security mode open password, the underlying security module is triggered to be activated by verification.
  • the underlying security module encrypts the information related to the trigger event to generate an encrypted ciphertext, including:
  • the bottom security module After receiving the notification of the control module, the bottom security module prompts the sending terminal user to input a communication key, and receives the communication key input by the sending terminal user, or acquires a preset local communication key. ;
  • the underlying security module encrypts information added by the user to the control of the application by using a communication key input by the user of the sending terminal or the locally stored preset communication key, and adds an encrypted identifier. Or adding the version number of the encryption algorithm and the encrypted identifier to generate an encrypted ciphertext.
  • control of the application includes an edit control.
  • the embodiment of the invention further provides an information security delivery method, including:
  • control module in a system control of the receiving terminal, when the control of the application of the receiving terminal is triggered, the control module intercepts the triggering event, and notifies the bottom security module of the receiving terminal;
  • the underlying security module After receiving the notification from the control module, the underlying security module decrypts the information related to the trigger event.
  • the method further includes: the application receiving the information sent by the sending terminal, and prompting the user to trigger the control of the application;
  • the triggering event includes receiving, by the terminal user, information sent by the sending terminal of the control output of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application.
  • the method further includes:
  • the enabling the security mode to trigger the startup of the underlying security module comprises:
  • the underlying security module After determining that the received security mode open password input by the receiving terminal user is consistent with the preset security mode open password, the underlying security module is triggered to be activated by verification.
  • the information sent by the sending terminal output by the control of the application includes: an encryption identifier and an encryption information, or an encryption identifier, a version number of the encryption algorithm, and encryption information;
  • the underlying security module After receiving the notification by the control module, the underlying security module decrypts the information related to the trigger event, including:
  • the bottom security module prompts the receiving terminal user to input the communication key and receives the input of the receiving terminal user after identifying the encrypted identifier.
  • a communication key or, after identifying the encrypted identifier, acquiring a preset communication key stored locally;
  • the bottom security module uses the communication key input by the receiving terminal user or the locally stored preset communication key, and uses a preset encryption algorithm or an encryption algorithm corresponding to the version number of the encryption algorithm.
  • the encrypted information is decrypted, and the plaintext of the decrypted information is displayed to the user.
  • control of the application includes a display control.
  • the embodiment of the invention further provides a sending terminal, comprising: an underlying security module disposed in an underlying framework of the transmitting terminal, a control module preset in a system control of the transmitting terminal, and an application, wherein:
  • the control module is configured to: when the control of the application is triggered, intercept the trigger event, and notify the underlying security module; and transmit the encrypted ciphertext returned by the underlying security module to the application;
  • the underlying security module is configured to: after receiving the notification of the control module, encrypt the information related to the trigger event to generate an encrypted ciphertext, and send the encrypted ciphertext to the control module;
  • the application is configured to send the encrypted ciphertext to the receiving terminal.
  • the triggering event includes the user adding information to the control of the application; the information related to the triggering event is information that the user will add in the control of the application.
  • it also includes:
  • the startup module is configured to prompt the sending terminal user whether to enable the security mode. After receiving the request of the sending terminal user to open the underlying security module, the security mode is started, and the bottom security module is triggered to be started.
  • the startup module is configured to enable a security mode, triggering activation of the underlying security module, including:
  • the underlying security module After determining that the received security mode open password input by the sending terminal user is consistent with the preset security mode open password, the underlying security module is triggered to be activated by verification.
  • the underlying security module is configured to: after receiving the notification of the control module, encrypt and generate information about the information in the trigger event to generate an encrypted ciphertext, including:
  • the bottom security module After receiving the notification of the control module, the bottom security module prompts the sending terminal user to input a communication key, and receives the communication key input by the sending terminal user, or acquires a preset local communication key. ;
  • the underlying security module encrypts, by using an encryption algorithm, information added by the user to the control of the application by using a communication key input by the sending terminal user or the locally stored preset communication key, and adding Encrypting the identifier or adding the version number and the encrypted identifier of the encryption algorithm to generate an encrypted ciphertext.
  • control of the application includes an edit control.
  • the embodiment of the invention further provides a receiving terminal, comprising: an underlying security module disposed in an underlying framework of the receiving terminal, a control module pre-set in a system control of the receiving terminal, and an application, wherein:
  • the control module is configured to intercept a trigger event when the control of the application is triggered, and notify the underlying security module;
  • the underlying security module is configured to decrypt the information related to the trigger event after receiving the notification of the control module;
  • the application is configured to prompt the user to trigger a control of the application after receiving the information sent by the sending terminal;
  • the triggering event includes receiving, by the terminal user, information sent by the sending terminal of the control output of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application.
  • a startup module connected to the control module and the underlying security module is further included, wherein:
  • the control module is further configured to trigger the startup module to work when the trigger event is intercepted;
  • the startup module is configured to prompt the receiving terminal user to enable the security mode. After receiving the request of the receiving terminal user to enable the security mode, the security mode is started, and the bottom security module is triggered to be started.
  • the startup module is configured to enable a security mode to trigger the underlying security module Start up, including:
  • the underlying security module After determining that the received security mode open password input by the receiving terminal user is consistent with the preset security mode open password, the underlying security module is triggered to be activated by verification.
  • the information sent by the sending terminal output by the control of the application includes: an encryption identifier and an encryption information, or an encryption identifier, a version number of the encryption algorithm, and encryption information;
  • the underlying security module is configured to decrypt the information related to the trigger event after receiving the notification from the control module, including:
  • the bottom security module prompts the receiving terminal user to input the communication key and receives the input of the receiving terminal user after identifying the encrypted identifier.
  • a communication key or, after identifying the encrypted identifier, acquiring a preset communication key stored locally;
  • the bottom security module uses the communication key input by the receiving terminal user or the locally stored preset communication key, and uses a preset encryption algorithm or an encryption algorithm corresponding to the version number of the encryption algorithm.
  • the encrypted information is decrypted, and the plaintext of the decrypted information is displayed to the user.
  • control of the application includes a display control.
  • An embodiment of the present invention further provides an information security delivery system, including: the sending terminal as described above and the receiving terminal as described above.
  • the embodiment of the invention further provides an information security delivery method, including:
  • the sending terminal After the sending terminal detects the trigger event that the control of the application is triggered, the information related to the trigger event is encrypted to generate an encrypted ciphertext, and the encrypted ciphertext is sent to the receiving terminal by using the application.
  • the triggering event includes the user adding information to the control of the application; the information related to the triggering event is information that the user will add in the control of the application.
  • the method before the encrypting the information related to the trigger event to generate an encrypted ciphertext, the method further includes:
  • the opening the security mode includes:
  • the security mode is enabled through verification.
  • the sending terminal after the sending terminal detects that the trigger of the application is triggered, the sending terminal encrypts the information related to the triggering event to generate an encrypted ciphertext, including:
  • the sending terminal After detecting that the trigger of the application is triggered, the sending terminal prompts the sending terminal user to input a communication key, and receives the communication key input by the user of the sending terminal, or obtains a preset local communication confidentiality. key;
  • the version number and encryption identifier of the algorithm generate an encrypted ciphertext.
  • control of the application includes an edit control.
  • the embodiment of the invention further provides an information security delivery method, including:
  • the receiving terminal After receiving the trigger event that the control of the application is triggered, the receiving terminal decrypts the information related to the trigger event.
  • the method further includes: the application receiving the information sent by the sending terminal, and prompting the user to trigger the control of the application;
  • the triggering event includes receiving, by the terminal user, information sent by the sending terminal of the control output of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application.
  • the method further includes:
  • the opening the security mode includes:
  • the security mode is enabled through verification.
  • the information sent by the sending terminal output by the control of the application includes: an encryption identifier and an encryption information, or an encryption identifier, a version number of the encryption algorithm, and encryption information;
  • the receiving terminal After the receiving terminal detects the trigger event triggered by the control of the application, the receiving terminal decrypts the information related to the trigger event, including:
  • the receiving terminal When the receiving terminal detects the information sent by the sending terminal output by the control of the application, the receiving terminal recognizes the encrypted identifier, prompts the receiving terminal user to input the communication key, and receives the receiving terminal user input. a communication key, or, after identifying the encrypted identifier, acquiring a preset communication key stored locally;
  • Decrypting the encrypted information by using a preset encryption algorithm or an encryption algorithm corresponding to a version number of the encryption algorithm by using a communication key input by the user of the receiving terminal or the locally stored preset communication key The user displays the plaintext of the decrypted information.
  • control of the application includes a display control.
  • the embodiment of the invention further provides a sending terminal, including:
  • a detection module configured to detect a trigger event triggered by an application's control
  • the encryption module is configured to: after detecting a trigger event triggered by the control of the application, encrypting information related to the trigger event to generate an encrypted ciphertext;
  • the application is configured to send the encrypted ciphertext to the receiving terminal.
  • the triggering event includes the user adding information to the control of the application; the information related to the triggering event is information that the user will add in the control of the application.
  • it also includes:
  • the startup module is configured to prompt the sending terminal user whether to enable the security mode. After receiving the request of the sending terminal user to enable the security mode, the security mode is enabled, and the encryption module is triggered to start.
  • the startup module is configured to enable the security mode, triggering the encryption module to be started, including:
  • the security mode is triggered by the verification, and the encryption module is triggered to start.
  • the encryption module is configured to: after detecting a trigger event triggered by the control of the application, encrypting the information related to the trigger event to generate an encrypted ciphertext, including:
  • the encryption module After the detecting module detects a trigger event triggered by the application control, the encryption module prompts the sending terminal user to input a communication key, and receives a communication key input by the sending terminal user, or acquires a locally stored pre- Communication key
  • control of the application includes an edit control.
  • the embodiment of the invention further provides a receiving terminal, comprising: a detecting module, a decrypting module and an application, wherein:
  • the detecting module is configured to detect a trigger event triggered by an application control
  • the decryption module is configured to decrypt the information related to the trigger event after detecting a trigger event triggered by the application's control.
  • the application is configured to prompt the user to trigger a control of the application after receiving the information sent by the sending terminal;
  • the triggering event includes receiving, by the terminal user, information sent by the sending terminal that is output by the control of the application; the information related to the triggering event is a control output of the application.
  • the information sent by the sending terminal includes receiving, by the terminal user, information sent by the sending terminal that is output by the control of the application; the information related to the triggering event is a control output of the application. The information sent by the sending terminal.
  • the method further includes a startup module connected to the detection module and the decryption module, wherein:
  • the detecting module is further configured to trigger the startup module to work when the triggering event is detected;
  • the startup module is configured to prompt the receiving terminal user to enable the security mode. After receiving the request of the receiving terminal user to enable the security mode, the security mode is started, and the decryption module is triggered to be started.
  • the startup module is configured to enable the security mode, triggering the decryption module to start, including:
  • the decryption module After determining that the received security mode open password input by the receiving terminal user is consistent with the preset security mode open password, the decryption module is triggered to be activated by verification.
  • the information sent by the sending terminal output by the control of the application includes: an encryption identifier and an encryption information, or an encryption identifier, a version number of the encryption algorithm, and encryption information;
  • the decryption module is configured to decrypt the information related to the trigger event after detecting a trigger event that the control of the application is triggered, including:
  • the decryption module After the detecting module detects the trigger event triggered by the application control, after the decryption module identifies the encrypted identifier, the decryption module prompts the receiving terminal user to input the communication key, and receives the communication key input by the receiving terminal user, or After identifying the encrypted identifier, acquiring a preset preset communication key;
  • Decrypting the encrypted information by using a preset encryption algorithm or an encryption algorithm corresponding to a version number of the encryption algorithm by using a communication key input by the user of the receiving terminal or the locally stored preset communication key The user displays the plaintext of the decrypted information.
  • control of the application includes a display control.
  • An embodiment of the present invention further provides an information security delivery system, including: the sending terminal as described above and the receiving terminal as described above.
  • the embodiment of the invention further provides a computer storage medium, wherein the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the above method.
  • the information security transmission method and system, the receiving terminal, and the sending terminal provided by the embodiments of the present invention intercept the application trigger event by the underlying security module, and encrypt or decrypt the transmitted information, and the application only serves as the encrypted
  • the transmission channel of the information is ciphertext for the application, thereby preventing the application of the leaked information, high security and reliability, and meeting the user's privacy protection requirements.
  • FIG. 1 is a structural diagram of a transmitting terminal and a receiving terminal in Embodiment 1;
  • Embodiment 2 is a flowchart of an information security delivery method in Embodiment 1;
  • FIG. 3 is a schematic diagram of a "hard” switch and a “soft” switch in the first embodiment
  • Embodiment 4 is a flowchart of an information security delivery method in Embodiment 1;
  • FIG. 5 is a structural diagram of a transmitting terminal in Embodiment 2.
  • FIG. 6 is a structural diagram of a receiving terminal in Embodiment 2.
  • Embodiment 8 is a flowchart of a method for information security transmission in Embodiment 2;
  • FIG. 10 is a schematic diagram of a schematic diagram of an underlying security module control application in an application example
  • FIG. 11 is a diagram showing an example of an operation of turning on a security mode ("secret" mode) in an application example
  • 12 is an operation example diagram of an operation example in which an underlying security module converts user input into ciphertext and returns to EditView;
  • FIG. 13 is a schematic diagram of the application example in which the underlying security module decrypts the ciphertext using the key input by the user and returns it to the TextView for display.
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • the embodiment provides an information security delivery system, including a transmitting terminal and a receiving terminal.
  • the sending terminal includes: an underlying security module disposed in a bottom layer framework of the terminal, and a system preset in the terminal.
  • the control module and the application in the control, the application may be a short message of the mobile phone itself, or an email, or a third-party application downloaded by the user, such as WeChat, QQ, where:
  • the control module is configured to: when the control of the application is triggered, intercept the trigger event, and notify the underlying security module; and transmit the encrypted ciphertext returned by the underlying security module to the application;
  • the triggering event includes the user adding information to the control of the application; the information related to the triggering event is information that the user will add in the control of the application.
  • the underlying security module is configured to: after receiving the notification of the control module, encrypt the information related to the trigger event to generate an encrypted ciphertext, and send the encrypted ciphertext to the control module;
  • the sending terminal further includes:
  • the startup module is configured to prompt the terminal user whether to enable the security mode. After receiving the request to open the underlying security module, the security mode is started, and the bottom security module is triggered to be started.
  • the startup module is configured to enable a security mode, and trigger the startup of the bottom security module, including:
  • the bottom security module After determining that the received security mode open password of the terminal user is consistent with the preset security mode open password, the bottom security module is triggered to be activated by verification.
  • a security mode open password is preset on the terminal, and is used to enable security. Verification in full mode.
  • the security mode cannot be used to enable the password on the terminal.
  • the startup module After receiving the request to enable the underlying security module, the startup module directly starts the security mode, and the user does not need to input a password to directly trigger the startup of the underlying security module.
  • the application is configured to send the encrypted ciphertext to the receiving terminal.
  • the underlying security module is configured to: after receiving the notification of the control module, encrypt and encrypt the related information in the trigger event to generate an encrypted ciphertext, including:
  • the bottom security module After receiving the notification of the control module, the bottom security module prompts the terminal user to input a communication key, and receives the communication key input by the terminal user, or obtains a preset local communication key;
  • the underlying security module encrypts information added by the user to the control of the application by using a communication key input by the terminal user or the locally stored preset communication key, and adds an encrypted identifier or Adding the version number of the encryption algorithm and the encrypted identifier to generate an encrypted ciphertext.
  • an optional manner is required for the user to input a communication key, and the security of the method is relatively high according to the encryption of the communication key, and another optional manner is that the user does not need to input the communication key.
  • a communication key is preset locally, and this key is used for each encryption. This method is more convenient for the user, and the user does not need to input the communication key every time.
  • control of the application includes an edit control.
  • the receiving terminal includes: an underlying security module disposed in a bottom layer framework of the terminal, a control module preset in a system control of the terminal, and an application, where:
  • the control module is configured to intercept a trigger event when the control of the application is triggered, and notify the underlying security module;
  • the underlying security module is configured to decrypt the information related to the trigger event after receiving the notification from the control module.
  • the application is configured to receive information sent by the sending terminal, and prompt the user to trigger a control of the application;
  • the triggering event includes information sent by the sending terminal output by the terminal user to read the control of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application.
  • the sending terminal further includes a startup module connected to the control module and the bottom security module, where:
  • the control module is further configured to trigger the startup module to work when the trigger event is intercepted;
  • the startup module is configured to prompt the terminal user whether to enable the security mode. After receiving the request for the terminal user to enable the security mode, the security mode is started, and the bottom security module is triggered to be started.
  • the startup module is configured to enable a security mode, and trigger the startup of the bottom security module, including:
  • the bottom security module After determining that the received security mode open password of the terminal user is consistent with the preset security mode open password, the bottom security module is triggered to be activated by verification.
  • the security mode open password is preset on the terminal, and is used for verifying when the security mode is enabled.
  • the security mode cannot be used to enable the password on the terminal.
  • the startup module After receiving the request to enable the underlying security module, the startup module directly starts the security mode, and the user does not need to input a password to directly trigger the startup of the underlying security module.
  • the information sent by the sending terminal output by the control of the application includes: an encryption information and an encryption identifier, or an encryption information, a version number of the encryption algorithm, and an encryption identifier;
  • the underlying security module is configured to decrypt the information related to the trigger event after receiving the notification of the control module, including:
  • the bottom security module When the user reads the information sent by the sending terminal of the control output of the application, the bottom security module prompts the terminal user to input the communication key and receives the communication input by the terminal user after identifying the encrypted identifier. Key, or, after identifying the encrypted identifier, acquiring a preset local communication key;
  • the underlying security module uses the communication key input by the terminal user or the locally stored preset communication key to encrypt the encryption by using a preset encryption algorithm or an encryption algorithm corresponding to the version number of the encryption algorithm.
  • the information is decrypted, and the plaintext of the decrypted information is displayed to the user.
  • an optional manner is required for the user to input a communication key, and the security of the method is relatively high according to the encryption of the communication key, and another optional manner is that the user does not need to input the communication key.
  • a communication key is preset locally, and this key is used for each encryption. This method is more convenient for the user, and the user does not need to input the communication key every time.
  • control of the application includes a display control.
  • this embodiment provides an information security delivery method, including the following steps:
  • S101 preset a control module in a system control of the terminal
  • control of the application is a custom control inherited from the system control
  • the control module when the control module is preset in the system control, the control module is also inherited by the applied control, that is, the application control also exists.
  • the control module therefore, the control module can intercept the trigger event of the application.
  • the triggering event includes that the user adds information to the control of the application; the information related to the triggering event is information that the user adds to the control of the application, and the added information may be text information.
  • the control of the application includes an EditView control, which is a custom control inherited from the system edit control.
  • the terminal may be a touch screen smart terminal or a normal button terminal, and the control for triggering the application refers to a button for the user to click or press the control.
  • the bottom security module After receiving the notification by the control module, the bottom security module encrypts the information related to the trigger event to generate an encrypted ciphertext;
  • "tight" can be set on the terminal.
  • the mode that is, the security mode mentioned above, can be turned on/off.
  • the underlying security module is opened, and the underlying security module takes over the control of the application, that is, the trigger event of the user's control of the application is no longer transmitted to The application is prioritized by the underlying security module.
  • the trigger event of the user's control of the application is normally transmitted to the third party for processing.
  • a switch is required, which we call a "closed” switch.
  • open the security mode including:
  • the terminal user is prompted to enable the security mode, and after receiving the request of the terminal user to enable the security mode, the security mode is enabled, and the bottom security module is triggered to be started.
  • the security mode is started, and the bottom security module is triggered to be started, including:
  • the bottom security module After determining that the received security mode open password of the terminal user is consistent with the preset security mode open password, the bottom security module is triggered to be activated by verification.
  • the security mode open password is preset on the terminal, and is used for verifying when the security mode is enabled.
  • the security mode cannot be used to enable the password on the terminal.
  • the startup module After receiving the request to enable the underlying security module, the startup module directly starts the security mode, and the user does not need to input a password to directly trigger the startup of the underlying security module.
  • the underlying security module encrypts the information related to the trigger event to generate an encrypted ciphertext, including:
  • the bottom security module After receiving the notification of the control module, the bottom security module prompts the terminal user to input a communication key, and receives a communication key input by the terminal user; wherein the two parties of the communication should use other methods to inform the other party of the communication secret in advance.
  • the key for example, by means of a verbal agreement, or obtaining a preset communication key stored locally;
  • the underlying security module encrypts information added by the user to the control of the application by using a communication key input by the terminal user or the locally stored preset communication key, and adds an encrypted identifier or Adding the version number of the encryption algorithm and the encrypted identifier to generate an encrypted ciphertext.
  • the underlying security module uses the encryption key to encrypt, by using an encryption algorithm, the information that the user adds in the control of the application to generate the first encrypted ciphertext, where the first encrypted ciphertext is a set of characters.
  • Adding an encryption identifier for example, a palm whisper:
  • adding a version number of the encryption algorithm before or after the first encrypted ciphertext the encryption algorithm corresponding to the version number of the receiver may be received by the receiver
  • After decrypting the encrypted ciphertext it is converted into a set of strings, and an encrypted identifier is added before or after the string to generate a final encrypted ciphertext.
  • an optional manner is required for the user to input a communication key, and the security of the method is relatively high according to the encryption of the communication key, and another optional manner is that the user does not need to input the communication key.
  • a communication key is preset locally, and this key is used for each encryption. This method is more convenient for the user, and the user does not need to input the communication key every time.
  • the control module sends the encrypted ciphertext to the receiving terminal by using the application.
  • the embodiment of the invention further provides a computer storage medium, wherein the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the above method.
  • this embodiment provides an information security delivery method, including the following steps:
  • S201 preset a control module in a system control of the terminal
  • step S101 The same as step S101, and details are not described herein again.
  • the security mode ie, the security mode
  • the security mode is started, and the bottom security module is triggered to be started, including:
  • the bottom security module After determining that the received security mode open password of the terminal user is consistent with the preset security mode open password, the bottom security module is triggered to be activated by verification.
  • the security mode open password is preset on the terminal, and is used for verifying when the security mode is enabled.
  • the security mode cannot be used to enable the password on the terminal.
  • the startup module After receiving the request to enable the underlying security module, the startup module directly starts the security mode, and the user does not need to input a password to directly trigger the startup of the underlying security module.
  • the triggering event includes: the terminal user reads information sent by the sending terminal of the control output of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application, where The information outputted is text information.
  • the control of the application includes a display (TextView) control, which is a custom control inherited from the system display control.
  • the bottom security module After receiving the notification by the control module, the bottom security module decrypts the information related to the trigger event.
  • the information sent by the sending terminal output by the control of the application includes: an encryption identifier and an encryption information, or an encryption identifier, a version number of the encryption algorithm, and encryption information;
  • the underlying security module After receiving the notification by the control module, the underlying security module decrypts the information related to the trigger event, including:
  • the bottom security module When the user reads the information sent by the sending terminal of the control output of the application, the bottom security module prompts the terminal user to input the communication key and receives the communication input by the terminal user after identifying the encrypted identifier. Key, or, after identifying the encrypted identifier, acquiring a preset local communication key;
  • the underlying security module uses the communication key input by the terminal user or the locally stored preset communication key to encrypt the encryption by using a preset encryption algorithm or an encryption algorithm corresponding to the version number of the encryption algorithm.
  • the information is decrypted, and the plaintext of the decrypted information is displayed to the user.
  • an optional manner is required for the user to input a communication key, and the security of the method is relatively high according to the encryption of the communication key, and another optional manner is that the user does not need to input the communication key.
  • a communication key is preset locally, and this key is used for each encryption. This method is more convenient for the user, and the user does not need to input the communication key every time.
  • the embodiment of the invention further provides a computer storage medium, wherein the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the above method.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • the embodiment further provides an information security delivery system, including a transmitting terminal and a receiving terminal.
  • the embodiment provides a sending terminal, as shown in FIG.
  • a detection module configured to detect a trigger event triggered by an application's control
  • the triggering event includes the user adding information to the control of the application; the information related to the triggering event is information that the user will add in the control of the application.
  • the control of the application includes an EditView control, which is a custom control inherited from the system edit control.
  • the encryption module is configured to: after detecting a trigger event triggered by the control of the application, encrypting information related to the trigger event to generate an encrypted ciphertext;
  • the application is configured to send the encrypted ciphertext to the receiving terminal.
  • the application may be a short message provided by the mobile phone itself, or an email, or may be a third-party application downloaded by the user, such as WeChat, QQ.
  • the sending terminal of this embodiment further includes:
  • the startup module is configured to prompt the terminal user whether to enable the security mode. After receiving the request of the terminal user to enable the security mode, the security mode is started, and the encryption module is triggered to be started.
  • the startup module is configured to enable a security mode, and trigger the activation of the encryption module, including:
  • the security mode is triggered by the verification, and the encryption module is triggered to start.
  • the security mode open password is preset on the terminal, and is used for verifying when the security mode is enabled.
  • the security mode cannot be used to enable the password on the terminal.
  • the startup module After receiving the request to enable the underlying security module, the startup module directly starts the security mode, and the user does not need to input a password to directly trigger the startup of the underlying security module.
  • the encryption module is configured to: after detecting a trigger event triggered by the control of the application, encrypting the information related to the trigger event to generate an encrypted ciphertext, including:
  • the encryption module After the detecting module detects a trigger event triggered by the application control, the encryption module prompts the terminal user to input a communication key, and receives a communication key input by the terminal user, or obtains a preset stored locally. Communication key
  • the version number of the encryption algorithm and the encrypted identifier generate an encrypted ciphertext.
  • an optional manner is required for the user to input a communication key, and the security of the method is relatively high according to the encryption of the communication key, and another optional manner is that the user does not need to input the communication key.
  • a communication key is preset locally, and this key is used for each encryption. This method is more convenient for the user, and the user does not need to input the communication key every time.
  • the embodiment provides a sending terminal, including: a detecting module, a decrypting module, and an application, where:
  • the detecting module is configured to detect a trigger event triggered by an application control
  • the decryption module is configured to decrypt the information related to the trigger event after detecting a trigger event triggered by the application's control.
  • the application is configured to prompt the user to trigger a control of the application after receiving the information sent by the sending terminal;
  • the triggering event includes information sent by the sending terminal output by the terminal user to read the control of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application.
  • the control of the application includes a display (TextView) control, which is a custom control inherited from the system display control.
  • the receiving terminal further includes a startup module connected to the detecting module and the decrypting module, where:
  • the detecting module is further configured to trigger the startup module to work when detecting the triggering event;
  • the startup module is configured to prompt the terminal user whether to enable the security mode. After receiving the request of the terminal user to enable the security mode, the security mode is started, and the decryption module is triggered to be started.
  • the startup module is configured to enable a security mode, and trigger the decryption module to be started, including:
  • the decryption module After determining that the received security mode open password of the terminal user is consistent with the preset security mode open password, the decryption module is triggered to be activated by verification.
  • the security mode open password is preset on the terminal, and is used for verifying when the security mode is enabled.
  • the security mode cannot be used to enable the password on the terminal.
  • the startup module After receiving the request to enable the underlying security module, the startup module directly starts the security mode, and the user does not need to input a password to directly trigger the startup of the underlying security module.
  • the information sent by the sending terminal output by the control of the application includes: an encryption identifier and an encryption information, or an encryption identifier, a version number of the encryption algorithm, and encryption information;
  • the decryption module is configured to decrypt the information related to the trigger event after detecting a trigger event that the control of the application is triggered, including:
  • the decryption module After the detecting module detects the trigger event triggered by the application control, after the decryption module identifies the encrypted identifier, the decryption module prompts the terminal user to input the communication key, and receives the communication key input by the terminal user, or identifies After the encrypted identifier is obtained, obtaining a preset communication key stored locally;
  • an optional manner is required for the user to input a communication key, and the security of the method is relatively high according to the encryption of the communication key, and another optional manner is that the user does not need to input the communication key.
  • a communication key is preset locally, and this key is used for each encryption. This method is more convenient for the user, and the user does not need to input the communication key every time.
  • the embodiment provides an information security delivery method, including the following steps:
  • S301 The terminal detects that the application's control is triggered by a trigger event.
  • the triggering event includes that the user is to add information to the control of the application; the information related to the triggering event is information that the user will add in the control of the application.
  • the application's controls include an EditView control, which is a custom control inherited from the system edit control.
  • the application may be a short message provided by the mobile phone itself, or an email, or may be a third-party application downloaded by the user, such as WeChat, QQ.
  • S302 The terminal encrypts the information related to the trigger event to generate an encrypted ciphertext.
  • the terminal After the terminal detects that the trigger of the application is triggered, the terminal encrypts the information related to the trigger event to generate an encrypted ciphertext, including:
  • the terminal After detecting, by the terminal, a trigger event triggered by the application, the terminal prompts the terminal user to input a communication key, and receives the communication key input by the terminal user, or obtains a preset local communication key;
  • the version number and the encrypted identifier generate an encrypted ciphertext.
  • an optional manner is required for the user to input a communication key, and the security of the method is relatively high according to the encryption of the communication key, and another optional manner is that the user does not need to input the communication key.
  • a communication key is preset locally, and this key is used for each encryption. This method is more convenient for the user, and the user does not need to input the communication key every time.
  • S303 The terminal sends the encrypted ciphertext to the receiving terminal by using the application.
  • the method further includes: before the encrypting the information related to the trigger event to generate the encrypted ciphertext, as described in the step S302, the method further includes:
  • the terminal user is prompted to enable the security mode, and after receiving the request of the terminal user to open the security mode, the security mode is enabled.
  • the security mode is enabled, that is, the information related to the trigger event can be encrypted to generate an encrypted ciphertext.
  • the opening the security mode includes:
  • the security mode is enabled through verification.
  • the security mode open password is preset on the terminal, and is used for verifying when the security mode is enabled.
  • the security mode can also be used to enable the password on the terminal, and the startup module is enabled to open. After the request of the underlying security module, the security mode is directly started, and the underlying security module is directly triggered to be triggered without the user inputting a password.
  • the embodiment of the invention further provides a computer storage medium, wherein the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the above method.
  • the embodiment provides an information security delivery method, including the following steps:
  • S401 The terminal detects a trigger event that is triggered by an application control.
  • the method further includes: before the terminal detects a trigger event that the control of the application is triggered, the method further includes: the application receiving the information sent by the sending terminal, and prompting the user to trigger the control of the application;
  • the triggering event includes information sent by the sending terminal output by the terminal user to read the control of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application.
  • the method further includes: when the terminal detects a trigger event that the control of the application is triggered, the method further includes:
  • the terminal user is prompted to enable the security mode, and after receiving the request of the terminal user to open the security mode, the security mode is enabled.
  • the opening the security mode includes:
  • the security mode After determining that the received security mode open password of the terminal user is consistent with the preset security mode open password, the security mode is enabled through verification.
  • the security mode is enabled, that is, the decryption may be performed in step S402.
  • S402 The terminal decrypts the information related to the trigger event.
  • the information sent by the sending terminal output by the control of the application includes: an encryption identifier and an encryption information, or an encryption identifier, a version number of the encryption algorithm, and encryption information;
  • the terminal After the terminal detects that the control of the application is triggered, the terminal decrypts the information related to the trigger event, including:
  • the terminal When the terminal detects that the user reads the information sent by the sending terminal of the application control, after identifying the encrypted identifier, the terminal prompts the terminal user to input a communication key, and receives the communication secret input by the terminal user. Key, or, after identifying the encrypted identifier, acquiring a preset communication key stored locally;
  • the embodiment of the invention further provides a computer storage medium, wherein the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the above method.
  • the application control includes a TextView (display) control and an EditView (edit) control
  • the encryption identifier is "palm whisper:”
  • the security mode has been turned on as an example
  • FIG. 9 is an information security transfer method of the application example.
  • the schematic diagram of the process, as shown in Figure 9, includes the following steps:
  • S303 The bottom security module of the terminal intercepts the plaintext before the application, prompting the user to input a communication key, and the user A inputs a communication key agreed with the B;
  • S304 The bottom security module sends the encrypted ciphertext to the application.
  • the encrypted ciphertext includes: information encrypted in plaintext and an encrypted identifier, or information encrypted in plaintext, a version number of the encryption algorithm, and an encrypted identifier.
  • the application obtains the ciphertext;
  • S305 The application stores the ciphertext in the local memory of the terminal.
  • the terminal local memory stores the communication information received and sent by the application, but is obtained by the application. Is cipher text, so the local memory is also stored in cipher text;
  • S306 The application network server, the application on the terminal A sends the ciphertext to the application network server, and the application network server forwards the ciphertext to the application on the terminal B;
  • the application's web server stores the ciphertext in local storage on the network side.
  • the cryptographic text is also stored in the local storage on the network side.
  • "palm whisper:” is an encrypted identifier, and the user can also know that the received information is ciphertext after seeing it. Obviously, the local memory stored on terminal B is also ciphertext.
  • the underlying security module on the terminal B identifies the encrypted identifier at the bottom layer, and then prompts the user B to input the communication key.
  • the information obtained and stored by the application are all ciphertext. Even if the terminal is lost, or the intermediate network communication is intercepted, or the application's network server is compromised/abuse, the communication information will not be leaked.
  • FIG. 10 is a schematic diagram of the principle of the underlying security module control application:
  • an application is installed on the terminal, and an underlying security module is disposed at the bottom layer of the terminal, and the bottom security module is an integral part of the underlying framework layer;
  • the application's interface consists of a variety of system controls and custom controls inherited from system controls.
  • 204 is a custom TextView control
  • 205 is a custom EditView control
  • control module is configured to intercept a trigger event obtained by the control; communicate with the underlying security module, execute an instruction of the underlying security module; and input the control control And output.
  • control modules inside these application custom controls there are control modules inside these application custom controls; thus, the underlying security module can control the input and output of the application through the control module.
  • control module can be preset in other controls provided by the system, and the other behaviors of the application can be controlled by the control module, so that the underlying security module controls the input and output of the application without any modification of the application. That is, in Figure 5, on terminal A, the underlying security module can obtain input prior to the application; on terminal B, the underlying security module can further process the output after the application gives the output. This actually takes advantage of the inheritance relationship of modern intelligent terminal window systems. It is difficult for an application to bypass the window system provided by the operating system and then write a separate window system. Therefore, the application must inherit the control module in the system control, and then be controlled by the underlying security module through the control module.
  • FIG 11 is a schematic diagram of the operation of turning on the security mode ("tight" mode) in the application example:
  • 501 is a finger operation of the user, representing the user
  • 502 is a third party chat application
  • 503 is a "closed" switch. When a small black dot appears in the upper right corner of the figure, it indicates that it is in an open state; if there is no black small dot, it indicates that it is in a closed state;
  • 401 is an interface that is popped up by the underlying security module to allow the user to input a password for turning on the "closed" mode;
  • 402 is an input box for inputting a password for turning on the "closed" mode on 401;
  • 403 is the interface when the input password is correct and the "closed" mode is opened. At this time, a black dot appears in the upper right corner of 503;
  • the operation process includes: when the 503 "closed” switch is in the off state, the user clicks 503 with the finger 501, and the bottom security module pops up 401.
  • the user inputs a password for turning on the "closed” mode, and the user enters the password in 402, if the password is correct ( In accordance with the preset password, the "closed” mode is turned on, see 403; if the password is wrong, the "closed” mode is still off, see 405.
  • the above process verifies the identity of the user, indicating that the user has the right to use the terminal.
  • Figure 12 is an example of the operation of the underlying security module to convert user input into ciphertext and return to EditView:
  • 501 is a finger operation of the user, representing the user
  • 502 is a third party chat application
  • 503 is a "closed" switch, which is in an open state
  • 504 is an interface that is displayed by the underlying security module to allow the user to input plaintext
  • 505 is an input method keyboard
  • 506 is the plain text input by the user
  • 507 is an interface that is displayed by the underlying security module to allow the user to input the communication password
  • 508 is a graphically entered communication password input by the user
  • 509 is the ciphertext returned to the EditView after being encrypted by the underlying security module
  • the operation process includes: the user clicks the EditView control of the application 502 with the finger 501, because the 503 is in an open state (ie, the "closed” mode is opened), so the trigger event is intercepted and processed by the underlying security module, so that 504 is popped; the user is at 504.
  • click the communication password button to pop up the 507 interface, and let the user input the communication password 508 (in the figure, the communication password uses a graphic password, and actually can use multiple password forms), and then the user clicks OK.
  • the application cannot obtain the original text information of the user. Therefore, the application cannot steal the privacy of the user.
  • Figure 13 is a schematic diagram of the underlying security module decrypting the ciphertext using the key entered by the user and returning it to the TextView display:
  • 601 is the application interface installed by the receiver
  • 602 is an interface that is displayed by the underlying security module to allow the user to input the communication password
  • 603 is a display plaintext interface that pops up when the key is correct
  • 604 is an error prompting interface popped up when the key is wrong;
  • the underlying security module decrypts according to the key. The decryption will succeed, and the underlying security module pops up 603 to display the plaintext to the recipient; if the recipient enters the wrong key, the decryption will fail, and the underlying security module pops up 604 to prompt the recipient to "key error.”
  • the information security transmission method and system, the receiving terminal, and the transmitting terminal provided in the foregoing embodiments intercept the trigger event of the application by the underlying security module, and encrypt or decrypt the transmitted information.
  • the application only serves as a transmission channel for the encrypted information.
  • the information transmitted is ciphertext, thereby preventing application leakage, high security and reliability, and meeting the user's privacy protection requirements.
  • all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve.
  • the devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
  • each device/function module/functional unit in the above embodiment When each device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium.
  • the above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
  • the above technical solution encrypts or decrypts the transmitted information, and the application only serves as a transmission channel of the encrypted information.
  • the information transmitted is ciphertext, thereby preventing application leakage, high security and reliability, and satisfying user protection privacy. Demand.

Abstract

Disclosed are a method and system for transmitting information safely, a receiving terminal and a transmission terminal. The transmission terminal includes: a control module used for intercepting the trigger event, and notifying a bottom layer security module when a widget of an application is triggered, and transmitting to the application after receiving encrypted cryptograph returned from the bottom layer security module; the bottom layer security module used for encrypting the related information of the trigger event to generate the encrypted cryptograph after receiving the notification from the control module, and transmitting the encrypted cryptograph to the control module; the application configured to transmit the encrypted cryptograph to the receiving terminal. The receiving terminal includes: a control module, configured to intercept the trigger event when a widget of an application is triggered, and notify a bottom layer security module; the bottom layer security module configured to decrypt, after receiving the notification from the control module, the related information of the trigger event. In the technical solution, the bottom layer security module intercepts the trigger event of the application, and encrypts or decrypts the transmission information, and all the information transmitted by the application are cryptograph, and thus the technical solution can prevent secret leakage by the application, and has high security.

Description

一种信息安全传递方法及系统、接收终端、发送终端Information security transmission method and system, receiving terminal and transmitting terminal 技术领域Technical field
本文涉及但不限于通信领域,具体涉及一种信息安全传递方法及系统、接收终端、发送终端。This document relates to, but is not limited to, the field of communications, and specifically relates to an information security transmission method and system, a receiving terminal, and a transmitting terminal.
背景技术Background technique
在终端上用户常常需要传输文字信息,如通过短信息或者QQ、微信等应用来传递信息,这些信息都属于用户的个人隐私,用户不愿意让其他人知道。曾经人们认为这些信息的传输通道是安全的,而且有一些应用宣称它们传递信息的方式是安全的,它们常常宣称信息是从客户端加密传输到它们的服务器的,但在斯诺登揭露了美国政府实施大规模监控的事件后,人们才发现,网络作为信息的传输通道是十分不安全的,用户的隐私仍然有可能在服务器上泄漏,例如可能会被黑客攻破服务器获得;又或者例如可能被不诚信的第三方公司直接从服务器获得并利用(类似这次美国政府直接向互联网巨头索要用户隐私的行为),因此,应用传递数据的中间传输通道已经不被信任,变得不安全且无法满足用户保护隐私的需求。On the terminal, the user often needs to transmit text information, such as through short messages or applications such as QQ and WeChat, which are all personal privacy of the user, and the user is unwilling to let others know. It used to be thought that the transmission channel for this information was secure, and some applications claimed that the way they transmitted information was secure. They often claimed that the information was encrypted from the client to their servers, but Snowden revealed the United States. After the government implemented the large-scale monitoring incident, people discovered that the network as the transmission channel of information is very insecure, and the user's privacy may still be leaked on the server, for example, it may be obtained by the hacker to break the server; or, for example, may be Untrustworthy third-party companies obtain and use them directly from the server (similar to the behavior of the US government directly asking the Internet giant for user privacy). Therefore, the intermediate transmission channel for transmitting data is not trusted, becomes unsafe and cannot be satisfied. The need for users to protect privacy.
因此,目前需要一种可以被用户信任的安全的信息传递方法,与任何应用都无关,满足用户保护隐私的需求。Therefore, there is a need for a secure information delivery method that can be trusted by users, regardless of any application, to meet the needs of users to protect privacy.
发明内容Summary of the invention
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。The following is an overview of the topics detailed in this document. This Summary is not intended to limit the scope of the claims.
本发明实施例提供一种信息安全传递方法及系统、接收终端、发送终端,以解决如何在信息传递时保护信息安全、隐私的技术问题。The embodiments of the present invention provide a method and system for transmitting information security, a receiving terminal, and a sending terminal, to solve the technical problem of how to protect information security and privacy during information transmission.
本发明实施例提供了一种信息安全传递方法,包括: An embodiment of the present invention provides an information security delivery method, including:
在发送终端的系统控件中预先设置控制模块,当所述发送终端的应用的控件被触发时,所述控制模块拦截触发事件,并通知所述发送终端的底层安全模块;Setting a control module in a system control of the sending terminal, when the control of the application of the sending terminal is triggered, the control module intercepts the triggering event, and notifies the bottom security module of the sending terminal;
所述底层安全模块收到所述控制模块的通知后,对所述触发事件相关的信息加密生成加密密文,将所述加密密文发送至所述控制模块;After receiving the notification from the control module, the underlying security module encrypts the information related to the trigger event to generate an encrypted ciphertext, and sends the encrypted ciphertext to the control module;
所述控制模块将所述加密密文通过所述应用发送给接收终端。The control module sends the encrypted ciphertext to the receiving terminal through the application.
可选地,所述触发事件包括用户将要在所述应用的控件中添加信息;所述触发事件相关的信息为用户将要在所述应用的控件中添加的信息。Optionally, the triggering event includes that the user is to add information to the control of the application; the information related to the triggering event is information that the user will add in the control of the application.
可选地,在所述底层安全模块收到所述控制模块的通知后,对所述触发事件相关的信息加密生成加密密文之前,所述方法还包括:Optionally, the method further includes: after the bottom security module receives the notification from the control module, and encrypts the information related to the trigger event to generate the encrypted ciphertext, the method further includes:
提示发送终端用户是否开启安全模式,在接收到所述发送终端用户开启安全模式的请求后,开启安全模式,触发所述底层安全模块启动。Prompting whether the sending terminal user turns on the security mode, and after receiving the request of the sending terminal user to enable the security mode, the security mode is enabled, and the bottom security module is triggered to be started.
可选地,所述开启安全模式,触发所述底层安全模块启动,包括:Optionally, the enabling the security mode to trigger the startup of the underlying security module comprises:
提示所述发送终端用户输入安全模式开启密码;Prompting the sending terminal user to input a security mode open password;
确定接收到的所述发送终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,触发所述底层安全模块启动。After determining that the received security mode open password input by the sending terminal user is consistent with the preset security mode open password, the underlying security module is triggered to be activated by verification.
可选地,所述底层安全模块收到所述控制模块的通知后,对所述触发事件中相关的信息加密生成加密密文,包括:Optionally, after receiving the notification by the control module, the underlying security module encrypts the information related to the trigger event to generate an encrypted ciphertext, including:
所述底层安全模块收到所述控制模块的通知后,向发送终端用户提示输入通信密钥,并接收所述发送终端用户输入的通信密钥,或者,获取本地存储的预设的通信密钥;After receiving the notification of the control module, the bottom security module prompts the sending terminal user to input a communication key, and receives the communication key input by the sending terminal user, or acquires a preset local communication key. ;
所述底层安全模块利用所述发送终端用户输入的通信密钥或所述本地存储的预设的通信密钥采用加密算法对所述用户将要在应用的控件中添加的信息加密,并添加加密标识或者添加所述加密算法的版本号和加密标识生成加密密文。The underlying security module encrypts information added by the user to the control of the application by using a communication key input by the user of the sending terminal or the locally stored preset communication key, and adds an encrypted identifier. Or adding the version number of the encryption algorithm and the encrypted identifier to generate an encrypted ciphertext.
可选地,所述应用的控件包括编辑控件。 Optionally, the control of the application includes an edit control.
本发明实施例还提供了一种信息安全传递方法,包括:The embodiment of the invention further provides an information security delivery method, including:
在接收终端的系统控件中预先设置控制模块,当所述接收终端的应用的控件被触发时,所述控制模块拦截触发事件,并通知所述接收终端的底层安全模块;Setting a control module in a system control of the receiving terminal, when the control of the application of the receiving terminal is triggered, the control module intercepts the triggering event, and notifies the bottom security module of the receiving terminal;
所述底层安全模块收到所述控制模块的通知后,对所述触发事件相关的信息解密。After receiving the notification from the control module, the underlying security module decrypts the information related to the trigger event.
可选地,所述方法还包括:所述应用接收到发送终端发来的信息,并提示用户触发所述应用的控件;Optionally, the method further includes: the application receiving the information sent by the sending terminal, and prompting the user to trigger the control of the application;
所述触发事件包括接收终端用户读取所述应用的控件输出的所述发送终端发来的信息;所述触发事件相关的信息为所述应用的控件输出的所述发送终端发来的信息。The triggering event includes receiving, by the terminal user, information sent by the sending terminal of the control output of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application.
可选地,在所述控制模块拦截到触发事件时,所述方法还包括:Optionally, when the control module intercepts the triggering event, the method further includes:
提示接收终端用户是否开启安全模式,在接收到所述接收终端用户开启安全模式的请求后,开启安全模式,触发所述底层安全模块启动。And prompting the receiving terminal user to enable the security mode, and after receiving the request of the receiving terminal user to enable the security mode, turning on the security mode, triggering the bottom security module to start.
可选地,所述开启安全模式,触发所述底层安全模块启动,包括:Optionally, the enabling the security mode to trigger the startup of the underlying security module comprises:
提示所述接收终端用户输入安全模式开启密码;Prompting the receiving terminal user to input a security mode open password;
确定接收到的所述接收终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,触发所述底层安全模块启动。After determining that the received security mode open password input by the receiving terminal user is consistent with the preset security mode open password, the underlying security module is triggered to be activated by verification.
可选地,所述应用的控件输出的所述发送终端发来的信息包括:加密标识和加密信息,或者加密标识、加密算法的版本号和加密信息;Optionally, the information sent by the sending terminal output by the control of the application includes: an encryption identifier and an encryption information, or an encryption identifier, a version number of the encryption algorithm, and encryption information;
所述底层安全模块收到所述控制模块的通知后,对所述触发事件相关的信息解密,包括:After receiving the notification by the control module, the underlying security module decrypts the information related to the trigger event, including:
所述底层安全模块在用户读取应用的控件输出的所述发送终端发来的信息时,识别出所述加密标识后,向接收终端用户提示输入通信密钥,并接收所述接收终端用户输入的通信密钥,或者,识别出所述加密标识后,获取本地存储的预设的通信密钥; When the user reads the information sent by the sending terminal of the control output of the application, the bottom security module prompts the receiving terminal user to input the communication key and receives the input of the receiving terminal user after identifying the encrypted identifier. a communication key, or, after identifying the encrypted identifier, acquiring a preset communication key stored locally;
所述底层安全模块利用所述接收终端用户输入的通信密钥或者所述本地存储的预设的通信密钥,采用预设的加密算法或所述加密算法的版本号对应的加密算法对所述加密信息解密,向用户展示解密后的信息的明文。The bottom security module uses the communication key input by the receiving terminal user or the locally stored preset communication key, and uses a preset encryption algorithm or an encryption algorithm corresponding to the version number of the encryption algorithm. The encrypted information is decrypted, and the plaintext of the decrypted information is displayed to the user.
可选地,所述应用的控件包括显示控件。Optionally, the control of the application includes a display control.
本发明实施例还提供了一种发送终端,包括:设置在发送终端底层框架中的底层安全模块、预先设置在发送终端的系统控件中的控制模块以及应用,其中:The embodiment of the invention further provides a sending terminal, comprising: an underlying security module disposed in an underlying framework of the transmitting terminal, a control module preset in a system control of the transmitting terminal, and an application, wherein:
所述控制模块,设置为当所述应用的控件被触发时,拦截触发事件,并通知所述底层安全模块;在接收到所述底层安全模块返回的加密密文后传递给所述应用;The control module is configured to: when the control of the application is triggered, intercept the trigger event, and notify the underlying security module; and transmit the encrypted ciphertext returned by the underlying security module to the application;
所述底层安全模块,设置为在收到所述控制模块的通知后,对所述触发事件相关的信息加密生成加密密文,将所述加密密文发送至所述控制模块;The underlying security module is configured to: after receiving the notification of the control module, encrypt the information related to the trigger event to generate an encrypted ciphertext, and send the encrypted ciphertext to the control module;
所述应用,设置为将所述加密密文发送给接收终端。The application is configured to send the encrypted ciphertext to the receiving terminal.
可选地,所述触发事件包括用户将要在应用的控件中添加信息;所述触发事件相关的信息为用户将要在应用的控件中添加的信息。Optionally, the triggering event includes the user adding information to the control of the application; the information related to the triggering event is information that the user will add in the control of the application.
可选地,还包括:Optionally, it also includes:
启动模块,设置为提示发送终端用户是否开启安全模式,在接收到所述发送终端用户开启所述底层安全模块的请求后,开启安全模式,触发所述底层安全模块启动。The startup module is configured to prompt the sending terminal user whether to enable the security mode. After receiving the request of the sending terminal user to open the underlying security module, the security mode is started, and the bottom security module is triggered to be started.
可选地,所述启动模块,设置为开启安全模式,触发所述底层安全模块启动,包括:Optionally, the startup module is configured to enable a security mode, triggering activation of the underlying security module, including:
提示所述发送终端用户输入安全模式开启密码;Prompting the sending terminal user to input a security mode open password;
确定接收到的所述发送终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,触发所述底层安全模块启动。After determining that the received security mode open password input by the sending terminal user is consistent with the preset security mode open password, the underlying security module is triggered to be activated by verification.
可选地,所述底层安全模块,设置为收到所述控制模块的通知后,对所述触发事件中相关的信息加密生成加密密文,包括: Optionally, the underlying security module is configured to: after receiving the notification of the control module, encrypt and generate information about the information in the trigger event to generate an encrypted ciphertext, including:
所述底层安全模块收到所述控制模块的通知后,向发送终端用户提示输入通信密钥,并接收所述发送终端用户输入的通信密钥,或者,获取本地存储的预设的通信密钥;After receiving the notification of the control module, the bottom security module prompts the sending terminal user to input a communication key, and receives the communication key input by the sending terminal user, or acquires a preset local communication key. ;
所述底层安全模块利用所述发送终端用户输入的通信密钥或所述本地存储的预设的通信密钥采用加密算法对所述用户将要在所述应用的控件中添加的信息加密,并添加加密标识或者添加所述加密算法的版本号和加密标识生成加密密文。The underlying security module encrypts, by using an encryption algorithm, information added by the user to the control of the application by using a communication key input by the sending terminal user or the locally stored preset communication key, and adding Encrypting the identifier or adding the version number and the encrypted identifier of the encryption algorithm to generate an encrypted ciphertext.
可选地,所述应用的控件包括编辑控件。Optionally, the control of the application includes an edit control.
本发明实施例还提供了一种接收终端,包括:设置在接收终端底层框架中的底层安全模块、预先设置在接收终端的系统控件中的控制模块以及应用,其中:The embodiment of the invention further provides a receiving terminal, comprising: an underlying security module disposed in an underlying framework of the receiving terminal, a control module pre-set in a system control of the receiving terminal, and an application, wherein:
所述控制模块,设置为当所述应用的控件被触发时,拦截触发事件,并通知所述底层安全模块;The control module is configured to intercept a trigger event when the control of the application is triggered, and notify the underlying security module;
所述底层安全模块,设置为收到所述控制模块的通知后,对所述触发事件相关的信息解密;The underlying security module is configured to decrypt the information related to the trigger event after receiving the notification of the control module;
所述应用,设置为接收到发送终端发来的信息后,提示用户触发所述应用的控件;The application is configured to prompt the user to trigger a control of the application after receiving the information sent by the sending terminal;
所述触发事件包括接收终端用户读取所述应用的控件输出的所述发送终端发来的信息;所述触发事件相关的信息为所述应用的控件输出的所述发送终端发来的信息。The triggering event includes receiving, by the terminal user, information sent by the sending terminal of the control output of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application.
可选地,还包括与所述控制模块和所述底层安全模块相连的启动模块,其中:Optionally, a startup module connected to the control module and the underlying security module is further included, wherein:
所述控制模块,还设置为在拦截到触发事件时,触发所述启动模块工作;The control module is further configured to trigger the startup module to work when the trigger event is intercepted;
所述启动模块,设置为提示接收终端用户是否开启安全模式,在接收到所述接收终端用户开启安全模式的请求后,开启安全模式,触发所述底层安全模块启动。The startup module is configured to prompt the receiving terminal user to enable the security mode. After receiving the request of the receiving terminal user to enable the security mode, the security mode is started, and the bottom security module is triggered to be started.
可选地,所述启动模块,设置为开启安全模式,触发所述底层安全模块 启动,包括:Optionally, the startup module is configured to enable a security mode to trigger the underlying security module Start up, including:
提示所述接收终端用户输入安全模式开启密码;Prompting the receiving terminal user to input a security mode open password;
确定接收到的所述接收终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,触发所述底层安全模块启动。After determining that the received security mode open password input by the receiving terminal user is consistent with the preset security mode open password, the underlying security module is triggered to be activated by verification.
可选地,所述应用的控件输出的所述发送终端发来的信息包括:加密标识和加密信息,或者加密标识、加密算法的版本号和加密信息;Optionally, the information sent by the sending terminal output by the control of the application includes: an encryption identifier and an encryption information, or an encryption identifier, a version number of the encryption algorithm, and encryption information;
所述底层安全模块,设置为收到所述控制模块的通知后,对所述触发事件相关的信息解密,包括:The underlying security module is configured to decrypt the information related to the trigger event after receiving the notification from the control module, including:
所述底层安全模块在用户读取应用的控件输出的所述发送终端发来的信息时,识别出所述加密标识后,向接收终端用户提示输入通信密钥,并接收所述接收终端用户输入的通信密钥,或者,识别出所述加密标识后,获取本地存储的预设的通信密钥;When the user reads the information sent by the sending terminal of the control output of the application, the bottom security module prompts the receiving terminal user to input the communication key and receives the input of the receiving terminal user after identifying the encrypted identifier. a communication key, or, after identifying the encrypted identifier, acquiring a preset communication key stored locally;
所述底层安全模块利用所述接收终端用户输入的通信密钥或者所述本地存储的预设的通信密钥,采用预设的加密算法或所述加密算法的版本号对应的加密算法对所述加密信息解密,向用户展示解密后的信息的明文。The bottom security module uses the communication key input by the receiving terminal user or the locally stored preset communication key, and uses a preset encryption algorithm or an encryption algorithm corresponding to the version number of the encryption algorithm. The encrypted information is decrypted, and the plaintext of the decrypted information is displayed to the user.
可选地,所述应用的控件包括显示控件。Optionally, the control of the application includes a display control.
本发明实施例还提供了一种信息安全传递系统,包括:如上所述的发送终端和如上所述的接收终端。An embodiment of the present invention further provides an information security delivery system, including: the sending terminal as described above and the receiving terminal as described above.
本发明实施例还提供了一种信息安全传递方法,包括:The embodiment of the invention further provides an information security delivery method, including:
发送终端检测到应用的控件被触发的触发事件后,对所述触发事件相关的信息加密生成加密密文,将所述加密密文通过所述应用发送给接收终端。After the sending terminal detects the trigger event that the control of the application is triggered, the information related to the trigger event is encrypted to generate an encrypted ciphertext, and the encrypted ciphertext is sent to the receiving terminal by using the application.
可选地,所述触发事件包括用户将要在应用的控件中添加信息;所述触发事件相关的信息为用户将要在应用的控件中添加的信息。Optionally, the triggering event includes the user adding information to the control of the application; the information related to the triggering event is information that the user will add in the control of the application.
可选地,在所述对所述触发事件相关的信息加密生成加密密文之前,所述方法还包括:Optionally, before the encrypting the information related to the trigger event to generate an encrypted ciphertext, the method further includes:
提示发送终端用户是否开启安全模式,在接收到所述发送终端用户开启 安全模式的请求后,开启安全模式。Prompting whether the sending terminal user turns on the security mode, and the user is turned on when receiving the sending terminal After the security mode request, the security mode is turned on.
可选地,所述开启安全模式,包括:Optionally, the opening the security mode includes:
提示所述发送终端用户输入安全模式开启密码;Prompting the sending terminal user to input a security mode open password;
确定接收到的所述发送终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,开启安全模式。After determining that the received security mode open password input by the sending terminal user is consistent with the preset security mode open password, the security mode is enabled through verification.
可选地,所述发送终端检测到应用的控件被触发的触发事件后,对所述触发事件相关的信息加密生成加密密文,包括:Optionally, after the sending terminal detects that the trigger of the application is triggered, the sending terminal encrypts the information related to the triggering event to generate an encrypted ciphertext, including:
所述发送终端检测到应用的控件被触发的触发事件后,向发送终端用户提示输入通信密钥,并接收所述发送终端用户输入的通信密钥,或者,获取本地存储的预设的通信密钥;After detecting that the trigger of the application is triggered, the sending terminal prompts the sending terminal user to input a communication key, and receives the communication key input by the user of the sending terminal, or obtains a preset local communication confidentiality. key;
利用所述发送终端用户输入的通信密钥或所述本地存储的预设的通信密钥采用加密算法对所述用户将要在应用的控件中添加的信息加密,并添加加密标识或者添加所述加密算法的版本号和加密标识生成加密密文。Encrypting information added by the user to the control of the application by using a communication key input by the user of the sending terminal or the locally stored preset communication key, and adding an encrypted identifier or adding the encryption The version number and encryption identifier of the algorithm generate an encrypted ciphertext.
可选地,所述应用的控件包括编辑控件。Optionally, the control of the application includes an edit control.
本发明实施例还提供了一种信息安全传递方法,包括:The embodiment of the invention further provides an information security delivery method, including:
接收终端检测到应用的控件被触发的触发事件后,对所述触发事件相关的信息解密。After receiving the trigger event that the control of the application is triggered, the receiving terminal decrypts the information related to the trigger event.
可选地,在所述接收终端检测到应用的控件被触发的触发事件前,所述方法还包括:所述应用接收到发送终端发来的信息,并提示用户触发所述应用的控件;Optionally, before the receiving terminal detects that the control of the application is triggered, the method further includes: the application receiving the information sent by the sending terminal, and prompting the user to trigger the control of the application;
所述触发事件包括接收终端用户读取所述应用的控件输出的所述发送终端发来的信息;所述触发事件相关的信息为所述应用的控件输出的所述发送终端发来的信息。The triggering event includes receiving, by the terminal user, information sent by the sending terminal of the control output of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application.
可选地,在所述接收终端检测到应用的控件被触发的触发事件时,所述方法还包括:Optionally, when the receiving terminal detects a trigger event that the control of the application is triggered, the method further includes:
提示接收终端用户是否开启安全模式,在接收到所述接收终端用户开启 安全模式的请求后,开启安全模式。Prompting whether the receiving terminal user turns on the security mode, and the user is turned on when receiving the receiving terminal After the security mode request, the security mode is turned on.
可选地,所述开启安全模式,包括:Optionally, the opening the security mode includes:
提示所述接收终端用户输入安全模式开启密码;Prompting the receiving terminal user to input a security mode open password;
确定接收到的所述接收终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,开启安全模式。After determining that the received security mode open password input by the receiving terminal user is consistent with the preset security mode open password, the security mode is enabled through verification.
可选地,所述应用的控件输出的所述发送终端发来的信息包括:加密标识和加密信息,或者加密标识、加密算法的版本号和加密信息;Optionally, the information sent by the sending terminal output by the control of the application includes: an encryption identifier and an encryption information, or an encryption identifier, a version number of the encryption algorithm, and encryption information;
所述接收终端检测到应用的控件被触发的触发事件后,对所述触发事件相关的信息解密,包括:After the receiving terminal detects the trigger event triggered by the control of the application, the receiving terminal decrypts the information related to the trigger event, including:
所述接收终端检测到用户读取应用的控件输出的所述发送终端发来的信息时,识别出所述加密标识后,向接收终端用户提示输入通信密钥,并接收所述接收终端用户输入的通信密钥,或者,识别出所述加密标识后,获取本地存储的预设的通信密钥;When the receiving terminal detects the information sent by the sending terminal output by the control of the application, the receiving terminal recognizes the encrypted identifier, prompts the receiving terminal user to input the communication key, and receives the receiving terminal user input. a communication key, or, after identifying the encrypted identifier, acquiring a preset communication key stored locally;
利用所述接收终端用户输入的通信密钥或者所述本地存储的预设的通信密钥,采用预设的加密算法或所述加密算法的版本号对应的加密算法对所述加密信息解密,向用户展示解密后的信息的明文。Decrypting the encrypted information by using a preset encryption algorithm or an encryption algorithm corresponding to a version number of the encryption algorithm by using a communication key input by the user of the receiving terminal or the locally stored preset communication key The user displays the plaintext of the decrypted information.
可选地,所述应用的控件包括显示控件。Optionally, the control of the application includes a display control.
本发明实施例还提供了一种发送终端,包括:The embodiment of the invention further provides a sending terminal, including:
检测模块,设置为检测应用的控件被触发的触发事件;a detection module configured to detect a trigger event triggered by an application's control;
加密模块,设置为在检测应用的控件被触发的触发事件后,对所述触发事件相关的信息加密生成加密密文;The encryption module is configured to: after detecting a trigger event triggered by the control of the application, encrypting information related to the trigger event to generate an encrypted ciphertext;
应用,设置为将所述加密密文发送给接收终端。The application is configured to send the encrypted ciphertext to the receiving terminal.
可选地,所述触发事件包括用户将要在应用的控件中添加信息;所述触发事件相关的信息为用户将要在应用的控件中添加的信息。Optionally, the triggering event includes the user adding information to the control of the application; the information related to the triggering event is information that the user will add in the control of the application.
可选地,还包括: Optionally, it also includes:
启动模块,设置为提示发送终端用户是否开启安全模式,在接收到所述发送终端用户开启安全模式的请求后,开启安全模式,触发所述加密模块启动。The startup module is configured to prompt the sending terminal user whether to enable the security mode. After receiving the request of the sending terminal user to enable the security mode, the security mode is enabled, and the encryption module is triggered to start.
可选地,所述启动模块,设置为开启安全模式,触发所述加密模块启动,包括:Optionally, the startup module is configured to enable the security mode, triggering the encryption module to be started, including:
提示所述发送终端用户输入安全模式开启密码;Prompting the sending terminal user to input a security mode open password;
确定接收到的所述发送终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,开启安全模式,触发所述加密模块启动。After determining that the received security mode open password of the sending terminal user is consistent with the preset security mode open password, the security mode is triggered by the verification, and the encryption module is triggered to start.
可选地,所述加密模块,设置为在检测应用的控件被触发的触发事件后,对所述触发事件相关的信息加密生成加密密文,包括:Optionally, the encryption module is configured to: after detecting a trigger event triggered by the control of the application, encrypting the information related to the trigger event to generate an encrypted ciphertext, including:
在所述检测模块检测应用的控件被触发的触发事件后,所述加密模块向发送终端用户提示输入通信密钥,并接收所述发送终端用户输入的通信密钥,或者,获取本地存储的预设的通信密钥;After the detecting module detects a trigger event triggered by the application control, the encryption module prompts the sending terminal user to input a communication key, and receives a communication key input by the sending terminal user, or acquires a locally stored pre- Communication key
利用所述发送终端用户输入的通信密钥或所述本地存储的预设的通信密钥采用加密算法对所述用户将要在所述应用的控件中添加的信息加密,并添加加密标识或者添加所述加密算法的版本号和加密标识生成加密密文。Encrypting information added by the user to the control of the application by using a communication key input by the user of the sending terminal or the locally stored preset communication key, and adding an encrypted identifier or adding a The version number of the encryption algorithm and the encrypted identifier generate an encrypted ciphertext.
可选地,所述应用的控件包括编辑控件。Optionally, the control of the application includes an edit control.
本发明实施例还提供了一种接收终端,包括:检测模块、解密模块以及应用,其中:The embodiment of the invention further provides a receiving terminal, comprising: a detecting module, a decrypting module and an application, wherein:
所述检测模块,设置为检测应用的控件被触发的触发事件;The detecting module is configured to detect a trigger event triggered by an application control;
所述解密模块,设置为在检测应用的控件被触发的触发事件后,对所述触发事件相关的信息解密。The decryption module is configured to decrypt the information related to the trigger event after detecting a trigger event triggered by the application's control.
所述应用,设置为接收到发送终端发来的信息后,提示用户触发所述应用的控件;The application is configured to prompt the user to trigger a control of the application after receiving the information sent by the sending terminal;
进一步地,所述触发事件包括接收终端用户读取所述应用的控件输出的所述发送终端发来的信息;所述触发事件相关的信息为所述应用的控件输出 的所述发送终端发来的信息。Further, the triggering event includes receiving, by the terminal user, information sent by the sending terminal that is output by the control of the application; the information related to the triggering event is a control output of the application. The information sent by the sending terminal.
可选地,还包括与所述检测模块和所述解密模块相连的启动模块,其中:Optionally, the method further includes a startup module connected to the detection module and the decryption module, wherein:
所述检测模块,还设置为在检测到所述触发事件时,触发所述启动模块工作;The detecting module is further configured to trigger the startup module to work when the triggering event is detected;
所述启动模块,设置为提示接收终端用户是否开启安全模式,在接收到所述接收终端用户开启安全模式的请求后,开启安全模式,触发所述解密模块启动。The startup module is configured to prompt the receiving terminal user to enable the security mode. After receiving the request of the receiving terminal user to enable the security mode, the security mode is started, and the decryption module is triggered to be started.
可选地,所述启动模块,设置为开启安全模式,触发所述解密模块启动,包括:Optionally, the startup module is configured to enable the security mode, triggering the decryption module to start, including:
提示所述接收终端用户输入安全模式开启密码;Prompting the receiving terminal user to input a security mode open password;
确定接收到的所述接收终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,触发所述解密模块启动。After determining that the received security mode open password input by the receiving terminal user is consistent with the preset security mode open password, the decryption module is triggered to be activated by verification.
可选地,所述应用的控件输出的所述发送终端发来的信息包括:加密标识和加密信息,或者加密标识、加密算法的版本号和加密信息;Optionally, the information sent by the sending terminal output by the control of the application includes: an encryption identifier and an encryption information, or an encryption identifier, a version number of the encryption algorithm, and encryption information;
所述解密模块,设置为在检测应用的控件被触发的触发事件后,对所述触发事件相关的信息解密,包括:The decryption module is configured to decrypt the information related to the trigger event after detecting a trigger event that the control of the application is triggered, including:
在所述检测模块检测应用的控件被触发的触发事件后,所述解密模块识别出加密标识后,向接收终端用户提示输入通信密钥,并接收所述接收终端用户输入的通信密钥,或者,识别出所述加密标识后,获取本地存储的预设的通信密钥;After the detecting module detects the trigger event triggered by the application control, after the decryption module identifies the encrypted identifier, the decryption module prompts the receiving terminal user to input the communication key, and receives the communication key input by the receiving terminal user, or After identifying the encrypted identifier, acquiring a preset preset communication key;
利用所述接收终端用户输入的通信密钥或者所述本地存储的预设的通信密钥,采用预设的加密算法或所述加密算法的版本号对应的加密算法对所述加密信息解密,向用户展示解密后的信息的明文。Decrypting the encrypted information by using a preset encryption algorithm or an encryption algorithm corresponding to a version number of the encryption algorithm by using a communication key input by the user of the receiving terminal or the locally stored preset communication key The user displays the plaintext of the decrypted information.
可选地,所述应用的控件包括显示控件。Optionally, the control of the application includes a display control.
本发明实施例还提供了一种信息安全传递系统,包括:如上所述的发送终端和如上所述的接收终端。 An embodiment of the present invention further provides an information security delivery system, including: the sending terminal as described above and the receiving terminal as described above.
本发明实施例还提供了一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行上述的方法。The embodiment of the invention further provides a computer storage medium, wherein the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the above method.
与相关技术相比,本发明实施例提供的信息安全传递方法及系统、接收终端、发送终端,由底层安全模块截获应用的触发事件,对传输的信息进行加密或解密,应用只是作为已加密后的信息的传输通道,对于应用而言传递的信息均为密文,从而防止应用泄密信息,安全可靠性高,满足用户保护隐私的需求。Compared with the related art, the information security transmission method and system, the receiving terminal, and the sending terminal provided by the embodiments of the present invention intercept the application trigger event by the underlying security module, and encrypt or decrypt the transmitted information, and the application only serves as the encrypted The transmission channel of the information is ciphertext for the application, thereby preventing the application of the leaked information, high security and reliability, and meeting the user's privacy protection requirements.
附图概述BRIEF abstract
图1是实施例一中发送终端和接收终端的结构图;1 is a structural diagram of a transmitting terminal and a receiving terminal in Embodiment 1;
图2是实施例一中信息安全传递方法的流程图;2 is a flowchart of an information security delivery method in Embodiment 1;
图3是实施例一中“硬”密开关和“软”密开关示意图;3 is a schematic diagram of a "hard" switch and a "soft" switch in the first embodiment;
图4是实施例一中信息安全传递方法的流程图;4 is a flowchart of an information security delivery method in Embodiment 1;
图5是实施例二中发送终端的结构图;5 is a structural diagram of a transmitting terminal in Embodiment 2;
图6是实施例二中接收终端的结构图;6 is a structural diagram of a receiving terminal in Embodiment 2;
图7是实施例二中信息安全传递方法的流程图;7 is a flowchart of a method for information security transmission in Embodiment 2;
图8是实施例二中信息安全传递方法的流程图;8 is a flowchart of a method for information security transmission in Embodiment 2;
图9是应用示例中信息安全传递方法的流程图;9 is a flowchart of an information security delivery method in an application example;
图10是应用示例中底层安全模块控制应用的原理示意图;10 is a schematic diagram of a schematic diagram of an underlying security module control application in an application example;
图11是应用示例中开启安全模式(“密”模式)的操作示例图;11 is a diagram showing an example of an operation of turning on a security mode ("secret" mode) in an application example;
图12是应用示例中底层安全模块把用户输入转变成密文,返回给EditView的操作示例图;12 is an operation example diagram of an operation example in which an underlying security module converts user input into ciphertext and returns to EditView;
图13是应用示例中底层安全模块使用用户输入的密钥把密文解密,返回给TextView显示出来的示意图。 FIG. 13 is a schematic diagram of the application example in which the underlying security module decrypts the ciphertext using the key input by the user and returns it to the TextView for display.
本发明的实施方式Embodiments of the invention
下文中将结合附图对本申请的实施例进行详细说明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互任意组合。Embodiments of the present application will be described in detail below with reference to the accompanying drawings. It should be noted that, in the case of no conflict, the features in the embodiments and the embodiments in the present application may be arbitrarily combined with each other.
实施例一:Embodiment 1:
本实施例提供了一种信息安全传递系统,包括发送终端和接收终端,其中,如图1所示,所述发送终端包括:设置在终端底层框架中的底层安全模块、预先设置在终端的系统控件中的控制模块以及应用,所述应用可以是手机本身自带的短信,或者是邮件,也可能是用户下载的第三方应用,比如微信,QQ,其中:The embodiment provides an information security delivery system, including a transmitting terminal and a receiving terminal. As shown in FIG. 1 , the sending terminal includes: an underlying security module disposed in a bottom layer framework of the terminal, and a system preset in the terminal. The control module and the application in the control, the application may be a short message of the mobile phone itself, or an email, or a third-party application downloaded by the user, such as WeChat, QQ, where:
所述控制模块,设置为当所述应用的控件被触发时,拦截触发事件,并通知所述底层安全模块;在接收到所述底层安全模块返回的加密密文后传递给所述应用;The control module is configured to: when the control of the application is triggered, intercept the trigger event, and notify the underlying security module; and transmit the encrypted ciphertext returned by the underlying security module to the application;
其中,所述触发事件包括用户将要在应用的控件中添加信息;触发事件相关的信息为用户将要在应用的控件中添加的信息。The triggering event includes the user adding information to the control of the application; the information related to the triggering event is information that the user will add in the control of the application.
所述底层安全模块,设置为在收到所述控制模块的通知后,对所述触发事件相关的信息加密生成加密密文,将所述加密密文发送至所述控制模块;The underlying security module is configured to: after receiving the notification of the control module, encrypt the information related to the trigger event to generate an encrypted ciphertext, and send the encrypted ciphertext to the control module;
作为一种可选的方式,该发送终端还包括:As an optional manner, the sending terminal further includes:
启动模块,设置为提示终端用户是否开启安全模式,在接收到开启所述底层安全模块的请求后,开启安全模式,触发所述底层安全模块启动。The startup module is configured to prompt the terminal user whether to enable the security mode. After receiving the request to open the underlying security module, the security mode is started, and the bottom security module is triggered to be started.
其中,作为一种可选的方式,所述启动模块,设置为开启安全模式,触发所述底层安全模块启动,包括:In an optional manner, the startup module is configured to enable a security mode, and trigger the startup of the bottom security module, including:
提示所述终端用户输入安全模式开启密码;Prompting the terminal user to input a security mode open password;
确定接收到的所述终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,触发所述底层安全模块启动。After determining that the received security mode open password of the terminal user is consistent with the preset security mode open password, the bottom security module is triggered to be activated by verification.
其中,在本实施例中,在终端上预设了安全模式开启密码,用于开启安 全模式时的验证。In this embodiment, a security mode open password is preset on the terminal, and is used to enable security. Verification in full mode.
当然,终端上也可以不设置安全模式开启密码,启动模块在接收到开启所述底层安全模块的请求后,直接启动安全模式,不必用户输入密码,直接触发所述底层安全模块启动。Certainly, the security mode cannot be used to enable the password on the terminal. After receiving the request to enable the underlying security module, the startup module directly starts the security mode, and the user does not need to input a password to directly trigger the startup of the underlying security module.
所述应用,设置为将所述加密密文发送给接收终端。The application is configured to send the encrypted ciphertext to the receiving terminal.
其中,所述底层安全模块,设置为收到所述控制模块的通知后,对所述触发事件中相关的信息加密生成加密密文,包括:The underlying security module is configured to: after receiving the notification of the control module, encrypt and encrypt the related information in the trigger event to generate an encrypted ciphertext, including:
所述底层安全模块收到所述控制模块的通知后,向终端用户提示输入通信密钥,并接收所述终端用户输入的通信密钥,或者,获取本地存储的预设的通信密钥;After receiving the notification of the control module, the bottom security module prompts the terminal user to input a communication key, and receives the communication key input by the terminal user, or obtains a preset local communication key;
所述底层安全模块利用所述终端用户输入的通信密钥或所述本地存储的预设的通信密钥采用加密算法对所述用户将要在应用的控件中添加的信息加密,并添加加密标识或者添加所述加密算法的版本号和加密标识生成加密密文。The underlying security module encrypts information added by the user to the control of the application by using a communication key input by the terminal user or the locally stored preset communication key, and adds an encrypted identifier or Adding the version number of the encryption algorithm and the encrypted identifier to generate an encrypted ciphertext.
在本实施例中,一种可选的方式是需要用户输入通信密钥,根据该通信密钥加密,该方式的安全性比较高,另一种可选的方式是不需要用户输入通信密钥,而是在本地预设一个通信密钥,每次加密都用这个密钥,这种方式,对用户而言更为便利,用户无需每次都输入通信密钥。In this embodiment, an optional manner is required for the user to input a communication key, and the security of the method is relatively high according to the encryption of the communication key, and another optional manner is that the user does not need to input the communication key. Instead, a communication key is preset locally, and this key is used for each encryption. This method is more convenient for the user, and the user does not need to input the communication key every time.
其中,作为一种可选的方式,所述应用的控件包括编辑控件。Wherein, as an optional manner, the control of the application includes an edit control.
其中,如图1所示,所述接收终端,包括:设置在终端底层框架中的底层安全模块、预先设置在终端的系统控件中的控制模块以及应用,其中:As shown in FIG. 1 , the receiving terminal includes: an underlying security module disposed in a bottom layer framework of the terminal, a control module preset in a system control of the terminal, and an application, where:
所述控制模块,设置为当所述应用的控件被触发时,拦截触发事件,并通知所述底层安全模块;The control module is configured to intercept a trigger event when the control of the application is triggered, and notify the underlying security module;
所述底层安全模块,设置为收到所述控制模块的通知后,对所述触发事件相关的信息解密。The underlying security module is configured to decrypt the information related to the trigger event after receiving the notification from the control module.
所述应用,设置为接收到发送终端发来的信息,并提示用户触发所述应用的控件; The application is configured to receive information sent by the sending terminal, and prompt the user to trigger a control of the application;
所述触发事件包括终端用户读取所述应用的控件输出的所述发送终端发来的信息;触发事件相关的信息为所述应用的控件输出的所述发送终端发来的信息。The triggering event includes information sent by the sending terminal output by the terminal user to read the control of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application.
其中,作为一种可选的方式,该发送终端还包括与所述控制模块和所述底层安全模块相连的启动模块,其中:In an optional manner, the sending terminal further includes a startup module connected to the control module and the bottom security module, where:
所述控制模块,还设置为在拦截到触发事件时,触发所述启动模块工作;The control module is further configured to trigger the startup module to work when the trigger event is intercepted;
所述启动模块,设置为提示终端用户是否开启安全模式,在接收到所述终端用户开启安全模式的请求后,开启安全模式,触发所述底层安全模块启动。The startup module is configured to prompt the terminal user whether to enable the security mode. After receiving the request for the terminal user to enable the security mode, the security mode is started, and the bottom security module is triggered to be started.
其中,作为一种可选的方式,所述启动模块,设置为开启安全模式,触发所述底层安全模块启动,包括:In an optional manner, the startup module is configured to enable a security mode, and trigger the startup of the bottom security module, including:
提示所述终端用户输入安全模式开启密码;Prompting the terminal user to input a security mode open password;
确定接收到的所述终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,触发所述底层安全模块启动。After determining that the received security mode open password of the terminal user is consistent with the preset security mode open password, the bottom security module is triggered to be activated by verification.
其中,在本实施例中,在终端上预设了安全模式开启密码,用于开启安全模式时的验证。In this embodiment, the security mode open password is preset on the terminal, and is used for verifying when the security mode is enabled.
当然,终端上也可以不设置安全模式开启密码,启动模块在接收到开启所述底层安全模块的请求后,直接启动安全模式,不必用户输入密码,直接触发所述底层安全模块启动。Certainly, the security mode cannot be used to enable the password on the terminal. After receiving the request to enable the underlying security module, the startup module directly starts the security mode, and the user does not need to input a password to directly trigger the startup of the underlying security module.
其中,所述应用的控件输出的所述发送终端发来的信息包括:加密信息和加密标识,或者加密信息、加密算法的版本号和加密标识;The information sent by the sending terminal output by the control of the application includes: an encryption information and an encryption identifier, or an encryption information, a version number of the encryption algorithm, and an encryption identifier;
其中,所述底层安全模块,设置为收到所述控制模块的通知后,对所述触发事件相关的信息解密,包括:The underlying security module is configured to decrypt the information related to the trigger event after receiving the notification of the control module, including:
所述底层安全模块在用户读取应用的控件输出的所述发送终端发来的信息时,识别出所述加密标识后,向终端用户提示输入通信密钥,并接收所述终端用户输入的通信密钥,或者,识别出所述加密标识后,获取本地存储的预设的通信密钥; When the user reads the information sent by the sending terminal of the control output of the application, the bottom security module prompts the terminal user to input the communication key and receives the communication input by the terminal user after identifying the encrypted identifier. Key, or, after identifying the encrypted identifier, acquiring a preset local communication key;
所述底层安全模块利用所述终端用户输入的通信密钥或者所述本地存储的预设的通信密钥,采用预设的加密算法或所述加密算法的版本号对应的加密算法对所述加密信息解密,向用户展示解密后的信息的明文。The underlying security module uses the communication key input by the terminal user or the locally stored preset communication key to encrypt the encryption by using a preset encryption algorithm or an encryption algorithm corresponding to the version number of the encryption algorithm. The information is decrypted, and the plaintext of the decrypted information is displayed to the user.
在本实施例中,一种可选的方式是需要用户输入通信密钥,根据该通信密钥加密,该方式的安全性比较高,另一种可选的方式是不需要用户输入通信密钥,而是在本地预设一个通信密钥,每次加密都用这个密钥,这种方式,对用户而言更为便利,用户无需每次都输入通信密钥。In this embodiment, an optional manner is required for the user to input a communication key, and the security of the method is relatively high according to the encryption of the communication key, and another optional manner is that the user does not need to input the communication key. Instead, a communication key is preset locally, and this key is used for each encryption. This method is more convenient for the user, and the user does not need to input the communication key every time.
其中,作为一种可选的方式,所述应用的控件包括显示控件。Wherein, as an optional manner, the control of the application includes a display control.
如图2所示,本实施例提供了一种信息安全传递方法,包括以下步骤:As shown in FIG. 2, this embodiment provides an information security delivery method, including the following steps:
S101:在终端的系统控件中预先设置控制模块;S101: preset a control module in a system control of the terminal;
由于应用的控件均是从系统控件继承而来的自定义控件,因此,当在系统控件中预置控制模块后,该控制模块也会被应用的控件继承下来,即,应用的控件中也存在控制模块,因此,控制模块可以拦截应用的触发事件。Since the control of the application is a custom control inherited from the system control, when the control module is preset in the system control, the control module is also inherited by the applied control, that is, the application control also exists. The control module, therefore, the control module can intercept the trigger event of the application.
S102:当所述终端的应用的控件被触发时,所述控制模块拦截触发事件,并通知所述终端的底层安全模块;S102: When a control of an application of the terminal is triggered, the control module intercepts a trigger event and notifies an underlying security module of the terminal;
其中,所述触发事件包括用户将要在应用的控件中添加信息;触发事件相关的信息为用户将要在应用的控件中添加的信息,所述添加的信息可以是文字信息。The triggering event includes that the user adds information to the control of the application; the information related to the triggering event is information that the user adds to the control of the application, and the added information may be text information.
其中,所述应用的控件包括编辑(EditView)控件,是从系统编辑控件继承而来的自定义控件。The control of the application includes an EditView control, which is a custom control inherited from the system edit control.
所述终端可以是触摸屏智能终端也可以是普通按键终端,所述触发应用的控件是指用户点击或按下该控件的按钮。The terminal may be a touch screen smart terminal or a normal button terminal, and the control for triggering the application refers to a button for the user to click or press the control.
S103:所述底层安全模块收到所述控制模块的通知后,对所述触发事件相关的信息加密生成加密密文;S103: After receiving the notification by the control module, the bottom security module encrypts the information related to the trigger event to generate an encrypted ciphertext;
其中,在本实施例中,作为一种可选的方式,可以在终端上设置“密” 模式,即前面提到的安全模式,可打开/关闭,打开时,即所述底层安全模块开启,底层安全模块就会接管应用的控件,就是说用户对应用的控件的触发事件不再传递给应用,而是优先由底层安全模块处理。反之,在关闭“密”模式后,即所述底层安全模块关闭,用户对应用的控件的触发事件会正常的传递给第三方处理。为了打开/关闭“密”模式,需要有一个开关,我们称之为“密”开关。它可以是一个终端上真实存在的按键(本文称作硬“密”按钮),如图3(a)所示,也可以是悬浮在屏幕上的虚拟按键(本文称作软“密”按钮)如图3(b)所示。In this embodiment, as an optional manner, "tight" can be set on the terminal. The mode, that is, the security mode mentioned above, can be turned on/off. When it is opened, the underlying security module is opened, and the underlying security module takes over the control of the application, that is, the trigger event of the user's control of the application is no longer transmitted to The application is prioritized by the underlying security module. Conversely, after the "closed" mode is turned off, that is, the underlying security module is closed, the trigger event of the user's control of the application is normally transmitted to the third party for processing. In order to turn "closed" mode on/off, a switch is required, which we call a "closed" switch. It can be a real button on the terminal (herein referred to as a hard "close" button), as shown in Figure 3 (a), or a virtual button suspended on the screen (referred to herein as a soft "close" button) As shown in Figure 3 (b).
其中,打开该安全模式,包括:Among them, open the security mode, including:
提示终端用户是否开启安全模式,在接收到所述终端用户开启安全模式的请求后,开启安全模式,触发所述底层安全模块启动。The terminal user is prompted to enable the security mode, and after receiving the request of the terminal user to enable the security mode, the security mode is enabled, and the bottom security module is triggered to be started.
其中,作为一种可选的方式,所述开启安全模式,触发所述底层安全模块启动,包括:In an optional manner, the security mode is started, and the bottom security module is triggered to be started, including:
提示所述终端用户输入安全模式开启密码;Prompting the terminal user to input a security mode open password;
确定接收到的所述终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,触发所述底层安全模块启动。After determining that the received security mode open password of the terminal user is consistent with the preset security mode open password, the bottom security module is triggered to be activated by verification.
其中,在本实施例中,在终端上预设了安全模式开启密码,用于开启安全模式时的验证。In this embodiment, the security mode open password is preset on the terminal, and is used for verifying when the security mode is enabled.
当然,终端上也可以不设置安全模式开启密码,启动模块在接收到开启所述底层安全模块的请求后,直接启动安全模式,不必用户输入密码,直接触发所述底层安全模块启动。Certainly, the security mode cannot be used to enable the password on the terminal. After receiving the request to enable the underlying security module, the startup module directly starts the security mode, and the user does not need to input a password to directly trigger the startup of the underlying security module.
其中,作为一种可选的方式,所述底层安全模块收到所述控制模块的通知后,对所述触发事件中相关的信息加密生成加密密文,包括:In an optional manner, after receiving the notification by the control module, the underlying security module encrypts the information related to the trigger event to generate an encrypted ciphertext, including:
所述底层安全模块收到所述控制模块的通知后,向终端用户提示输入通信密钥,并接收所述终端用户输入的通信密钥;其中,通信的双方应当事先使用其他方式告诉对方通信密钥,比如说通过口头约定的方式,或者,获取本地存储的预设的通信密钥; After receiving the notification of the control module, the bottom security module prompts the terminal user to input a communication key, and receives a communication key input by the terminal user; wherein the two parties of the communication should use other methods to inform the other party of the communication secret in advance. The key, for example, by means of a verbal agreement, or obtaining a preset communication key stored locally;
所述底层安全模块利用所述终端用户输入的通信密钥或所述本地存储的预设的通信密钥采用加密算法对所述用户将要在应用的控件中添加的信息加密,并添加加密标识或者添加所述加密算法的版本号和加密标识生成加密密文。The underlying security module encrypts information added by the user to the control of the application by using a communication key input by the terminal user or the locally stored preset communication key, and adds an encrypted identifier or Adding the version number of the encryption algorithm and the encrypted identifier to generate an encrypted ciphertext.
可选地,所述底层安全模块利用所述通信密钥采用加密算法对所述用户将要在应用的控件中添加的信息加密生成第一加密密文,第一加密密文是一组字符串,在该字符串前或后添加加密标识(例如,掌心密语:),或者在所述第一加密密文前或后添加所述加密算法的版本号(接收方可以根据该版本号对应的加密算法对加密密文解密)后转化为一组字符串,在该字符串前或后添加加密标识生成最终的加密密文。例如,“掌心密语:AAE=V1dWW1pZ4qXYMrFLTIYhH7nGF44m2w==”,其中,“掌心密语:”是加密标识,“AAE=”是加密算法的版本号,“V1dWW1pZ4qXYMrFLTIYhH7nGF44m2w==”是真正的密文,明文是“你好”。Optionally, the underlying security module uses the encryption key to encrypt, by using an encryption algorithm, the information that the user adds in the control of the application to generate the first encrypted ciphertext, where the first encrypted ciphertext is a set of characters. Adding an encryption identifier (for example, a palm whisper:) before or after the character string, or adding a version number of the encryption algorithm before or after the first encrypted ciphertext (the encryption algorithm corresponding to the version number of the receiver may be received by the receiver) After decrypting the encrypted ciphertext, it is converted into a set of strings, and an encrypted identifier is added before or after the string to generate a final encrypted ciphertext. For example, "palm whisper: AAE=V1dWW1pZ4qXYMrFLTIYhH7nGF44m2w==", where "palm whisper:" is the encrypted identifier, "AAE=" is the version number of the encryption algorithm, "V1dWW1pZ4qXYMrFLTIYhH7nGF44m2w==" is the real ciphertext, and the plaintext is "you it is good".
在本实施例中,一种可选的方式是需要用户输入通信密钥,根据该通信密钥加密,该方式的安全性比较高,另一种可选的方式是不需要用户输入通信密钥,而是在本地预设一个通信密钥,每次加密都用这个密钥,这种方式,对用户而言更为便利,用户无需每次都输入通信密钥。In this embodiment, an optional manner is required for the user to input a communication key, and the security of the method is relatively high according to the encryption of the communication key, and another optional manner is that the user does not need to input the communication key. Instead, a communication key is preset locally, and this key is used for each encryption. This method is more convenient for the user, and the user does not need to input the communication key every time.
S104:所述控制模块将所述加密密文通过所述应用发送给接收终端。S104: The control module sends the encrypted ciphertext to the receiving terminal by using the application.
本发明实施例还提供了一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行上述的方法。The embodiment of the invention further provides a computer storage medium, wherein the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the above method.
如图4所示,本实施例提供了一种信息安全传递方法,包括以下步骤:As shown in FIG. 4, this embodiment provides an information security delivery method, including the following steps:
S201:在终端的系统控件中预先设置控制模块;S201: preset a control module in a system control of the terminal;
与步骤S101相同,此处不再赘述。The same as step S101, and details are not described herein again.
S202:当所述终端的应用的控件被触发时,所述控制模块拦截触发事件, 并通知所述终端的底层安全模块;S202: When a control of an application of the terminal is triggered, the control module intercepts a trigger event, And notifying the underlying security module of the terminal;
其中,在步骤S202之前,所述方法还包括:所述应用接收到发送终端发来的信息,并提示用户触发所述终端的应用的控件;例如,向用户显示以掌心密语开头的字符串,例如,“掌心密语:FImG6DpTAF2acmMMF==”,提示用户该信息已经被加密,需用户开启“密”模式(即安全模式),即开启终端的底层安全模块来解密;具体包括:提示终端用户是否开启安全模式,在接收到所述终端用户开启安全模式的请求后,开启安全模式,触发所述底层安全模块启动。Before the step S202, the method further includes: the application receiving the information sent by the sending terminal, and prompting the user to trigger a control of the application of the terminal; for example, displaying a character string beginning with a palm cipher to the user, For example, "palm whisper: FImG6DpTAF2acmMMF==", prompting the user that the information has been encrypted, the user needs to enable the "closed" mode (ie, the security mode), that is, the underlying security module of the terminal is opened for decryption; specifically: prompting the terminal user whether to open In the security mode, after receiving the request of the terminal user to enable the security mode, the security mode is started, and the bottom security module is triggered to be started.
其中,作为一种可选的方式,所述开启安全模式,触发所述底层安全模块启动,包括:In an optional manner, the security mode is started, and the bottom security module is triggered to be started, including:
提示所述终端用户输入安全模式开启密码;Prompting the terminal user to input a security mode open password;
确定接收到的所述终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,触发所述底层安全模块启动。After determining that the received security mode open password of the terminal user is consistent with the preset security mode open password, the bottom security module is triggered to be activated by verification.
其中,在本实施例中,在终端上预设了安全模式开启密码,用于开启安全模式时的验证。In this embodiment, the security mode open password is preset on the terminal, and is used for verifying when the security mode is enabled.
当然,终端上也可以不设置安全模式开启密码,启动模块在接收到开启所述底层安全模块的请求后,直接启动安全模式,不必用户输入密码,直接触发所述底层安全模块启动。Certainly, the security mode cannot be used to enable the password on the terminal. After receiving the request to enable the underlying security module, the startup module directly starts the security mode, and the user does not need to input a password to directly trigger the startup of the underlying security module.
其中,所述触发事件包括终端用户读取所述应用的控件输出的所述发送终端发来的信息;触发事件相关的信息为所述应用的控件输出的所述发送终端发来的信息,所述输出的信息为文字信息。The triggering event includes: the terminal user reads information sent by the sending terminal of the control output of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application, where The information outputted is text information.
其中,所述应用的控件包括显示(TextView)控件,是从系统显示控件继承而来的自定义控件。The control of the application includes a display (TextView) control, which is a custom control inherited from the system display control.
S203:所述底层安全模块收到所述控制模块的通知后,对所述触发事件相关的信息解密。S203: After receiving the notification by the control module, the bottom security module decrypts the information related to the trigger event.
其中,所述应用的控件输出的所述发送终端发来的信息包括:加密标识和加密信息,或者加密标识、加密算法的版本号和加密信息; The information sent by the sending terminal output by the control of the application includes: an encryption identifier and an encryption information, or an encryption identifier, a version number of the encryption algorithm, and encryption information;
所述底层安全模块收到所述控制模块的通知后,对所述触发事件相关的信息解密,包括:After receiving the notification by the control module, the underlying security module decrypts the information related to the trigger event, including:
所述底层安全模块在用户读取应用的控件输出的所述发送终端发来的信息时,识别出所述加密标识后,向终端用户提示输入通信密钥,并接收所述终端用户输入的通信密钥,或者,识别出所述加密标识后,获取本地存储的预设的通信密钥;When the user reads the information sent by the sending terminal of the control output of the application, the bottom security module prompts the terminal user to input the communication key and receives the communication input by the terminal user after identifying the encrypted identifier. Key, or, after identifying the encrypted identifier, acquiring a preset local communication key;
所述底层安全模块利用所述终端用户输入的通信密钥或者所述本地存储的预设的通信密钥,采用预设的加密算法或所述加密算法的版本号对应的加密算法对所述加密信息解密,向用户展示解密后的信息的明文。The underlying security module uses the communication key input by the terminal user or the locally stored preset communication key to encrypt the encryption by using a preset encryption algorithm or an encryption algorithm corresponding to the version number of the encryption algorithm. The information is decrypted, and the plaintext of the decrypted information is displayed to the user.
在本实施例中,一种可选的方式是需要用户输入通信密钥,根据该通信密钥加密,该方式的安全性比较高,另一种可选的方式是不需要用户输入通信密钥,而是在本地预设一个通信密钥,每次加密都用这个密钥,这种方式,对用户而言更为便利,用户无需每次都输入通信密钥。In this embodiment, an optional manner is required for the user to input a communication key, and the security of the method is relatively high according to the encryption of the communication key, and another optional manner is that the user does not need to input the communication key. Instead, a communication key is preset locally, and this key is used for each encryption. This method is more convenient for the user, and the user does not need to input the communication key every time.
本发明实施例还提供了一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行上述的方法。The embodiment of the invention further provides a computer storage medium, wherein the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the above method.
实施例二:Embodiment 2:
本实施例还提供了一种信息安全传递系统,包括发送终端和接收终端,其中,如图5所示,本实施例提供了一种发送终端,包括:The embodiment further provides an information security delivery system, including a transmitting terminal and a receiving terminal. The embodiment provides a sending terminal, as shown in FIG.
检测模块,设置为检测应用的控件被触发的触发事件;a detection module configured to detect a trigger event triggered by an application's control;
其中,所述触发事件包括用户将要在应用的控件中添加信息;触发事件相关的信息为用户将要在应用的控件中添加的信息。其中,所述应用的控件包括编辑(EditView)控件,是从系统编辑控件继承而来的自定义控件。The triggering event includes the user adding information to the control of the application; the information related to the triggering event is information that the user will add in the control of the application. The control of the application includes an EditView control, which is a custom control inherited from the system edit control.
加密模块,设置为在检测应用的控件被触发的触发事件后,对所述触发事件相关的信息加密生成加密密文;The encryption module is configured to: after detecting a trigger event triggered by the control of the application, encrypting information related to the trigger event to generate an encrypted ciphertext;
应用,设置为将所述加密密文发送给接收终端。 The application is configured to send the encrypted ciphertext to the receiving terminal.
所述应用可以是手机本身自带的短信,或者是邮件,也可能是用户下载的第三方应用,比如微信,QQ。The application may be a short message provided by the mobile phone itself, or an email, or may be a third-party application downloaded by the user, such as WeChat, QQ.
作为一种可选的方式,本实施例的发送终端还包括:As an optional manner, the sending terminal of this embodiment further includes:
启动模块,设置为提示终端用户是否开启安全模式,在接收到所述终端用户开启安全模式的请求后,开启安全模式,触发所述加密模块启动。The startup module is configured to prompt the terminal user whether to enable the security mode. After receiving the request of the terminal user to enable the security mode, the security mode is started, and the encryption module is triggered to be started.
其中,作为一种可选的方式,所述启动模块,设置为开启安全模式,触发所述加密模块启动,包括:In an optional manner, the startup module is configured to enable a security mode, and trigger the activation of the encryption module, including:
提示所述终端用户输入安全模式开启密码;Prompting the terminal user to input a security mode open password;
确定接收到的所述终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,开启安全模式,触发所述加密模块启动。After determining that the received security mode open password of the terminal user is consistent with the preset security mode open password, the security mode is triggered by the verification, and the encryption module is triggered to start.
其中,在本实施例中,在终端上预设了安全模式开启密码,用于开启安全模式时的验证。In this embodiment, the security mode open password is preset on the terminal, and is used for verifying when the security mode is enabled.
当然,终端上也可以不设置安全模式开启密码,启动模块在接收到开启所述底层安全模块的请求后,直接启动安全模式,不必用户输入密码,直接触发所述底层安全模块启动。Certainly, the security mode cannot be used to enable the password on the terminal. After receiving the request to enable the underlying security module, the startup module directly starts the security mode, and the user does not need to input a password to directly trigger the startup of the underlying security module.
其中,所述加密模块,设置为在检测应用的控件被触发的触发事件后,对所述触发事件相关的信息加密生成加密密文,包括:The encryption module is configured to: after detecting a trigger event triggered by the control of the application, encrypting the information related to the trigger event to generate an encrypted ciphertext, including:
在所述检测模块检测应用的控件被触发的触发事件后,所述加密模块向终端用户提示输入通信密钥,并接收所述终端用户输入的通信密钥,或者,获取本地存储的预设的通信密钥;After the detecting module detects a trigger event triggered by the application control, the encryption module prompts the terminal user to input a communication key, and receives a communication key input by the terminal user, or obtains a preset stored locally. Communication key
利用所述终端用户输入的通信密钥或所述本地存储的预设的通信密钥采用加密算法对所述用户将要在所述应用的控件中添加的信息加密,并添加加密标识或者添加所述加密算法的版本号和加密标识生成加密密文。Encrypting information added by the user to the control of the application by using a communication key input by the terminal user or the locally stored preset communication key, and adding an encrypted identifier or adding the information The version number of the encryption algorithm and the encrypted identifier generate an encrypted ciphertext.
在本实施例中,一种可选的方式是需要用户输入通信密钥,根据该通信密钥加密,该方式的安全性比较高,另一种可选的方式是不需要用户输入通信密钥,而是在本地预设一个通信密钥,每次加密都用这个密钥,这种方式,对用户而言更为便利,用户无需每次都输入通信密钥。 In this embodiment, an optional manner is required for the user to input a communication key, and the security of the method is relatively high according to the encryption of the communication key, and another optional manner is that the user does not need to input the communication key. Instead, a communication key is preset locally, and this key is used for each encryption. This method is more convenient for the user, and the user does not need to input the communication key every time.
如图6所示,本实施例提供了一种发送终端,包括:检测模块、解密模块以及应用,其中:As shown in FIG. 6, the embodiment provides a sending terminal, including: a detecting module, a decrypting module, and an application, where:
所述检测模块,设置为检测应用的控件被触发的触发事件;The detecting module is configured to detect a trigger event triggered by an application control;
所述解密模块,设置为在检测应用的控件被触发的触发事件后,对所述触发事件相关的信息解密。The decryption module is configured to decrypt the information related to the trigger event after detecting a trigger event triggered by the application's control.
所述应用,设置为接收到发送终端发来的信息后,提示用户触发所述应用的控件;The application is configured to prompt the user to trigger a control of the application after receiving the information sent by the sending terminal;
其中,所述触发事件包括终端用户读取所述应用的控件输出的所述发送终端发来的信息;触发事件相关的信息为所述应用的控件输出的所述发送终端发来的信息。The triggering event includes information sent by the sending terminal output by the terminal user to read the control of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application.
其中,所述应用的控件包括显示(TextView)控件,是从系统显示控件继承而来的自定义控件。The control of the application includes a display (TextView) control, which is a custom control inherited from the system display control.
作为一种可选的方式,本接收终端还包括与所述检测模块和所述解密模块相连的启动模块,其中:In an optional manner, the receiving terminal further includes a startup module connected to the detecting module and the decrypting module, where:
所述检测模块,还设置为在检测所述触发事件时,触发所述启动模块工作;The detecting module is further configured to trigger the startup module to work when detecting the triggering event;
所述启动模块,设置为提示终端用户是否开启安全模式,在接收到所述终端用户开启安全模式的请求后,开启安全模式,触发所述解密模块启动。The startup module is configured to prompt the terminal user whether to enable the security mode. After receiving the request of the terminal user to enable the security mode, the security mode is started, and the decryption module is triggered to be started.
其中,作为一种可选的方式,所述启动模块,设置为开启安全模式,触发所述解密模块启动,包括:In an optional manner, the startup module is configured to enable a security mode, and trigger the decryption module to be started, including:
提示所述终端用户输入安全模式开启密码;Prompting the terminal user to input a security mode open password;
确定接收到的所述终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,触发所述解密模块启动。After determining that the received security mode open password of the terminal user is consistent with the preset security mode open password, the decryption module is triggered to be activated by verification.
其中,在本实施例中,在终端上预设了安全模式开启密码,用于开启安全模式时的验证。 In this embodiment, the security mode open password is preset on the terminal, and is used for verifying when the security mode is enabled.
当然,终端上也可以不设置安全模式开启密码,启动模块在接收到开启所述底层安全模块的请求后,直接启动安全模式,不必用户输入密码,直接触发所述底层安全模块启动。Certainly, the security mode cannot be used to enable the password on the terminal. After receiving the request to enable the underlying security module, the startup module directly starts the security mode, and the user does not need to input a password to directly trigger the startup of the underlying security module.
其中,所述应用的控件输出的所述发送终端发来的信息包括:加密标识和加密信息,或者加密标识、加密算法的版本号和加密信息;The information sent by the sending terminal output by the control of the application includes: an encryption identifier and an encryption information, or an encryption identifier, a version number of the encryption algorithm, and encryption information;
所述解密模块,设置为在检测应用的控件被触发的触发事件后,对所述触发事件相关的信息解密,包括:The decryption module is configured to decrypt the information related to the trigger event after detecting a trigger event that the control of the application is triggered, including:
在所述检测模块检测应用的控件被触发的触发事件后,所述解密模块识别出加密标识后,向终端用户提示输入通信密钥,并接收所述终端用户输入的通信密钥,或者,识别出所述加密标识后,获取本地存储的预设的通信密钥;After the detecting module detects the trigger event triggered by the application control, after the decryption module identifies the encrypted identifier, the decryption module prompts the terminal user to input the communication key, and receives the communication key input by the terminal user, or identifies After the encrypted identifier is obtained, obtaining a preset communication key stored locally;
利用所述终端用户输入的通信密钥或者所述本地存储的预设的通信密钥,采用预设的加密算法或所述加密算法的版本号对应的加密算法对所述加密信息解密,向用户展示解密后的信息的明文。Decrypting the encrypted information by using a preset encryption algorithm or an encryption algorithm corresponding to a version number of the encryption algorithm by using a communication key input by the terminal user or the locally stored preset communication key, to the user Show the plain text of the decrypted information.
在本实施例中,一种可选的方式是需要用户输入通信密钥,根据该通信密钥加密,该方式的安全性比较高,另一种可选的方式是不需要用户输入通信密钥,而是在本地预设一个通信密钥,每次加密都用这个密钥,这种方式,对用户而言更为便利,用户无需每次都输入通信密钥。In this embodiment, an optional manner is required for the user to input a communication key, and the security of the method is relatively high according to the encryption of the communication key, and another optional manner is that the user does not need to input the communication key. Instead, a communication key is preset locally, and this key is used for each encryption. This method is more convenient for the user, and the user does not need to input the communication key every time.
如图7所示,本实施例提供了一种信息安全传递方法,包括以下步骤:As shown in FIG. 7, the embodiment provides an information security delivery method, including the following steps:
S301:终端检测到应用的控件被触发的触发事件;S301: The terminal detects that the application's control is triggered by a trigger event.
其中,所述触发事件包括用户将要在应用的控件中添加信息;所述触发事件相关的信息为用户将要在应用的控件中添加的信息。The triggering event includes that the user is to add information to the control of the application; the information related to the triggering event is information that the user will add in the control of the application.
所述应用的控件包括编辑(EditView)控件,是从系统编辑控件继承而来的自定义控件。所述应用可以是手机本身自带的短信,或者是邮件,也可能是用户下载的第三方应用,比如微信,QQ。The application's controls include an EditView control, which is a custom control inherited from the system edit control. The application may be a short message provided by the mobile phone itself, or an email, or may be a third-party application downloaded by the user, such as WeChat, QQ.
S302:终端对所述触发事件相关的信息加密生成加密密文; S302: The terminal encrypts the information related to the trigger event to generate an encrypted ciphertext.
其中,所述终端检测到应用的控件被触发的触发事件后,对所述触发事件相关的信息加密生成加密密文,包括:After the terminal detects that the trigger of the application is triggered, the terminal encrypts the information related to the trigger event to generate an encrypted ciphertext, including:
所述终端检测到应用的控件被触发的触发事件后,向终端用户提示输入通信密钥,并接收所述终端用户输入的通信密钥,或者,获取本地存储的预设的通信密钥;After detecting, by the terminal, a trigger event triggered by the application, the terminal prompts the terminal user to input a communication key, and receives the communication key input by the terminal user, or obtains a preset local communication key;
利用所述终端用户输入的通信密钥或所述本地存储的预设的通信密钥采用加密算法对所述用户将要在应用的控件中添加的信息加密,并添加加密标识或者添加所述加密算法的版本号和加密标识生成加密密文。Encrypting information added by the user to the control of the application by using a communication key input by the terminal user or the locally stored preset communication key, and adding an encryption identifier or adding the encryption algorithm The version number and the encrypted identifier generate an encrypted ciphertext.
在本实施例中,一种可选的方式是需要用户输入通信密钥,根据该通信密钥加密,该方式的安全性比较高,另一种可选的方式是不需要用户输入通信密钥,而是在本地预设一个通信密钥,每次加密都用这个密钥,这种方式,对用户而言更为便利,用户无需每次都输入通信密钥。In this embodiment, an optional manner is required for the user to input a communication key, and the security of the method is relatively high according to the encryption of the communication key, and another optional manner is that the user does not need to input the communication key. Instead, a communication key is preset locally, and this key is used for each encryption. This method is more convenient for the user, and the user does not need to input the communication key every time.
S303:终端将所述加密密文通过所述应用发送给接收终端。S303: The terminal sends the encrypted ciphertext to the receiving terminal by using the application.
其中,作为一种可选的方式,在步骤S302所述对所述触发事件相关的信息加密生成加密密文之前,所述方法还包括:The method further includes: before the encrypting the information related to the trigger event to generate the encrypted ciphertext, as described in the step S302, the method further includes:
提示终端用户是否开启安全模式,在接收到所述终端用户开启安全模式的请求后,开启安全模式。The terminal user is prompted to enable the security mode, and after receiving the request of the terminal user to open the security mode, the security mode is enabled.
其中,开启安全模式即指可以对所述触发事件相关的信息加密生成加密密文了。The security mode is enabled, that is, the information related to the trigger event can be encrypted to generate an encrypted ciphertext.
其中,作为一种可选的方式,所述开启安全模式,包括:Wherein, as an optional manner, the opening the security mode includes:
提示所述终端用户输入安全模式开启密码;Prompting the terminal user to input a security mode open password;
确定接收到的所述终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,开启安全模式。After determining that the received security mode open password of the terminal user is consistent with the preset security mode open password, the security mode is enabled through verification.
其中,在本实施例中,在终端上预设了安全模式开启密码,用于开启安全模式时的验证。In this embodiment, the security mode open password is preset on the terminal, and is used for verifying when the security mode is enabled.
当然,终端上也可以不设置安全模式开启密码,启动模块在接收到开启 所述底层安全模块的请求后,直接启动安全模式,不必用户输入密码,直接触发所述底层安全模块启动。Of course, the security mode can also be used to enable the password on the terminal, and the startup module is enabled to open. After the request of the underlying security module, the security mode is directly started, and the underlying security module is directly triggered to be triggered without the user inputting a password.
本发明实施例还提供了一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行上述的方法。The embodiment of the invention further provides a computer storage medium, wherein the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the above method.
如图8所示,本实施例提供了一种信息安全传递方法,包括以下步骤:As shown in FIG. 8, the embodiment provides an information security delivery method, including the following steps:
S401:终端检测到应用的控件被触发的触发事件;S401: The terminal detects a trigger event that is triggered by an application control.
其中,在所述终端检测到应用的控件被触发的触发事件前,所述方法还包括:所述应用接收到发送终端发来的信息,并提示用户触发所述应用的控件;The method further includes: before the terminal detects a trigger event that the control of the application is triggered, the method further includes: the application receiving the information sent by the sending terminal, and prompting the user to trigger the control of the application;
所述触发事件包括终端用户读取所述应用的控件输出的所述发送终端发来的信息;所述触发事件相关的信息为所述应用的控件输出的所述发送终端发来的信息。The triggering event includes information sent by the sending terminal output by the terminal user to read the control of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application.
其中,作为一种可选的方式,在所述终端检测到应用的控件被触发的触发事件时,所述方法还包括:The method further includes: when the terminal detects a trigger event that the control of the application is triggered, the method further includes:
提示终端用户是否开启安全模式,在接收到所述终端用户开启安全模式的请求后,开启安全模式。The terminal user is prompted to enable the security mode, and after receiving the request of the terminal user to open the security mode, the security mode is enabled.
其中,作为一种可选的方式,所述开启安全模式,包括:Wherein, as an optional manner, the opening the security mode includes:
提示所述终端用户输入安全模式开启密码;Prompting the terminal user to input a security mode open password;
确定接收到的所述终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,开启安全模式。其中,开启安全模式,即指可以执行步骤S402进行解密。After determining that the received security mode open password of the terminal user is consistent with the preset security mode open password, the security mode is enabled through verification. The security mode is enabled, that is, the decryption may be performed in step S402.
S402:终端对所述触发事件相关的信息解密。S402: The terminal decrypts the information related to the trigger event.
其中,所述应用的控件输出的所述发送终端发来的信息包括:加密标识和加密信息,或者加密标识、加密算法的版本号和加密信息; The information sent by the sending terminal output by the control of the application includes: an encryption identifier and an encryption information, or an encryption identifier, a version number of the encryption algorithm, and encryption information;
所述终端检测到应用的控件被触发的触发事件后,对所述触发事件相关的信息解密,包括:After the terminal detects that the control of the application is triggered, the terminal decrypts the information related to the trigger event, including:
所述终端检测到用户读取应用的控件输出的所述发送终端发来的信息时,识别出所述加密标识后,向终端用户提示输入通信密钥,并接收所述终端用户输入的通信密钥,或者,识别出所述加密标识后,获取本地存储的预设的通信密钥;When the terminal detects that the user reads the information sent by the sending terminal of the application control, after identifying the encrypted identifier, the terminal prompts the terminal user to input a communication key, and receives the communication secret input by the terminal user. Key, or, after identifying the encrypted identifier, acquiring a preset communication key stored locally;
利用所述终端用户输入的通信密钥或者所述本地存储的预设的通信密钥,采用预设的加密算法或所述加密算法的版本号对应的加密算法对所述加密信息解密,向用户展示解密后的信息的明文。Decrypting the encrypted information by using a preset encryption algorithm or an encryption algorithm corresponding to a version number of the encryption algorithm by using a communication key input by the terminal user or the locally stored preset communication key, to the user Show the plain text of the decrypted information.
本发明实施例还提供了一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行上述的方法。The embodiment of the invention further provides a computer storage medium, wherein the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the above method.
下面在一个应用示例中对本实施例进一步详细描述。This embodiment will be described in further detail below in an application example.
在本应用示例中,以应用的控件包括TextView(显示)控件和EditView(编辑)控件,加密标识为“掌心密语:”,且已经开启安全模式为例,图9是本应用示例信息安全传递方法的流程示意图,如图9所示,包括以下步骤:In this application example, the application control includes a TextView (display) control and an EditView (edit) control, the encryption identifier is "palm whisper:", and the security mode has been turned on as an example, and FIG. 9 is an information security transfer method of the application example. The schematic diagram of the process, as shown in Figure 9, includes the following steps:
S301:用户A和B为通信的双方,A和B使用除双方将要进行秘密通信的渠道之外的其他方式告诉了对方本次通信密钥;S301: User A and B are both parties of communication, and A and B tell the other party the communication key by using a method other than the channel in which the two parties are to perform secret communication;
S302:用户A向终端A输入明文;S302: User A inputs the plaintext to terminal A.
S303:终端的底层安全模块先于应用截获该明文,提示用户输入通信密钥,用户A输入与B约定的通信密钥;S303: The bottom security module of the terminal intercepts the plaintext before the application, prompting the user to input a communication key, and the user A inputs a communication key agreed with the B;
S304:底层安全模块将经过加密处理后的密文发送给应用;S304: The bottom security module sends the encrypted ciphertext to the application.
该加密处理后的密文包括:对明文加密后的信息和加密标识,或者对明文加密后的信息、加密算法的版本号和加密标识。此时,应用获得的是密文;The encrypted ciphertext includes: information encrypted in plaintext and an encrypted identifier, or information encrypted in plaintext, a version number of the encryption algorithm, and an encrypted identifier. At this point, the application obtains the ciphertext;
S305:应用将密文存入终端本地内存中;S305: The application stores the ciphertext in the local memory of the terminal.
终端本地内存存储应用收到和发送出去的通信信息,但由于应用获得的 是密文,所以本地内存中存储的也是密文;The terminal local memory stores the communication information received and sent by the application, but is obtained by the application. Is cipher text, so the local memory is also stored in cipher text;
S306:应用的网络服务器,终端A上的应用将密文发送给应用的网络服务器,应用的网络服务器将密文转发给终端B上的应用;S306: The application network server, the application on the terminal A sends the ciphertext to the application network server, and the application network server forwards the ciphertext to the application on the terminal B;
同样的,应用的网络服务器会将密文存储在网络侧的本地存储中。显然,网络侧的本地存储中存储的也是密文。Similarly, the application's web server stores the ciphertext in local storage on the network side. Obviously, the cryptographic text is also stored in the local storage on the network side.
S307:终端B上的应用收到密文后,存入终端B上的本地内存,并显示给用户B看,会向用户B显示一串字符串“掌心密语:FImG6DpTAF2acmMMF==”;S307: After receiving the ciphertext, the application on the terminal B stores the local memory on the terminal B and displays it to the user B, and displays a string of characters “palm cipher: FImG6DpTAF2acmMMF==” to the user B;
其中,“掌心密语:”是加密标识,用户看到后也可以知道收到的信息是密文。很明显,终端B上的本地内存中存储的也是密文。Among them, "palm whisper:" is an encrypted identifier, and the user can also know that the received information is ciphertext after seeing it. Obviously, the local memory stored on terminal B is also ciphertext.
S308:终端B上的底层安全模块在底层识别出该加密标识,于是提示用户B输入通信密钥;S308: The underlying security module on the terminal B identifies the encrypted identifier at the bottom layer, and then prompts the user B to input the communication key.
S309:用户B输入正确的通信密钥后,底层安全模块对密文解密,将A发送的明文显示给用户看。S309: After user B inputs the correct communication key, the underlying security module decrypts the ciphertext and displays the plaintext sent by A to the user.
由上述流程可以看出,在整个通信信息传输过程中,应用获得和存储的信息、在网络上传输的信息以及应用的网络服务器获得和存储的信息均是密文。即使终端丢失,或者中间网络通信被截获,又或者应用的网络服务器被攻破/滥用,通信信息也不会泄露。It can be seen from the above process that in the entire communication information transmission process, the information obtained and stored by the application, the information transmitted on the network, and the information obtained and stored by the application network server are all ciphertext. Even if the terminal is lost, or the intermediate network communication is intercepted, or the application's network server is compromised/abuse, the communication information will not be leaked.
图10是底层安全模块控制应用的原理示意图:Figure 10 is a schematic diagram of the principle of the underlying security module control application:
如图10所示,终端上安装有应用,在终端底层框架层设置有底层安全模块,底层安全模块是底层框架层的一个组成部分;As shown in FIG. 10, an application is installed on the terminal, and an underlying security module is disposed at the bottom layer of the terminal, and the bottom security module is an integral part of the underlying framework layer;
应用的界面是由多种系统控件和从系统控件继承而来的自定义控件组成的。其中,204是自定义TextView控件;205是自定义EditView控件;可以从图10上看到控件间的继承关系:204继承于206(系统TextView控件);205继承于207(系统EditView控件);The application's interface consists of a variety of system controls and custom controls inherited from system controls. Among them, 204 is a custom TextView control; 205 is a custom EditView control; you can see the inheritance relationship between the controls from Figure 10: 204 inherits from 206 (system TextView control); 205 inherits from 207 (system EditView control);
在206和207中预置控制模块,该控制模块,设置为截获控件获得的触发事件;与底层安全模块通信,执行底层安全模块的指令;控制控件的输入 和输出。Presetting a control module in 206 and 207, the control module is configured to intercept a trigger event obtained by the control; communicate with the underlying security module, execute an instruction of the underlying security module; and input the control control And output.
很明显,因为204和206,205和207是继承关系,所以在这些应用自定义控件内部,也存在控制模块;这样,底层安全模块就能通过控制模块来控制应用的输入输出了。Obviously, because 204 and 206, 205 and 207 are inheritance relationships, there are control modules inside these application custom controls; thus, the underlying security module can control the input and output of the application through the control module.
此外,根据需要,还可以在系统提供的其他控件中预置控制模块,通过控制模块来控制应用的其他行为,这样在应用无需作出任何修改的前提下,底层安全模块控制了应用的输入输出。这就是图5中,在终端A上,底层安全模块能先于应用获得输入;在终端B上,底层安全模块能在应用给出输出之后进一步再处理输出的原理。这实际上利用了现代智能终端窗口系统的继承关系。应用很难绕过操作系统提供的窗口系统再另外写一套窗口系统使用。所以,应用必然要继承系统控件中的控制模块,进而被底层安全模块通过该控制模块控制。In addition, as needed, the control module can be preset in other controls provided by the system, and the other behaviors of the application can be controlled by the control module, so that the underlying security module controls the input and output of the application without any modification of the application. That is, in Figure 5, on terminal A, the underlying security module can obtain input prior to the application; on terminal B, the underlying security module can further process the output after the application gives the output. This actually takes advantage of the inheritance relationship of modern intelligent terminal window systems. It is difficult for an application to bypass the window system provided by the operating system and then write a separate window system. Therefore, the application must inherit the control module in the system control, and then be controlled by the underlying security module through the control module.
图11是应用实例中开启安全模式(“密”模式)的操作示意图:Figure 11 is a schematic diagram of the operation of turning on the security mode ("tight" mode) in the application example:
501是用户的手指操作,代表用户;501 is a finger operation of the user, representing the user;
502是某款第三方聊天应用;502 is a third party chat application;
503是“密”开关,图中当它右上角出现一个黑色小圆点时,表示它处于打开状态;如果没有黑色小圆点,表示它处于关闭状态;503 is a "closed" switch. When a small black dot appears in the upper right corner of the figure, it indicates that it is in an open state; if there is no black small dot, it indicates that it is in a closed state;
401是底层安全模块弹出的让用户输入用于开启“密”模式的密码的界面;401 is an interface that is popped up by the underlying security module to allow the user to input a password for turning on the "closed" mode;
402是401上用于输入用于开启“密”模式的密码的输入框;402 is an input box for inputting a password for turning on the "closed" mode on 401;
403是当输入的密码正确,“密”模式打开的界面,此时,503的右上角会出现一个黑色小圆点;403 is the interface when the input password is correct and the "closed" mode is opened. At this time, a black dot appears in the upper right corner of 503;
405是当输入的密码错误,“密”模式仍然处于关闭状态的界面,此时,503的右上角不会出现黑色小圆点;405 is when the input password is wrong, the "closed" mode is still in the closed state interface, at this time, the black dot in the upper right corner of 503 does not appear;
操作流程包括:503“密”开关处于关闭状态时,用户用手指501点击503,底层安全模块弹出401请用户输入用于开启“密”模式的密码,用户在402中输入密码,如果密码正确(与预设的密码一致),“密”模式被打开,见403;如果密码错误,“密”模式仍然处于关闭状态,见405。 The operation process includes: when the 503 "closed" switch is in the off state, the user clicks 503 with the finger 501, and the bottom security module pops up 401. The user inputs a password for turning on the "closed" mode, and the user enters the password in 402, if the password is correct ( In accordance with the preset password, the "closed" mode is turned on, see 403; if the password is wrong, the "closed" mode is still off, see 405.
上述过程验证了用户的身份,表明用户拥有该终端的使用权。The above process verifies the identity of the user, indicating that the user has the right to use the terminal.
图12是底层安全模块把用户输入转变成密文,返回给EditView的操作示例图:Figure 12 is an example of the operation of the underlying security module to convert user input into ciphertext and return to EditView:
501是用户的手指操作,代表用户;501 is a finger operation of the user, representing the user;
502是某款第三方聊天应用;502 is a third party chat application;
503是“密”开关,图中它处于打开状态;503 is a "closed" switch, which is in an open state;
504是底层安全模块弹出的让用户输入明文的界面;504 is an interface that is displayed by the underlying security module to allow the user to input plaintext;
505是输入法键盘;505 is an input method keyboard;
506是用户输入的明文;506 is the plain text input by the user;
507是底层安全模块弹出的让用户输入本次通信密码的界面;507 is an interface that is displayed by the underlying security module to allow the user to input the communication password;
508是用户输入的用图形表示的通信密码;508 is a graphically entered communication password input by the user;
509是经底层安全模块加密处理后,返回给EditView的密文;509 is the ciphertext returned to the EditView after being encrypted by the underlying security module;
操作流程包括:用户用手指501点击应用502的EditView控件,因为503处于打开状态(即“密”模式打开),所以这个触发事件被底层安全模块截获并代为处理,于是弹出了504;用户在504中输入了明文506之后,点击通信密码按钮,弹出507界面,让用户输入了通信密码508(在本图中,通信密码用的是图形密码,实际可以使用多种密码形式),然后用户点击确定按钮,回到502的界面;此时,在EditView中已经填入了经底层安全模块加密处理后的密文509,该密文为“掌心密语:FImG6DpTAF2acmMMF==”,包括:加密算法的版本号和加密标识“掌心密语:”,该加密标识是预先设置好的;用户点击502界面上的发送按钮,502将获得的密文509发送给网络服务器,同时将509存储进终端本地存储。The operation process includes: the user clicks the EditView control of the application 502 with the finger 501, because the 503 is in an open state (ie, the "closed" mode is opened), so the trigger event is intercepted and processed by the underlying security module, so that 504 is popped; the user is at 504. After entering the plaintext 506, click the communication password button to pop up the 507 interface, and let the user input the communication password 508 (in the figure, the communication password uses a graphic password, and actually can use multiple password forms), and then the user clicks OK. Button, return to the interface of 502; at this time, the ciphertext 509 encrypted by the underlying security module has been filled in the EditView, and the ciphertext is "palm cipher: FImG6DpTAF2acmMMF==", including: the version number of the encryption algorithm And the encryption identifier "palm:", the encryption identifier is pre-set; the user clicks the send button on the interface 502, 502 sends the obtained ciphertext 509 to the network server, and stores the 509 into the terminal for local storage.
上述整个过程中,应用均无法获取用户的原始文字信息。所以该应用不可能窃取用户的隐私。In the above process, the application cannot obtain the original text information of the user. Therefore, the application cannot steal the privacy of the user.
图13是底层安全模块使用用户输入的密钥把密文解密,返回给TextView显示出来的示意图: Figure 13 is a schematic diagram of the underlying security module decrypting the ciphertext using the key entered by the user and returning it to the TextView display:
601是接收方安装的该款应用界面;601 is the application interface installed by the receiver;
602是底层安全模块弹出的让用户输入本次通信密码的界面;602 is an interface that is displayed by the underlying security module to allow the user to input the communication password;
603是当密钥正确时弹出的显示明文界面;603 is a display plaintext interface that pops up when the key is correct;
604是当密钥错误时弹出得错误提示界面;604 is an error prompting interface popped up when the key is wrong;
操作流程包括:接收方的终端上收到了前述密文509,在TextView上显示密文“掌心密语:FImG6DpTAF2acmMMF==”,其中,“掌心密语:”是加密标识,接收方看到“掌心密语:”,就立刻请求启动安全模式,即打开“密”模式解密;其中,打开的方式如图7中所示,用户点击TextView,底层安全模块代为处理这个触摸事件;底层安全模块从TextView的显示存储中获得密文509,识别出加密标识,则判断出需要解密,于是弹出602密钥输入框,如果接收方正确的输入了密钥(图案“Z”),底层安全模块根据该密钥解密,解密将成功,底层安全模块弹出603将明文显示给接收方看;如果接收方输入了错误的密钥,解密将失败,底层安全模块弹出604提示接收方“密钥错误”。The operation process includes: receiving the ciphertext 509 on the receiving terminal, and displaying the ciphertext "palm whisper: FImG6DpTAF2acmMMF==" on the TextView, wherein "palm cipher:" is an encrypted identifier, and the receiving party sees "palm whisper: ", immediately request to start the security mode, that is, open the "secret" mode decryption; wherein, the open way is as shown in Figure 7, the user clicks on the TextView, the underlying security module handles this touch event; the underlying security module is stored from the TextView display Obtaining the ciphertext 509, identifying the encrypted identifier, determining that decryption is required, and then popping 602 the key input box. If the recipient correctly inputs the key (pattern "Z"), the underlying security module decrypts according to the key. The decryption will succeed, and the underlying security module pops up 603 to display the plaintext to the recipient; if the recipient enters the wrong key, the decryption will fail, and the underlying security module pops up 604 to prompt the recipient to "key error."
从上述实施例可以看出,相对于相关技术,上述实施例中提供的信息安全传递方法及系统、接收终端、发送终端,由底层安全模块截获应用的触发事件,对传输的信息进行加密或解密,应用只是作为已加密后的信息的传输通道,对于应用而言传递的信息均为密文,从而防止应用泄密,安全可靠性高,满足用户保护隐私的需求。It can be seen from the above embodiments that, relative to the related art, the information security transmission method and system, the receiving terminal, and the transmitting terminal provided in the foregoing embodiments intercept the trigger event of the application by the underlying security module, and encrypt or decrypt the transmitted information. The application only serves as a transmission channel for the encrypted information. For the application, the information transmitted is ciphertext, thereby preventing application leakage, high security and reliability, and meeting the user's privacy protection requirements.
以上内容是结合具体的实施方式对本发明所作的进一步详细说明,不能认定本发明的具体实施只局限于这些说明。The above is a further detailed description of the present invention in connection with the specific embodiments, and the specific embodiments of the present invention are not limited to the description.
本领域普通技术人员可以理解上述实施例的全部或部分步骤可以使用计算机程序流程来实现,所述计算机程序可以存储于一计算机可读存储介质中,所述计算机程序在相应的硬件平台上(如系统、设备、装置、器件等)执行,在执行时,包括方法实施例的步骤之一或其组合。 One of ordinary skill in the art will appreciate that all or a portion of the steps of the above-described embodiments can be implemented using a computer program flow, which can be stored in a computer readable storage medium, such as on a corresponding hardware platform (eg, The system, device, device, device, etc. are executed, and when executed, include one or a combination of the steps of the method embodiments.
可选地,上述实施例的全部或部分步骤也可以使用集成电路来实现,这些步骤可以被分别制作成一个个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。Alternatively, all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve.
上述实施例中的各装置/功能模块/功能单元可以采用通用的计算装置来实现,它们可以集中在单个的计算装置上,也可以分布在多个计算装置所组成的网络上。The devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
上述实施例中的各装置/功能模块/功能单元以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。上述提到的计算机可读取存储介质可以是只读存储器,磁盘或光盘等。When each device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium. The above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
工业实用性Industrial applicability
上述技术方案对传输的信息进行加密或解密,应用只是作为已加密后的信息的传输通道,对于应用而言传递的信息均为密文,从而防止应用泄密,安全可靠性高,满足用户保护隐私的需求。 The above technical solution encrypts or decrypts the transmitted information, and the application only serves as a transmission channel of the encrypted information. For the application, the information transmitted is ciphertext, thereby preventing application leakage, high security and reliability, and satisfying user protection privacy. Demand.

Claims (54)

  1. 一种信息安全传递方法,包括:An information security delivery method, including:
    在发送终端的系统控件中预先设置控制模块,当所述发送终端的应用的控件被触发时,所述控制模块拦截触发事件,并通知所述发送终端的底层安全模块;Setting a control module in a system control of the sending terminal, when the control of the application of the sending terminal is triggered, the control module intercepts the triggering event, and notifies the bottom security module of the sending terminal;
    所述底层安全模块收到所述控制模块的通知后,对所述触发事件相关的信息加密生成加密密文,将所述加密密文发送至所述控制模块;After receiving the notification from the control module, the underlying security module encrypts the information related to the trigger event to generate an encrypted ciphertext, and sends the encrypted ciphertext to the control module;
    所述控制模块将所述加密密文通过所述应用发送给接收终端。The control module sends the encrypted ciphertext to the receiving terminal through the application.
  2. 如权利要求1所述的方法,其中,The method of claim 1 wherein
    所述触发事件包括用户将要在所述应用的控件中添加信息;所述触发事件相关的信息为用户将要在所述应用的控件中添加的信息。The triggering event includes information that the user is about to add to the control of the application; the information related to the triggering event is information that the user will add in the control of the application.
  3. 如权利要求1所述的方法,所述方法还包括:The method of claim 1 further comprising:
    在所述底层安全模块收到所述控制模块的通知后,对所述触发事件相关的信息加密生成加密密文之前,提示发送终端用户是否开启安全模式,在接收到所述发送终端用户开启安全模式的请求后,开启安全模式,触发所述底层安全模块启动。After receiving the notification by the control module, the bottom security module encrypts the information related to the trigger event to generate a encrypted ciphertext, and prompts the sending terminal user whether to enable the security mode, and the user is enabled to open the security after receiving the sending terminal. After the mode request, the security mode is turned on, triggering the underlying security module to start.
  4. 如权利要求3所述的方法,其中,The method of claim 3, wherein
    所述开启安全模式,触发所述底层安全模块启动,包括:The initiating security mode triggers activation of the underlying security module, including:
    提示所述发送终端用户输入安全模式开启密码;Prompting the sending terminal user to input a security mode open password;
    确定接收到的所述发送终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,触发所述底层安全模块启动。After determining that the received security mode open password input by the sending terminal user is consistent with the preset security mode open password, the underlying security module is triggered to be activated by verification.
  5. 如权利要求3或4所述的方法,其中,The method of claim 3 or 4, wherein
    所述底层安全模块收到所述控制模块的通知后,对所述触发事件中相关的信息加密生成加密密文,包括:After receiving the notification from the control module, the underlying security module encrypts the information related to the trigger event to generate an encrypted ciphertext, including:
    所述底层安全模块收到所述控制模块的通知后,向发送终端用户提示输 入通信密钥,并接收所述发送终端用户输入的通信密钥,或者,获取本地存储的预设的通信密钥;After receiving the notification from the control module, the underlying security module prompts the user of the sending terminal to lose Entering a communication key, and receiving a communication key input by the user of the sending terminal, or acquiring a preset communication key stored locally;
    所述底层安全模块利用所述发送终端用户输入的通信密钥或所述本地存储的预设的通信密钥采用加密算法对所述用户将要在应用的控件中添加的信息加密,并添加加密标识或者添加所述加密算法的版本号和加密标识生成加密密文。The underlying security module encrypts information added by the user to the control of the application by using a communication key input by the user of the sending terminal or the locally stored preset communication key, and adds an encrypted identifier. Or adding the version number of the encryption algorithm and the encrypted identifier to generate an encrypted ciphertext.
  6. 如权利要求1~4任意一项权利要求所述的方法,其中,A method according to any one of claims 1 to 4, wherein
    所述应用的控件包括编辑控件。The application's controls include an edit control.
  7. 一种信息安全传递方法,包括:An information security delivery method, including:
    在接收终端的系统控件中预先设置控制模块,当所述接收终端的应用的控件被触发时,所述控制模块拦截触发事件,并通知所述接收终端的底层安全模块;Setting a control module in a system control of the receiving terminal, when the control of the application of the receiving terminal is triggered, the control module intercepts the triggering event, and notifies the bottom security module of the receiving terminal;
    所述底层安全模块收到所述控制模块的通知后,对所述触发事件相关的信息解密。After receiving the notification from the control module, the underlying security module decrypts the information related to the trigger event.
  8. 如权利要求7所述的方法,所述方法还包括:The method of claim 7 further comprising:
    所述应用接收到发送终端发来的信息,并提示用户触发所述应用的控件;The application receives the information sent by the sending terminal, and prompts the user to trigger the control of the application;
    所述触发事件包括接收终端用户读取所述应用的控件输出的所述发送终端发来的信息;所述触发事件相关的信息为所述应用的控件输出的所述发送终端发来的信息。The triggering event includes receiving, by the terminal user, information sent by the sending terminal of the control output of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application.
  9. 如权利要求6所述的方法,所述方法还包括:The method of claim 6 further comprising:
    在所述控制模块拦截到触发事件时,提示接收终端用户是否开启安全模式,在接收到所述接收终端用户开启安全模式的请求后,开启安全模式,触发所述底层安全模块启动。When the control module intercepts the triggering event, it prompts the receiving terminal user whether to enable the security mode. After receiving the request of the receiving terminal user to enable the security mode, the security mode is started, and the underlying security module is triggered to be started.
  10. 如权利要求9所述的方法,其中,The method of claim 9 wherein
    所述开启安全模式,触发所述底层安全模块启动,包括:The initiating security mode triggers activation of the underlying security module, including:
    提示所述接收终端用户输入安全模式开启密码; Prompting the receiving terminal user to input a security mode open password;
    确定接收到的所述接收终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,触发所述底层安全模块启动。After determining that the received security mode open password input by the receiving terminal user is consistent with the preset security mode open password, the underlying security module is triggered to be activated by verification.
  11. 如权利要求9或10所述的方法,其中,The method according to claim 9 or 10, wherein
    所述应用的控件输出的所述发送终端发来的信息包括:加密标识和加密信息,或者加密标识、加密算法的版本号和加密信息;The information sent by the sending terminal output by the control of the application includes: an encrypted identifier and an encrypted information, or an encrypted identifier, a version number of the encryption algorithm, and encrypted information;
    所述底层安全模块收到所述控制模块的通知后,对所述触发事件相关的信息解密,包括:After receiving the notification by the control module, the underlying security module decrypts the information related to the trigger event, including:
    所述底层安全模块在用户读取应用的控件输出的所述发送终端发来的信息时,识别出所述加密标识后,向接收终端用户提示输入通信密钥,并接收所述接收终端用户输入的通信密钥,或者,识别出所述加密标识后,获取本地存储的预设的通信密钥;When the user reads the information sent by the sending terminal of the control output of the application, the bottom security module prompts the receiving terminal user to input the communication key and receives the input of the receiving terminal user after identifying the encrypted identifier. a communication key, or, after identifying the encrypted identifier, acquiring a preset communication key stored locally;
    所述底层安全模块利用所述接收终端用户输入的通信密钥或者所述本地存储的预设的通信密钥,采用预设的加密算法或所述加密算法的版本号对应的加密算法对所述加密信息解密,向用户展示解密后的信息的明文。The bottom security module uses the communication key input by the receiving terminal user or the locally stored preset communication key, and uses a preset encryption algorithm or an encryption algorithm corresponding to the version number of the encryption algorithm. The encrypted information is decrypted, and the plaintext of the decrypted information is displayed to the user.
  12. 如权利要求7~10任意一项权利要求所述的方法,其中,A method according to any one of claims 7 to 10, wherein
    所述应用的控件包括显示控件。The controls of the application include display controls.
  13. 一种发送终端,包括:设置在发送终端底层框架中的底层安全模块、预先设置在发送终端的系统控件中的控制模块以及应用,其中:A transmitting terminal includes: an underlying security module disposed in a bottom frame of the transmitting terminal, a control module preset in a system control of the transmitting terminal, and an application, wherein:
    所述控制模块,设置为当所述应用的控件被触发时,拦截触发事件,并通知所述底层安全模块;在接收到所述底层安全模块返回的加密密文后传递给所述应用;The control module is configured to: when the control of the application is triggered, intercept the trigger event, and notify the underlying security module; and transmit the encrypted ciphertext returned by the underlying security module to the application;
    所述底层安全模块,设置为在收到所述控制模块的通知后,对所述触发事件相关的信息加密生成加密密文,将所述加密密文发送至所述控制模块;The underlying security module is configured to: after receiving the notification of the control module, encrypt the information related to the trigger event to generate an encrypted ciphertext, and send the encrypted ciphertext to the control module;
    所述应用,设置为将所述加密密文发送给接收终端。The application is configured to send the encrypted ciphertext to the receiving terminal.
  14. 如权利要求13所述的发送终端,其中,The transmitting terminal according to claim 13, wherein
    所述触发事件包括用户将要在应用的控件中添加信息;所述触发事件相 关的信息为用户将要在应用的控件中添加的信息。The triggering event includes a user to add information to a control of the application; the triggering event phase The information that is closed is the information that the user will add to the controls of the app.
  15. 如权利要求13所述的发送终端,还包括:The transmitting terminal according to claim 13, further comprising:
    启动模块,设置为提示发送终端用户是否开启安全模式,在接收到所述发送终端用户开启所述底层安全模块的请求后,开启安全模式,触发所述底层安全模块启动。The startup module is configured to prompt the sending terminal user whether to enable the security mode. After receiving the request of the sending terminal user to open the underlying security module, the security mode is started, and the bottom security module is triggered to be started.
  16. 如权利要求15所述的发送终端,其中,The transmitting terminal according to claim 15, wherein
    所述启动模块是设置为通过如下方式实现开启安全模式,触发所述底层安全模块启动:The startup module is configured to implement an open security mode by triggering activation of the underlying security module:
    提示所述发送终端用户输入安全模式开启密码;Prompting the sending terminal user to input a security mode open password;
    确定接收到的所述发送终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,触发所述底层安全模块启动。After determining that the received security mode open password input by the sending terminal user is consistent with the preset security mode open password, the underlying security module is triggered to be activated by verification.
  17. 如权利要求15或16所述的发送终端,其中,The transmitting terminal according to claim 15 or 16, wherein
    所述底层安全模块是设置为通过如下方式实现收到所述控制模块的通知后,对所述触发事件中相关的信息加密生成加密密文:The underlying security module is configured to encrypt the information related to the trigger event to generate an encrypted ciphertext after receiving the notification of the control module by:
    所述底层安全模块收到所述控制模块的通知后,向发送终端用户提示输入通信密钥,并接收所述发送终端用户输入的通信密钥,或者,获取本地存储的预设的通信密钥;After receiving the notification of the control module, the bottom security module prompts the sending terminal user to input a communication key, and receives the communication key input by the sending terminal user, or acquires a preset local communication key. ;
    所述底层安全模块利用所述发送终端用户输入的通信密钥或所述本地存储的预设的通信密钥采用加密算法对所述用户将要在所述应用的控件中添加的信息加密,并添加加密标识或者添加所述加密算法的版本号和加密标识生成加密密文。The underlying security module encrypts, by using an encryption algorithm, information added by the user to the control of the application by using a communication key input by the sending terminal user or the locally stored preset communication key, and adding Encrypting the identifier or adding the version number and the encrypted identifier of the encryption algorithm to generate an encrypted ciphertext.
  18. 如权利要求13~16任意一项权利要求所述的发送终端,其中,A transmitting terminal according to any one of claims 13 to 16, wherein
    所述应用的控件包括编辑控件。The application's controls include an edit control.
  19. 一种接收终端,包括:设置在接收终端底层框架中的底层安全模块、预先设置在接收终端的系统控件中的控制模块以及应用,其中:A receiving terminal includes: an underlying security module disposed in a bottom frame of the receiving terminal, a control module pre-set in a system control of the receiving terminal, and an application, wherein:
    所述控制模块,设置为当所述应用的控件被触发时,拦截触发事件,并 通知所述底层安全模块;The control module is configured to intercept a trigger event when the control of the application is triggered, and Notifying the underlying security module;
    所述底层安全模块,设置为收到所述控制模块的通知后,对所述触发事件相关的信息解密;The underlying security module is configured to decrypt the information related to the trigger event after receiving the notification of the control module;
    所述应用,设置为接收到发送终端发来的信息后,提示用户触发所述应用的控件。The application is configured to prompt the user to trigger a control of the application after receiving the information sent by the sending terminal.
  20. 如权利要求19所述的接收终端,其中,The receiving terminal according to claim 19, wherein
    所述触发事件包括接收终端用户读取所述应用的控件输出的所述发送终端发来的信息;所述触发事件相关的信息为所述应用的控件输出的所述发送终端发来的信息。The triggering event includes receiving, by the terminal user, information sent by the sending terminal of the control output of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application.
  21. 如权利要求19所述的接收终端,还包括与所述控制模块和所述底层安全模块相连的启动模块,其中:A receiving terminal according to claim 19, further comprising a booting module connected to said control module and said underlying security module, wherein:
    所述控制模块,还设置为在拦截到触发事件时,触发所述启动模块工作;The control module is further configured to trigger the startup module to work when the trigger event is intercepted;
    所述启动模块,设置为提示接收终端用户是否开启安全模式,在接收到所述接收终端用户开启安全模式的请求后,开启安全模式,触发所述底层安全模块启动。The startup module is configured to prompt the receiving terminal user to enable the security mode. After receiving the request of the receiving terminal user to enable the security mode, the security mode is started, and the bottom security module is triggered to be started.
  22. 如权利要求21所述的接收终端,其中,The receiving terminal according to claim 21, wherein
    所述启动模块是设置为通过如下方式实现开启安全模式,触发所述底层安全模块启动:The startup module is configured to implement an open security mode by triggering activation of the underlying security module:
    提示所述接收终端用户输入安全模式开启密码;Prompting the receiving terminal user to input a security mode open password;
    确定接收到的所述接收终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,触发所述底层安全模块启动。After determining that the received security mode open password input by the receiving terminal user is consistent with the preset security mode open password, the underlying security module is triggered to be activated by verification.
  23. 如权利要求21或22所述的接收终端,其中,A receiving terminal according to claim 21 or 22, wherein
    所述应用的控件输出的所述发送终端发来的信息包括:加密标识和加密信息,或者加密标识、加密算法的版本号和加密信息;The information sent by the sending terminal output by the control of the application includes: an encrypted identifier and an encrypted information, or an encrypted identifier, a version number of the encryption algorithm, and encrypted information;
    所述底层安全模块是设置为通过如下方式实现收到所述控制模块的通知后,对所述触发事件相关的信息解密: The underlying security module is configured to decrypt the information related to the trigger event after receiving the notification of the control module by:
    所述底层安全模块在用户读取应用的控件输出的所述发送终端发来的信息时,识别出所述加密标识后,向接收终端用户提示输入通信密钥,并接收所述接收终端用户输入的通信密钥,或者,识别出所述加密标识后,获取本地存储的预设的通信密钥;When the user reads the information sent by the sending terminal of the control output of the application, the bottom security module prompts the receiving terminal user to input the communication key and receives the input of the receiving terminal user after identifying the encrypted identifier. a communication key, or, after identifying the encrypted identifier, acquiring a preset communication key stored locally;
    所述底层安全模块利用所述接收终端用户输入的通信密钥或者所述本地存储的预设的通信密钥,采用预设的加密算法或所述加密算法的版本号对应的加密算法对所述加密信息解密,向用户展示解密后的信息的明文。The bottom security module uses the communication key input by the receiving terminal user or the locally stored preset communication key, and uses a preset encryption algorithm or an encryption algorithm corresponding to the version number of the encryption algorithm. The encrypted information is decrypted, and the plaintext of the decrypted information is displayed to the user.
  24. 如权利要求19~22任意一项权利要求所述的接收终端,其中,A receiving terminal according to any one of claims 19 to 22, wherein
    所述应用的控件包括显示控件。The controls of the application include display controls.
  25. 一种信息安全传递系统,包括:如权利要求13~18所述的发送终端和如权利要求19~24所述的接收终端。An information security delivery system comprising: the transmitting terminal according to claims 13-18 and the receiving terminal according to claims 19-24.
  26. 一种信息安全传递方法,包括:An information security delivery method, including:
    发送终端检测到应用的控件被触发的触发事件后,对所述触发事件相关的信息加密生成加密密文,将所述加密密文通过所述应用发送给接收终端。After the sending terminal detects the trigger event that the control of the application is triggered, the information related to the trigger event is encrypted to generate an encrypted ciphertext, and the encrypted ciphertext is sent to the receiving terminal by using the application.
  27. 如权利要求26所述的方法,其中,The method of claim 26, wherein
    所述触发事件包括用户将要在应用的控件中添加信息;所述触发事件相关的信息为用户将要在应用的控件中添加的信息。The triggering event includes the user adding information to the control of the application; the information related to the triggering event is information that the user will add in the control of the application.
  28. 如权利要求26所述的方法,所述方法还包括:The method of claim 26, the method further comprising:
    在所述对所述触发事件相关的信息加密生成加密密文之前,提示发送终端用户是否开启安全模式,在接收到所述发送终端用户开启安全模式的请求后,开启安全模式。Before the information related to the trigger event is encrypted to generate an encrypted ciphertext, the sending terminal user is prompted whether to enable the security mode, and after receiving the request of the sending terminal user to enable the security mode, the security mode is started.
  29. 如权利要求28所述的方法,其中,The method of claim 28, wherein
    所述开启安全模式,包括:The opening security mode includes:
    提示所述发送终端用户输入安全模式开启密码;Prompting the sending terminal user to input a security mode open password;
    确定接收到的所述发送终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,开启安全模式。 After determining that the received security mode open password input by the sending terminal user is consistent with the preset security mode open password, the security mode is enabled through verification.
  30. 如权利要求28或29所述的方法,其中,The method of claim 28 or 29, wherein
    所述发送终端检测到应用的控件被触发的触发事件后,对所述触发事件相关的信息加密生成加密密文,包括:After the sending terminal detects that the trigger of the application is triggered, the sending terminal encrypts the information related to the triggering event to generate an encrypted ciphertext, including:
    所述发送终端检测到应用的控件被触发的触发事件后,向发送终端用户提示输入通信密钥,并接收所述发送终端用户输入的通信密钥,或者,获取本地存储的预设的通信密钥;After detecting that the trigger of the application is triggered, the sending terminal prompts the sending terminal user to input a communication key, and receives the communication key input by the user of the sending terminal, or obtains a preset local communication confidentiality. key;
    利用所述发送终端用户输入的通信密钥或所述本地存储的预设的通信密钥采用加密算法对所述用户将要在应用的控件中添加的信息加密,并添加加密标识或者添加所述加密算法的版本号和加密标识生成加密密文。Encrypting information added by the user to the control of the application by using a communication key input by the user of the sending terminal or the locally stored preset communication key, and adding an encrypted identifier or adding the encryption The version number and encryption identifier of the algorithm generate an encrypted ciphertext.
  31. 如权利要求26~29任意一项权利要求所述的方法,其中,A method according to any one of claims 26 to 29, wherein
    所述应用的控件包括编辑控件。The application's controls include an edit control.
  32. 一种信息安全传递方法,包括:An information security delivery method, including:
    接收终端检测到应用的控件被触发的触发事件后,对所述触发事件相关的信息解密。After receiving the trigger event that the control of the application is triggered, the receiving terminal decrypts the information related to the trigger event.
  33. 如权利要求32所述的方法,所述方法还包括:The method of claim 32, the method further comprising:
    在所述接收终端检测到应用的控件被触发的触发事件前,所述应用接收到发送终端发来的信息,并提示用户触发所述应用的控件;Before the receiving terminal detects a trigger event that the control of the application is triggered, the application receives the information sent by the sending terminal, and prompts the user to trigger the control of the application;
    所述触发事件包括接收终端用户读取所述应用的控件输出的所述发送终端发来的信息;所述触发事件相关的信息为所述应用的控件输出的所述发送终端发来的信息。The triggering event includes receiving, by the terminal user, information sent by the sending terminal of the control output of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application.
  34. 如权利要求32所述的方法,所述方法还包括:The method of claim 32, the method further comprising:
    在所述接收终端检测到应用的控件被触发的触发事件时,提示接收终端用户是否开启安全模式,在接收到所述接收终端用户开启安全模式的请求后,开启安全模式。When the receiving terminal detects that the control of the application is triggered, the receiving terminal prompts the receiving terminal whether to enable the security mode, and after receiving the request of the receiving terminal user to enable the security mode, the security mode is enabled.
  35. 如权利要求34所述的方法,其中,The method of claim 34, wherein
    所述开启安全模式,包括: The opening security mode includes:
    提示所述接收终端用户输入安全模式开启密码;Prompting the receiving terminal user to input a security mode open password;
    确定接收到的所述接收终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,开启安全模式。After determining that the received security mode open password input by the receiving terminal user is consistent with the preset security mode open password, the security mode is enabled through verification.
  36. 如权利要求34或35所述的方法,其中,A method according to claim 34 or 35, wherein
    所述应用的控件输出的所述发送终端发来的信息包括:加密标识和加密信息,或者加密标识、加密算法的版本号和加密信息;The information sent by the sending terminal output by the control of the application includes: an encrypted identifier and an encrypted information, or an encrypted identifier, a version number of the encryption algorithm, and encrypted information;
    所述接收终端检测到应用的控件被触发的触发事件后,对所述触发事件相关的信息解密,包括:After the receiving terminal detects the trigger event triggered by the control of the application, the receiving terminal decrypts the information related to the trigger event, including:
    所述接收终端检测到用户读取应用的控件输出的所述发送终端发来的信息时,识别出所述加密标识后,向接收终端用户提示输入通信密钥,并接收所述接收终端用户输入的通信密钥,或者,识别出所述加密标识后,获取本地存储的预设的通信密钥;When the receiving terminal detects the information sent by the sending terminal output by the control of the application, the receiving terminal recognizes the encrypted identifier, prompts the receiving terminal user to input the communication key, and receives the receiving terminal user input. a communication key, or, after identifying the encrypted identifier, acquiring a preset communication key stored locally;
    利用所述接收终端用户输入的通信密钥或者所述本地存储的预设的通信密钥,采用预设的加密算法或所述加密算法的版本号对应的加密算法对所述加密信息解密,向用户展示解密后的信息的明文。Decrypting the encrypted information by using a preset encryption algorithm or an encryption algorithm corresponding to a version number of the encryption algorithm by using a communication key input by the user of the receiving terminal or the locally stored preset communication key The user displays the plaintext of the decrypted information.
  37. 如权利要求32~35任意一项权利要求所述的方法,其中,A method according to any one of claims 32 to 35, wherein
    所述应用的控件包括显示控件。The controls of the application include display controls.
  38. 一种发送终端,包括:A transmitting terminal includes:
    检测模块,设置为检测应用的控件被触发的触发事件;a detection module configured to detect a trigger event triggered by an application's control;
    加密模块,设置为在检测应用的控件被触发的触发事件后,对所述触发事件相关的信息加密生成加密密文;The encryption module is configured to: after detecting a trigger event triggered by the control of the application, encrypting information related to the trigger event to generate an encrypted ciphertext;
    应用,设置为将所述加密密文发送给接收终端。The application is configured to send the encrypted ciphertext to the receiving terminal.
  39. 如权利要求38所述的发送终端,其中,The transmitting terminal according to claim 38, wherein
    所述触发事件包括用户将要在应用的控件中添加信息;所述触发事件相关的信息为用户将要在应用的控件中添加的信息。 The triggering event includes the user adding information to the control of the application; the information related to the triggering event is information that the user will add in the control of the application.
  40. 如权利要求38所述的发送终端,还包括:The transmitting terminal of claim 38, further comprising:
    启动模块,设置为提示发送终端用户是否开启安全模式,在接收到所述发送终端用户开启安全模式的请求后,开启安全模式,触发所述加密模块启动。The startup module is configured to prompt the sending terminal user whether to enable the security mode. After receiving the request of the sending terminal user to enable the security mode, the security mode is enabled, and the encryption module is triggered to start.
  41. 如权利要求40所述的发送终端,其中,The transmitting terminal according to claim 40, wherein
    所述启动模块是设置为通过如下方式实现开启安全模式,触发所述加密模块启动:The startup module is configured to implement an open security mode by triggering the encryption module to start:
    提示所述发送终端用户输入安全模式开启密码;Prompting the sending terminal user to input a security mode open password;
    确定接收到的所述发送终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,开启安全模式,触发所述加密模块启动。After determining that the received security mode open password of the sending terminal user is consistent with the preset security mode open password, the security mode is triggered by the verification, and the encryption module is triggered to start.
  42. 如权利要求40或41所述的发送终端,其中,A transmitting terminal according to claim 40 or 41, wherein
    所述加密模块是设置为通过如下方式实现在检测应用的控件被触发的触发事件后,对所述触发事件相关的信息加密生成加密密文:The encryption module is configured to: after detecting a trigger event triggered by the control of the application, encrypting the information related to the trigger event to generate an encrypted ciphertext:
    在所述检测模块检测应用的控件被触发的触发事件后,所述加密模块向发送终端用户提示输入通信密钥,并接收所述发送终端用户输入的通信密钥,或者,获取本地存储的预设的通信密钥;After the detecting module detects a trigger event triggered by the application control, the encryption module prompts the sending terminal user to input a communication key, and receives a communication key input by the sending terminal user, or acquires a locally stored pre- Communication key
    利用所述发送终端用户输入的通信密钥或所述本地存储的预设的通信密钥采用加密算法对所述用户将要在所述应用的控件中添加的信息加密,并添加加密标识或者添加所述加密算法的版本号和加密标识生成加密密文。Encrypting information added by the user to the control of the application by using a communication key input by the user of the sending terminal or the locally stored preset communication key, and adding an encrypted identifier or adding a The version number of the encryption algorithm and the encrypted identifier generate an encrypted ciphertext.
  43. 如权利要求38~41任意一项权利要求所述的发送终端,其中,A transmitting terminal according to any one of claims 38 to 41, wherein
    所述应用的控件包括编辑控件。The application's controls include an edit control.
  44. 一种接收终端,包括:检测模块、解密模块以及应用,其中:A receiving terminal includes: a detecting module, a decrypting module, and an application, wherein:
    所述检测模块,设置为检测应用的控件被触发的触发事件;The detecting module is configured to detect a trigger event triggered by an application control;
    所述解密模块,设置为在检测应用的控件被触发的触发事件后,对所述触发事件相关的信息解密; The decryption module is configured to decrypt the information related to the trigger event after detecting a trigger event triggered by the control of the application;
    所述应用,设置为接收到发送终端发来的信息后,提示用户触发所述应用的控件。The application is configured to prompt the user to trigger a control of the application after receiving the information sent by the sending terminal.
  45. 如权利要求44所述的接收终端,其中,A receiving terminal according to claim 44, wherein
    所述触发事件包括接收终端用户读取所述应用的控件输出的所述发送终端发来的信息;所述触发事件相关的信息为所述应用的控件输出的所述发送终端发来的信息。The triggering event includes receiving, by the terminal user, information sent by the sending terminal of the control output of the application; the information related to the triggering event is information sent by the sending terminal output by the control of the application.
  46. 如权利要求44所述的接收终端,还包括与所述检测模块和所述解密模块相连的启动模块,其中:A receiving terminal according to claim 44, further comprising a booting module connected to said detecting module and said decrypting module, wherein:
    所述检测模块,还设置为在检测到所述触发事件时,触发所述启动模块工作;The detecting module is further configured to trigger the startup module to work when the triggering event is detected;
    所述启动模块,设置为提示接收终端用户是否开启安全模式,在接收到所述接收终端用户开启安全模式的请求后,开启安全模式,触发所述解密模块启动。The startup module is configured to prompt the receiving terminal user to enable the security mode. After receiving the request of the receiving terminal user to enable the security mode, the security mode is started, and the decryption module is triggered to be started.
  47. 如权利要求46所述的接收终端,其中,A receiving terminal according to claim 46, wherein
    所述启动模块是设置为通过如下方式实现开启安全模式,触发所述解密模块启动:The startup module is configured to implement an open security mode by triggering the decryption module to start:
    提示所述接收终端用户输入安全模式开启密码;Prompting the receiving terminal user to input a security mode open password;
    确定接收到的所述接收终端用户输入的安全模式开启密码与预设的安全模式开启密码一致后,通过验证,触发所述解密模块启动。After determining that the received security mode open password input by the receiving terminal user is consistent with the preset security mode open password, the decryption module is triggered to be activated by verification.
  48. 如权利要求46或47所述的接收终端,其中,A receiving terminal according to claim 46 or 47, wherein
    所述应用的控件输出的所述发送终端发来的信息包括:加密标识和加密信息,或者加密标识、加密算法的版本号和加密信息;The information sent by the sending terminal output by the control of the application includes: an encrypted identifier and an encrypted information, or an encrypted identifier, a version number of the encryption algorithm, and encrypted information;
    所述解密模块是设置为通过如下方式实现在检测应用的控件被触发的触发事件后,对所述触发事件相关的信息解密:The decryption module is configured to decrypt the information related to the trigger event after detecting a trigger event triggered by the control of the application by:
    在所述检测模块检测应用的控件被触发的触发事件后,所述解密模块识别出加密标识后,向接收终端用户提示输入通信密钥,并接收所述接收终端 用户输入的通信密钥,或者,识别出所述加密标识后,获取本地存储的预设的通信密钥;After the detecting module detects a trigger event triggered by the application control, after the decryption module identifies the encrypted identifier, the decryption module prompts the receiving terminal user to input a communication key, and receives the receiving terminal. a communication key input by the user, or, after identifying the encrypted identifier, acquiring a preset communication key stored locally;
    利用所述接收终端用户输入的通信密钥或者所述本地存储的预设的通信密钥,采用预设的加密算法或所述加密算法的版本号对应的加密算法对所述加密信息解密,向用户展示解密后的信息的明文。Decrypting the encrypted information by using a preset encryption algorithm or an encryption algorithm corresponding to a version number of the encryption algorithm by using a communication key input by the user of the receiving terminal or the locally stored preset communication key The user displays the plaintext of the decrypted information.
  49. 如权利要求44~48任意一项权利要求所述的接收终端,其中,A receiving terminal according to any one of claims 44 to 48, wherein
    所述应用的控件包括显示控件。The controls of the application include display controls.
  50. 一种信息安全传递系统,包括:如权利要求38~43所述的发送终端和如权利要求44~49所述的接收终端。An information security delivery system comprising: a transmitting terminal according to claims 38-43 and a receiving terminal according to claims 44-49.
  51. 一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行权利要求1~6中任一项所述的方法。A computer storage medium having stored therein computer executable instructions for performing the method of any one of claims 1 to 6.
  52. 一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行权利要求7~12中任一项所述的方法。A computer storage medium having stored therein computer executable instructions for performing the method of any one of claims 7-12.
  53. 一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行权利要求26~31中任一项所述的方法。A computer storage medium having stored therein computer executable instructions for performing the method of any one of claims 26 to 31.
  54. 一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行权利要求32~37中任一项所述的方法。 A computer storage medium having stored therein computer executable instructions for performing the method of any one of claims 32-37.
PCT/CN2015/089173 2014-09-22 2015-09-08 Method and system for transmitting information safely, receiving terminal and transmission terminal WO2016045504A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410489848.5 2014-09-22
CN201410489848.5A CN104270353B (en) 2014-09-22 2014-09-22 information security transmission method and system, receiving terminal and sending terminal

Publications (1)

Publication Number Publication Date
WO2016045504A1 true WO2016045504A1 (en) 2016-03-31

Family

ID=52161843

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/089173 WO2016045504A1 (en) 2014-09-22 2015-09-08 Method and system for transmitting information safely, receiving terminal and transmission terminal

Country Status (2)

Country Link
CN (2) CN104917603B (en)
WO (1) WO2016045504A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019014140A1 (en) * 2017-07-10 2019-01-17 Investable Games Technology Inc. Platform, systems, and methods for interception of data stream triggers
US10192271B2 (en) 2012-06-11 2019-01-29 Cruttenden Partners Llc Systems and methods for managing electronic interactive gaming-based investments

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104917603B (en) * 2014-09-22 2019-03-12 中兴通讯股份有限公司 A kind of information security transfer method receives terminal and sends terminal
CN105657697A (en) * 2015-12-24 2016-06-08 北京奇虎科技有限公司 Method and device for protecting short message security
CN108616644B (en) * 2016-12-12 2021-07-30 阿里巴巴集团控股有限公司 Encryption prompting method and device
CN109471736A (en) * 2018-09-14 2019-03-15 叮联信息技术有限公司 Event information uninterruptedly transmits at random and Real-Time Sharing method
CN109274582B (en) * 2018-09-20 2021-12-10 腾讯科技(武汉)有限公司 Instant communication message display method, device, equipment and storage medium
CN110121002A (en) * 2018-11-28 2019-08-13 熵加网络科技(北京)有限公司 A method of in Android operation system to text encryption and decryption

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103164650A (en) * 2013-03-26 2013-06-19 北京奇虎科技有限公司 Implementation method of browser side security control and browser
CN103390026A (en) * 2013-06-20 2013-11-13 中国软件与技术服务股份有限公司 Mobile intelligent terminal security browser and working method thereof
CN103745174A (en) * 2013-12-30 2014-04-23 飞天诚信科技股份有限公司 Safety keyboard working method
CN104270353A (en) * 2014-09-22 2015-01-07 中兴通讯股份有限公司 Information safety transmission method and system, receiving terminal and transmitting terminal
CN104700001A (en) * 2013-12-04 2015-06-10 腾讯科技(深圳)有限公司 Information encryption method and device of application program

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094068A (en) * 2007-07-17 2007-12-26 深圳凯虹移动通信有限公司 Transmision method for encrypting information of mobile terminal
CN101169815A (en) * 2007-11-27 2008-04-30 华为技术有限公司 Computer system and data input method
CN101493750A (en) * 2008-11-28 2009-07-29 深圳华为通信技术有限公司 Application program control input method and device based on touch screen input
CN101534311A (en) * 2009-04-14 2009-09-16 杨筑平 An information security method and procedure
KR20120132013A (en) * 2011-05-27 2012-12-05 주식회사 팬택 Portable terminal, and method for securing of transmission data between hardware module of portable terminal
CN103701978A (en) * 2012-09-27 2014-04-02 中国电信股份有限公司 Terminal and automatic multimedia file encryption method
CN103458382B (en) * 2013-05-22 2020-04-21 深圳市中易通安全芯科技有限公司 Hardware encryption transmission and storage method and system for mobile phone private short message
CN103514396B (en) * 2013-09-23 2017-11-03 北京奇虎科技有限公司 File/applied program processing method and device on communication terminal
CN103986837B (en) * 2014-05-28 2017-11-10 天地融科技股份有限公司 Information processing method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103164650A (en) * 2013-03-26 2013-06-19 北京奇虎科技有限公司 Implementation method of browser side security control and browser
CN103390026A (en) * 2013-06-20 2013-11-13 中国软件与技术服务股份有限公司 Mobile intelligent terminal security browser and working method thereof
CN104700001A (en) * 2013-12-04 2015-06-10 腾讯科技(深圳)有限公司 Information encryption method and device of application program
CN103745174A (en) * 2013-12-30 2014-04-23 飞天诚信科技股份有限公司 Safety keyboard working method
CN104270353A (en) * 2014-09-22 2015-01-07 中兴通讯股份有限公司 Information safety transmission method and system, receiving terminal and transmitting terminal
CN104917603A (en) * 2014-09-22 2015-09-16 中兴通讯股份有限公司 Information secure transmission method, receiving terminal and sending terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10192271B2 (en) 2012-06-11 2019-01-29 Cruttenden Partners Llc Systems and methods for managing electronic interactive gaming-based investments
US10997661B2 (en) 2012-06-11 2021-05-04 Investable Games Technology Inc. Systems and methods for managing electronic interactive gaming-based investments
WO2019014140A1 (en) * 2017-07-10 2019-01-17 Investable Games Technology Inc. Platform, systems, and methods for interception of data stream triggers

Also Published As

Publication number Publication date
CN104917603B (en) 2019-03-12
CN104270353B (en) 2019-12-06
CN104917603A (en) 2015-09-16
CN104270353A (en) 2015-01-07

Similar Documents

Publication Publication Date Title
WO2016045504A1 (en) Method and system for transmitting information safely, receiving terminal and transmission terminal
US10462114B2 (en) System and associated software for providing advanced data protections in a defense-in-depth system by integrating multi-factor authentication with cryptographic offloading
US10129240B2 (en) Distributing security codes through a restricted communications channel
CN110492990B (en) Private key management method, device and system under block chain scene
EP3324572B1 (en) Information transmission method and mobile device
WO2021022701A1 (en) Information transmission method and apparatus, client terminal, server, and storage medium
WO2018133686A1 (en) Method and device for password protection, and storage medium
CN107026824B (en) A kind of message encryption, decryption method and device
KR101777698B1 (en) User terminal, method and computer for receiving and sending messages
EP3299990A1 (en) Electronic device server and method for communicating with server
US9961048B2 (en) System and associated software for providing advanced data protections in a defense-in-depth system by integrating multi-factor authentication with cryptographic offloading
US10237057B2 (en) Method and system for controlling the exchange of privacy-sensitive information
CN103930899A (en) A method for managing public and private data input at a device
US20150106614A1 (en) Systems and methods of safeguarding user information while interacting with online service providers
CN109672523A (en) Information ciphering method, device, equipment and readable storage medium storing program for executing based on filter
US8775800B2 (en) Event-driven provision of protected files
WO2016045464A1 (en) Decryption method and mobile terminal
CN112003697B (en) Encryption and decryption method and device for cryptographic module, electronic equipment and computer storage medium
Atwater et al. Shatter: Using threshold cryptography to protect single users with multiple devices
CN101924635A (en) Method and device for user identity authentication
CN113630412B (en) Resource downloading method, resource downloading device, electronic equipment and storage medium
US11750572B2 (en) System, method, and computer-accessible medium for hiding messages sent to third parties
US9191401B2 (en) Signed response to an abusive email account owner and provider systems and methods
CN113193956B (en) Account information processing method and device
Mahdi et al. EFTS: An encryption file transfer system applying advanced encryption standard (AES) algorithm

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15843910

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15843910

Country of ref document: EP

Kind code of ref document: A1