WO2016119437A1 - 一种数据的保护方法、装置和移动终端 - Google Patents

一种数据的保护方法、装置和移动终端 Download PDF

Info

Publication number
WO2016119437A1
WO2016119437A1 PCT/CN2015/086886 CN2015086886W WO2016119437A1 WO 2016119437 A1 WO2016119437 A1 WO 2016119437A1 CN 2015086886 W CN2015086886 W CN 2015086886W WO 2016119437 A1 WO2016119437 A1 WO 2016119437A1
Authority
WO
WIPO (PCT)
Prior art keywords
plaintext
information
display
ciphertext
operation behavior
Prior art date
Application number
PCT/CN2015/086886
Other languages
English (en)
French (fr)
Inventor
黄勤波
杜霁轩
徐立锋
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016119437A1 publication Critical patent/WO2016119437A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • This document relates to the field of communications, and in particular, to a data protection method, apparatus, and mobile terminal.
  • the server side uses a unified encryption method and a key to encrypt the user's chat content, and the receiver automatically decrypts it in a clear text manner, and can also be freely Forward, screen capture.
  • the most obvious performance is that the user often checks the operation after logging in or decrypting in time, and then can view the plaintext without entering a password, and then can forward it at will, screen capture and then delete related operations such as forwarding chat records, screen capture pictures, etc. Deleted, this can reveal important information of the user in a short time without the owner knowing, which poses a serious threat to the security of the important information of the user or reveals hidden dangers.
  • the embodiment of the invention provides a data protection method, device and mobile terminal:
  • a data protection method includes: acquiring a plaintext corresponding to the ciphertext after receiving the ciphertext; displaying the plaintext; and destroying the plaintext when the detected information conforms to a preset information destruction condition.
  • the obtaining the plaintext corresponding to the ciphertext includes: displaying the ciphertext or the pseudo plaintext corresponding to the ciphertext; and receiving a decryption operation performed on the ciphertext or the pseudo plaintext, to obtain the Text.
  • the displaying the plaintext includes: displaying the plaintext by using a dialog box independent of a communication interface.
  • the clearing of the plaintext includes: recording the duration of the display of the plaintext, and if the displayed duration of the plaintext reaches a preset time threshold, The plaintext is destroyed; or the operation behavior information of the user is obtained, and if the operation behavior information conforms to the behavior of the preset operation plaintext, the plaintext is destroyed.
  • the operation behavior information of the user includes at least one of operation behavior information on the touch screen, operation behavior information on the button, motion state information of the sensor, body feeling information, gesture information, light information, and sound information.
  • a data protection device comprising: an obtaining module, configured to: after receiving the ciphertext, obtain the plaintext corresponding to the ciphertext; the display module is configured to display the plaintext; and the destroying module is set to be the detected information The plaintext is destroyed when the pre-set information destruction condition is met.
  • the obtaining module includes: a display unit, configured to display the ciphertext or the pseudo plaintext corresponding to the ciphertext; and the receiving unit is configured to receive a decryption operation performed on the ciphertext or the pseudo plaintext, to obtain The plain text.
  • the display module is configured to display the plaintext by using a dialog box independent of the communication interface.
  • the destruction module is configured to record the duration of the display of the plaintext. If the duration of the display of the plaintext reaches a preset time threshold, the plaintext is destroyed; or the operation behavior information of the user is obtained. If the operation behavior information conforms to the behavior of the preset operation plaintext, the plaintext is destroyed.
  • the operation behavior information of the user includes at least one of operation behavior information on the touch screen, operation behavior information on the button, motion state information of the sensor, body feeling information, gesture information, light information, and sound information.
  • a mobile terminal comprising: a processor and a display screen, wherein: the processor comprises: an obtaining module, configured to acquire a plaintext corresponding to the ciphertext after receiving the ciphertext; and a display module configured to: The plaintext is sent to the display screen; the destruction module is set to match when the detected information is met The plaintext is destroyed when the pre-set information destruction condition is met; the display screen is set to display the plaintext.
  • the obtaining module includes: a display unit, configured to send the ciphertext or the pseudo-text corresponding to the ciphertext to the display screen; and the receiving unit is configured to receive the ciphertext or the pseudo-plain Performing a decryption operation to obtain the plaintext; wherein the display screen is further configured to display the ciphertext or the pseudo plaintext.
  • the display module is configured to display the plaintext by using a dialog box independent of the communication interface.
  • the destruction module is configured to record the duration of the display of the plaintext. If the duration of the display of the plaintext reaches a preset time threshold, the plaintext is destroyed; or the operation behavior information of the user is obtained. If the operation behavior information conforms to the behavior of the preset operation plaintext, the plaintext is destroyed.
  • the operation behavior information of the user includes at least one of operation behavior information on the touch screen, operation behavior information on the button, motion state information of the sensor, body feeling information, gesture information, light information, and sound information.
  • the embodiment of the invention further provides a computer readable storage medium storing program instructions, which can be implemented when the program instructions are executed.
  • the plaintext corresponding to the ciphertext is obtained, and the plaintext is displayed, and when the information conforms to the information destruction file, the plaintext is destroyed, so that people do not need to set a complicated lock screen.
  • Password set a short automatic screen saver time, do not need to remember to exit the important information display interface, reduce user steps, enhance user experience while enhancing security and operation, and prevent background interception, cracking, and prevention
  • Some guest users peek and transfer important private data, and this protection is also more human factors such as sensors and gestures, and fewer digital recognition factors increase security and convenience.
  • FIG. 1 is a schematic flowchart of a method for protecting data according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of an application example of a data protection method according to an embodiment of the present disclosure
  • FIG. 3 is a schematic structural diagram of a data protection apparatus according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of an embodiment of a mobile terminal according to an embodiment of the present invention.
  • FIG. 1 is a schematic flowchart diagram of a method for protecting data according to an embodiment of the present invention. The method shown in Figure 1 includes:
  • Step 101 After receiving the ciphertext, obtain the plaintext corresponding to the ciphertext;
  • Step 102 Display the plaintext
  • Step 103 Destroy the plaintext when the detected information meets a preset information destruction condition.
  • the obtaining the plaintext corresponding to the ciphertext includes: displaying the ciphertext or the pseudo plaintext corresponding to the ciphertext; receiving a decryption operation performed on the ciphertext or the pseudo plaintext, to obtain the plaintext .
  • pseudo plaintext refers to the illegible plaintext corresponding to the ciphertext, that is, the plaintext of the disguise, which is referred to as pseudo plaintext.
  • the displaying the plaintext includes: displaying the plaintext by using a dialog box independent of a communication interface.
  • the independent dialog box is used to display independently of the communication interface, which facilitates the management of the plaintext corresponding to the plaintext, so that the time information of the plaintext does not need to be recorded on the communication interface to ensure the security of important information.
  • the destroying the plaintext when the detected information meets the pre-set information destruction condition including:
  • the duration of the display and the operation behavior information of the user are taken as an example to determine whether there is an act of stealing the important information. Therefore, other conditions may also be set to determine whether the user has stolen the important information.
  • the operation behavior information of the user includes at least one of operation behavior information on the touch screen, operation behavior information on the button, motion state information of the sensor, body feeling information, and gesture information.
  • a temporary independent display frame pops up.
  • the data display box is destroy.
  • the system also automatically monitors the movement direction and acceleration of the sensor or any click action such as any click performed by the user. At this time, the system determines whether to obtain the corresponding information, and if so, destroys the display frame.
  • the display time of the display frame is also set according to the length of the content, and the countdown is entered, and the display frame is destroyed once the time is up.
  • the background automatically starts to detect the user's operation behavior on the touch screen and the button, and monitors the sensor acceleration and other information. After the user has such information, the user confirms that the action conforms to the owner's willingness to operate. Destroy the data display box to protect important data, and also prevent malicious visitors from performing related operations to steal important user information, ensuring that these important data are not taken, screened, and forwarded.
  • the user performs the viewing operation by using the somatosensory, gesture, and the like instead of the touch mode in the data viewing completion link, and also monitors the gravity sensing, etc., and after the preset threshold is reached, the window is automatically destroyed by destroying the data.
  • biometrics in any of the above embodiments include, but are not limited to, sounds, voice prints, pressures, fingerprints, motions, gestures, and the like having a recognition effect.
  • FIG. 2 is a schematic flowchart diagram of an application example of a data protection method according to an embodiment of the present invention. The method shown in Figure 2 includes:
  • step 201 the sender input data is sent to the receiver. If the sender user sends the message in clear text, the receiver views the content in an ordinary manner, that is, directly on the call interface; if the sender user adopts the cipher text transmission form, the item The recipient user is required to view the session data content after decryption.
  • Step 202 If the receiver finds that it is normal data, that is, non-encrypted data, it can directly view; if the receiver finds that it is ciphertext data, it needs to be decrypted and checked to view;
  • Step 203 If the receiver finds that the ciphertext data is illegible, the important data content is displayed through a special pop-up interface after decryption; the content of the data is not limited to text, and includes audio, pictures, video, and the like;
  • Step 204 For the ciphertext data, even if the photographing/screening/forwarding by the visitor or other user can only operate on the ciphertext or the disguised plaintext, the important data of the user does not pose a security threat;
  • steps 205 and 206 when the user views the message by using a specific pop-up interface after decryption, the monitoring of the indicators such as light, sound, temperature, speed, pressure, screen click, and device button press is started, and if there is such operation, there is a great It may be that the user has finished viewing the message and needs to exit the viewing interface of this important data. It is also possible that other illegal users forcibly or secretly steal data, such as pressing the mobile phone, taking photos or taking screenshots, etc. Time.
  • step 207 after the plaintext content popup box disappears, the plaintext is restored to the ciphertext.
  • the above operation is performed on a certain degree of compatibility, that is, after the sensor detects the corresponding operation, only after the sensor detects the triggering action, and the index value of the action reaches a certain threshold, the decryption operation is performed. So as not to affect the data that the user is viewing, and does not lead to carelessness and data loss. Once the pop-up box disappears and you want to view the important data again, you need to take the corresponding decryption operation again before you can view it.
  • FIG. 3 is a schematic structural diagram of a data protection apparatus according to an embodiment of the present invention. 1 and 2, the apparatus shown in FIG. 3 includes an acquisition module 301, a display module 302, and a destruction module 303, wherein:
  • the obtaining module 301 is configured to: after receiving the ciphertext, obtain the plaintext corresponding to the ciphertext;
  • the display module 302 is configured to display the plaintext
  • the destruction module 303 is configured to destroy the plaintext when the detected information conforms to a preset information destruction condition.
  • the obtaining module 301 includes:
  • a display unit configured to display the ciphertext or the pseudo plaintext corresponding to the ciphertext
  • the receiving unit is configured to receive a decryption operation performed on the ciphertext or the pseudo plaintext to obtain the plaintext.
  • the display module 302 is configured to display the plaintext by using a dialog box independent of the communication interface.
  • the destruction module 303 is configured to record the duration of the display of the plaintext. If the duration of the display of the plaintext reaches a preset time threshold, the plaintext is destroyed; or the operation behavior information of the user is obtained. The operation behavior information conforms to the behavior of the preset operation plaintext, and the plaintext is destroyed.
  • the operation behavior information of the user includes at least one of operation behavior information on the touch screen, operation behavior information on the button, motion state information of the sensor, body feeling information, and gesture information.
  • FIG. 4 is a schematic structural diagram of an embodiment of a mobile terminal according to an embodiment of the present invention.
  • the mobile terminal shown in FIG. 4 includes a processor 41 and a display screen 42, wherein:
  • the processor 41 includes:
  • the obtaining module 411 is configured to: after receiving the ciphertext, obtain the plaintext corresponding to the ciphertext;
  • a display module 412 configured to send the plaintext to the display screen
  • the destruction module 413 is configured to: when the detected information meets the pre-set information destruction condition, destroy the plaintext
  • the obtaining module 411 includes:
  • a display unit configured to send the ciphertext or the pseudo-text corresponding to the ciphertext to the display screen
  • a receiving unit configured to receive a decryption operation performed on the ciphertext or the pseudo plaintext, to obtain the plaintext
  • the display screen 42 is further configured to display the ciphertext or the pseudo plaintext.
  • the display module 412 is configured to display the plaintext by using a dialog box independent of the communication interface.
  • the destruction module 413 is configured to record the duration of the display of the plaintext. If the duration of the display of the plaintext reaches a preset time threshold, the plaintext is destroyed; or the operation behavior information of the user is obtained. The operation behavior information conforms to the behavior of the preset operation plaintext, and the plaintext is destroyed.
  • the operation behavior information of the user includes at least one of operation behavior information on the touch screen, operation behavior information on the button, motion state information of the sensor, body feeling information, and gesture information.
  • the plaintext corresponding to the ciphertext is obtained, and the plaintext is displayed, and when the information conforms to the information destruction file, the plaintext is destroyed, so that people do not need to set a complicated lock screen password, and the setting is short.
  • the automatic screen saver time does not need to remember the display interface to exit important information at all times, reduce user operation steps, enhance user experience while enhancing security and operation effects, and further prevent background interception and cracking to prevent some visitors from peeking.
  • the transfer of important private data, and this protection is also more human factors such as sensors and gestures, and fewer digital recognition factors increase security and convenience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)
  • Controls And Circuits For Display Device (AREA)

Abstract

本发明实施例提供一种数据的保护方法、装置和移动终端;所述方法,包括:在接收到密文后,获取所述密文对应的明文;显示所述明文;当检测得到的信息符合预先设置的信息销毁条件时,销毁所述明文。

Description

一种数据的保护方法、装置和移动终端 技术领域
本文涉及通信领域,尤其涉及一种数据的保护方法、装置和移动终端。
背景技术
随着信息时代的变革和发展,越来越多的社交网站、社交即时聊天工具及服务器端需要交互用户聊天等隐私数据,许多网站的交互也需要用户进行加密传输的方式进行显示,来防止数据在解密后被转发,截屏和偷窥、数据泄密及破坏保护隐私等现象;
目前,用户在进行会话或者在一些聊天工具进行交互的时候,服务器端为了对用户聊天内容加密还是采取统一的加密手段和密钥,接收方会进行自动解密以明文的方式显示,而且也可以随意转发,截屏。最明显表现就是,用户往往在登陆或及时解密操作后,再次查看则无需输入密码即可看到明文,然后可以随意进行转发,截屏然后可以把相关操作内容如转发聊天记录删除,截屏图片等内容删除掉,这样可以在机主不知晓的情况下,在很短的时间就泄露出用户重要的信息,对用户的重要信息的安全造成严重威胁或泄露隐患。
因此,如何减少重要信息的泄漏是目前亟待解决的问题。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本发明实施例提供一种数据的保护方法、装置和移动终端:
一种数据的保护方法,包括:在接收到密文后,获取所述密文对应的明文;显示所述明文;当检测得到的信息符合预先设置的信息销毁条件时,销毁所述明文。
其中,所述获取所述密文对应的明文,包括:显示所述密文或所述密文对应的伪明文;接收对所述密文或所述伪明文执行的解密操作,得到所述明 文。
其中,所述显示所述明文,包括:利用独立于通信界面的对话框显示所述明文。
其中,所述当检测得到的信息符合预先设置的信息销毁条件时,销毁所述明文,包括:记录所述明文的显示的时长,如果所述明文的显示的时长达到预先设置的时间阈值,则销毁所述明文;或者,获取用户的操作行为信息,如果所述操作行为信息符合预先设置的操作明文的行为,则销毁所述明文。
其中,所述用户的操作行为信息包括对触摸屏的操作行为信息、对按键的操作行为信息、传感器的运动状态信息、体感信息、手势信息、光线信息和声音信息中的至少一个。
一种数据的保护装置,包括:获取模块,设置为在接收到密文后,获取所述密文对应的明文;显示模块,设置为显示所述明文;销毁模块,设置为当检测得到的信息符合预先设置的信息销毁条件时,销毁所述明文。
其中,所述获取模块包括:显示单元,设置为显示所述密文或所述密文对应的伪明文;接收单元,设置为接收对所述密文或所述伪明文执行的解密操作,得到所述明文。
其中,所述显示模块,设置为利用独立于通信界面的对话框显示所述明文。
其中,所述销毁模块,设置为记录所述明文的显示的时长,如果所述明文的显示的时长达到预先设置的时间阈值,则销毁所述明文;或者,获取用户的操作行为信息,如果所述操作行为信息符合预先设置的操作明文的行为,则销毁所述明文。
其中,所述用户的操作行为信息包括对触摸屏的操作行为信息、对按键的操作行为信息、传感器的运动状态信息、体感信息、手势信息、光线信息和声音信息中的至少一个。
一种移动终端,包括处理器和显示屏,其中:所述处理器,包括:获取模块,设置为在接收到密文后,获取所述密文对应的明文;显示模块,设置为将所述明文发送给所述显示屏;销毁模块,设置为当检测得到的信息符合 预先设置的信息销毁条件时,销毁所述明文;显示屏,设置为显示所述明文。
其中,所述获取模块包括:显示单元,设置为将所述密文或所述密文对应的伪明文发送给所述显示屏;接收单元,设置为接收对所述密文或所述伪明文执行的解密操作,得到所述明文;其中,所述显示屏还设置为显示所述密文或所述伪明文。
其中,所述显示模块,设置为利用独立于通信界面的对话框显示所述明文。
其中,所述销毁模块,设置为记录所述明文的显示的时长,如果所述明文的显示的时长达到预先设置的时间阈值,则销毁所述明文;或者,获取用户的操作行为信息,如果所述操作行为信息符合预先设置的操作明文的行为,则销毁所述明文。
其中,所述用户的操作行为信息包括对触摸屏的操作行为信息、对按键的操作行为信息、传感器的运动状态信息、体感信息、手势信息、光线信息和声音信息中的至少一个。
本发明实施例还提供一种计算机可读存储介质,存储有程序指令,当该程序指令被执行时可实现上述方法。
本发明实施例,在获取到密文后,通过获取密文对应的明文,并显示所述明文,并在信息符合信息销毁文件时,销毁所述明文,使得人们不需要设定复杂的锁屏密码,设置很短的自动屏幕保护时间,也不需要时刻记住要退出重要信息的显示界面,减少用户操作步骤,提升用户体验同时增强安全性和操作效果,而且可防止后台截取、破解,防止一些访客用户偷看,转移重要的隐私数据,而且这种保护方式也随着传感器和手势操作等更多的人为因素,更少的数字识别因素增加了安全性和便捷性。
在阅读并理解了附图和详细描述后,可以明白其他方面。
附图概述
图1为本发明实施例提供的数据的保护方法的流程示意图;
图2为本发明实施例提供的数据的保护方法的应用实例的流程示意图;
图3为本发明实施例提供的数据的保护装置的结构示意图;
图4为本发明实施例提供的移动终端实施例的结构示意图。
本发明的较佳实施方式
图1为本发明实施例提供的数据的保护方法的流程示意图。图1所示方法包括:
步骤101、在接收到密文后,获取所述密文对应的明文;
步骤102、显示所述明文;
步骤103、当检测得到的信息符合预先设置的信息销毁条件时,销毁所述明文。
下面对本发明实施例提供的方法实施例作进行说明:
其中,所述获取所述密文对应的明文,包括:显示所述密文或所述密文对应的伪明文;接收对所述密文或所述伪明文执行的解密操作,得到所述明文。
其中,上文提到的伪明文是指该密文对应的错误的明文,即伪装的明文,简称伪明文。
由上可以看出,通过显示密文或所述伪明文,提示用户对密文进行解密操作,以获取所述密文对应的明文。
其中,所述显示所述明文,包括:利用独立于通信界面的对话框显示所述明文。
利用独立的对话框独立于通信界面进行显示,方便对明文对应的明文的管理,使得通信界面上无需记录该明文的时间信息,保证重要信息的安全。
其中,所述当检测得到的信息符合预先设置的信息销毁条件时,销毁所述明文,包括:
记录所述明文的显示的时长,如果所述明文的显示的时长达到预先设置的时间阈值,则销毁所述明文;或者,
获取用户的操作行为信息,如果所述操作行为信息符合预先设置的操作 明文的行为,则销毁所述明文。
此处,以显示的时长和用户的操作行为信息为例来判断是否有盗取该重要信息的行为,因此,也可以设置其他条件来判断用户是否有盗取该重要信息的行为。
其中,所述用户的操作行为信息包括对触摸屏的操作行为信息、对按键的操作行为信息、传感器的运动状态信息、体感信息和手势信息中的至少一个。
由上可以看出,在移动设备解密后显示重要数据时弹出临时的独立的显示框,待用户阅读完后,通过任意触摸屏幕或者短按任意按键,确定用户已完成阅读,则数据显示框则销毁。当然,系统也自动监听传感器的运动方向和加速度或用户接下来实施的任意点击等触摸动作,此时系统判断是否获取相应的信息,一旦有则销毁显示框。也会根据内容的长短设置显示框的显示时间,进入倒计时,一旦时间到也会销毁显示框。
其中,在用户查看重要信息时,后台自动开始检测用户对触摸屏和按键的操作行为,监听传感器加速度等信息,在用户一旦有这些操作等信息后,确认所述动作符合机主的操作意愿,锁毁数据显示框保护重要数据,同时也可以防止恶意访客进行相关操作盗取用户重要信息,确保这些重要数据不被拍照,截屏,转发等。
这些动作同时也适用于声音识别、光线传感以防拍照等。
另外,用户在数据查看完成环节采用体感、手势等行为代替触摸方式完成查看操作,同时也监听重力感应等,达到预设阈值后则自动通过销毁数据查看窗口。
上述任意之一实施例中的生物特征包括但不限于具有识别效果的声音、声纹、压力、指纹、动作、手势等。
下面对以应用实施例对本发明实施例提供的方法作进一步说明:
图2为本发明实施例提供的数据的保护方法的应用实例的流程示意图。图2所示方法包括:
步骤201中,发送方输入数据发送给接收方,如果发送方用户是明文发送,则接收方采取普通方式查看内容,即在通话界面上直接显示;如果发送方用户采取密文发送形式,该项需要接收方用户采取解密后查看会话数据内容。
步骤202,如果接收方发现是普通数据,即非加密数据,则直接可以查看;如果接收方发现是密文数据,需要解密后查能查看;
步骤203,如果接收方发现是密文数据,则在解密后通过特殊的弹出界面的形式显示重要的数据内容;数据的内容不限于文本,还包括音频,图片,视频等等;
步骤204,对于密文数据,即使被访客或其它用户采取拍照/截屏/转发都只能对密文或伪装明文进行操作,对用户重要数据不构成安全威胁;
步骤205及206步骤中,在用户解密后以特定弹出界面查看消息时,则启动光线、声音、温度、速度、压力、屏幕点击和装置按键按压等指标的监控,如果有这些操作,则极有可能是用户已经查看完消息,需要退出此重要数据的查看界面;也有可能此时是其它非法用户强行或暗自在进行数据的窃取,比如在抢压手机、进行拍照或截屏等需要终端按健操作时。
步骤207中,在明文内容弹出框消失后,将明文还原成密文。上述操作是在一定的兼容度上进行的,即在传感器检测到对应的操作后,只有任何一种传感器检测到触发动作后,且该动作的指标数值达到一定的阀值才会进行解密操作,以便既不影响用户正在查看的数据,又不会导致粗心而导致数据丢失。一旦弹出框消失,想要再次查看重要数据,则需要再次采取相应的解密操作后才能查看。
图3为本发明实施例提供的数据的保护装置的结构示意图。结合图1和图2所示的方法,图3所示装置包括获取模块301、显示模块302和销毁模块303,其中:
获取模块301,设置为在接收到密文后,获取所述密文对应的明文;
显示模块302,设置为显示所述明文;
销毁模块303,设置为当检测得到的信息符合预先设置的信息销毁条件时,销毁所述明文。
其中,所述获取模块301包括:
显示单元,设置为显示所述密文或所述密文对应的伪明文;
接收单元,设置为接收对所述密文或所述伪明文执行的解密操作,得到所述明文。
其中,所述显示模块302设置为利用独立于通信界面的对话框显示所述明文。
其中,所述销毁模块303,设置为记录所述明文的显示的时长,如果所述明文的显示的时长达到预先设置的时间阈值,则销毁所述明文;或者,获取用户的操作行为信息,如果所述操作行为信息符合预先设置的操作明文的行为,则销毁所述明文。
其中,所述用户的操作行为信息包括对触摸屏的操作行为信息、对按键的操作行为信息、传感器的运动状态信息、体感信息和手势信息中的至少一个。
图4为本发明实施例提供的移动终端实施例的结构示意图。图4所示移动终端包括处理器41和显示屏42,其中:
所述处理器41,包括:
获取模块411,设置为在接收到密文后,获取所述密文对应的明文;
显示模块412,设置为将所述明文发送给所述显示屏;
销毁模块413,设置为当检测得到的信息符合预先设置的信息销毁条件时,销毁所述明文;
显示屏42,用于显示所述明文。
其中,所述获取模块411包括:
显示单元,设置为将所述密文或所述密文对应的伪明文发送给所述显示屏;
接收单元,设置为接收对所述密文或所述伪明文执行的解密操作,得到所述明文;
其中,所述显示屏42,还设置为显示所述密文或所述伪明文。
其中,所述显示模块412,设置为利用独立于通信界面的对话框显示所述明文。
其中,所述销毁模块413,设置为记录所述明文的显示的时长,如果所述明文的显示的时长达到预先设置的时间阈值,则销毁所述明文;或者,获取用户的操作行为信息,如果所述操作行为信息符合预先设置的操作明文的行为,则销毁所述明文。
其中,所述用户的操作行为信息包括对触摸屏的操作行为信息、对按键的操作行为信息、传感器的运动状态信息、体感信息和手势信息中的至少一个。
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序来指令相关硬件完成,上述程序可以存储于计算机可读存储介质中,如只读存储器、磁盘或光盘等。可选地,上述实施例的全部或部分步骤也可以使用一个或多个集成电路来实现。相应地,上述实施例中的各模块/单元可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。本发明实施例不限制于任何特定形式的硬件和软件的结合。
工业实用性
在获取到密文后,通过获取密文对应的明文,并显示所述明文,并在信息符合信息销毁文件时,销毁所述明文,使得人们不需要设定复杂的锁屏密码,设置很短的自动屏幕保护时间,也不需要时刻记住要退出重要信息的显示界面,减少用户操作步骤,提升用户体验同时增强安全性和操作效果,而且进一步防止后台截取、破解,防止一些访客用户偷看,转移重要的隐私数据,而且这种保护方式也随着传感器和手势操作等更多的人为因素,更少的数字识别因素增加了安全性和便捷性。

Claims (16)

  1. 一种数据的保护方法,包括:
    在接收到密文后,获取所述密文对应的明文;
    显示所述明文;
    当检测得到的信息符合预先设置的信息销毁条件时,销毁所述明文。
  2. 根据权利要求1所述的方法,其中,所述获取所述密文对应的明文,包括:
    显示所述密文或所述密文对应的伪明文;
    接收对所述密文或所述伪明文执行的解密操作,得到所述明文。
  3. 根据权利要求1所述的方法,其中,所述显示所述明文,包括:
    利用独立于通信界面的对话框显示所述明文。
  4. 根据权利要求1所述的方法,其中,所述当检测得到的信息符合预先设置的信息销毁条件时,销毁所述明文,包括:
    记录所述明文的显示的时长,如果所述明文的显示的时长达到预先设置的时间阈值,则销毁所述明文;或者,
    获取用户的操作行为信息,如果所述操作行为信息符合预先设置的操作明文的行为,则销毁所述明文。
  5. 根据权利要求4所述的方法,其中,所述用户的操作行为信息包括对触摸屏的操作行为信息、对按键的操作行为信息、传感器的运动状态信息、体感信息、手势信息、光线信息和声音信息中的至少一个。
  6. 一种数据的保护装置,包括:
    获取模块,设置为在接收到密文后,获取所述密文对应的明文;
    显示模块,设置为显示所述明文;
    销毁模块,设置为当检测得到的信息符合预先设置的信息销毁条件时,销毁所述明文。
  7. 根据权利要求6所述的装置,其中,所述获取模块包括:
    显示单元,设置为显示所述密文或所述密文对应的伪明文;
    接收单元,设置为接收对所述密文或所述伪明文执行的解密操作,得到所述明文。
  8. 根据权利要求6所述的装置,其中,所述显示模块,是设置为:
    利用独立于通信界面的对话框显示所述明文。
  9. 根据权利要求6所述的装置,其中,所述销毁模块,是设置为:
    记录所述明文的显示的时长,如果所述明文的显示的时长达到预先设置的时间阈值,则销毁所述明文;或者,
    获取用户的操作行为信息,如果所述操作行为信息符合预先设置的操作明文的行为,则销毁所述明文。
  10. 根据权利要求9所述的装置,其中,所述用户的操作行为信息包括对触摸屏的操作行为信息、对按键的操作行为信息、传感器的运动状态信息、体感信息、手势信息、光线信息和声音信息中的至少一个。
  11. 一种移动终端,其中,包括处理器和显示屏,其中:
    所述处理器,包括:
    获取模块,设置为在接收到密文后,获取所述密文对应的明文;
    显示模块,设置为将所述明文发送给所述显示屏;以及
    销毁模块,设置为当检测得到的信息符合预先设置的信息销毁条件时,销毁所述明文;
    所述显示屏,设置为显示所述明文。
  12. 根据权利要求11所述的移动终端,其中:
    所述获取模块包括:
    显示单元,设置为将所述密文或所述密文对应的伪明文发送给所述显示屏;以及
    接收单元,设置为接收对所述密文或所述伪明文执行的解密操作,得到所述明文;
    其中,所述显示屏还设置为显示所述密文或所述伪明文。
  13. 根据权利要求11所述的移动终端,其中,所述显示模块,是设置为:
    利用独立于通信界面的对话框显示所述明文。
  14. 根据权利要求11所述的移动终端,其中,所述销毁模块,是设置为:
    记录所述明文的显示的时长,如果所述明文的显示的时长达到预先设置的时间阈值,则销毁所述明文;或者,
    获取用户的操作行为信息,如果所述操作行为信息符合预先设置的操作明文的行为,则销毁所述明文。
  15. 根据权利要求11所述的移动终端,其中,所述用户的操作行为信息包括对触摸屏的操作行为信息、对按键的操作行为信息、传感器的运动状态信息、体感信息、手势信息、光线信息和声音信息中的至少一个。
  16. 一种计算机可读存储介质,存储有程序指令,当该程序指令被执行时可实现权利要求1-5任一项所述的方法。
PCT/CN2015/086886 2015-01-27 2015-08-13 一种数据的保护方法、装置和移动终端 WO2016119437A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510041965.X 2015-01-27
CN201510041965.XA CN105991513A (zh) 2015-01-27 2015-01-27 一种数据的保护方法、装置和移动终端

Publications (1)

Publication Number Publication Date
WO2016119437A1 true WO2016119437A1 (zh) 2016-08-04

Family

ID=56542309

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/086886 WO2016119437A1 (zh) 2015-01-27 2015-08-13 一种数据的保护方法、装置和移动终端

Country Status (2)

Country Link
CN (1) CN105991513A (zh)
WO (1) WO2016119437A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556199B (zh) * 2020-04-26 2021-04-13 上海掌门科技有限公司 一种在社交应用中呈现背景的方法与设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335615A (zh) * 2008-05-30 2008-12-31 北京飞天诚信科技有限公司 用于usb key音频加解密装置密钥协商的方法
CN101556635A (zh) * 2009-05-15 2009-10-14 西安擎天软件科技有限公司 一种基于Internet的保障电脑安全的防盗追踪方法
CN102045387A (zh) * 2010-11-08 2011-05-04 于琨洪 一种基于浏览器的新型2人单独即时聊天方法
CN103619002A (zh) * 2013-12-16 2014-03-05 北京百纳威尔科技有限公司 手机远程安全保护的方法
CN104243439A (zh) * 2013-11-12 2014-12-24 新华瑞德(北京)网络科技有限公司 文件传输处理方法、系统及终端

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1319988A (zh) * 2000-03-28 2001-10-31 Wetree.com有限公司 利用在线网络的民事证明文件发放系统
CA2604014A1 (en) * 2005-04-11 2006-10-19 Last-Mile Communications Limited Method and device for communication using random codes
CN101345624B (zh) * 2007-07-09 2012-02-29 李树德 一种文件访问系统及其文件访问方法
CN101399813B (zh) * 2007-09-24 2011-08-17 中国移动通信集团公司 身份联合方法
CN101471920A (zh) * 2007-12-27 2009-07-01 深圳市华盛博文科技有限公司 一种简单安全地实现指纹识别系统管理功能的装置和方法
CN101266706B (zh) * 2008-04-09 2011-07-06 拉卡拉(中国)电子支付技术服务有限公司 可按需定制的支付终端
CN101714123B (zh) * 2008-10-07 2011-09-21 上海众人网络安全技术有限公司 可保证信息安全的文件移动存储设备的实现方法
JP4784877B2 (ja) * 2009-02-17 2011-10-05 コニカミノルタビジネステクノロジーズ株式会社 画像形成装置及び通信制御方法
CN102170448A (zh) * 2011-05-04 2011-08-31 无锡锐视清信息技术有限公司 一种基于云媒体发行平台的版权保护系统、多媒体数据发送接收设备及方法
CN102595392A (zh) * 2011-11-15 2012-07-18 吴晓平 一种基于环境效益监测传感器网络的信息处理方法及其系统和设备
CN103763687B (zh) * 2014-01-13 2017-01-25 国家电网公司 一种具有加密功能的电力专用智能信息收发方法及系统
CN103942472B (zh) * 2014-04-14 2016-09-14 立德高科(北京)数码科技有限责任公司 用于屏蔽非授权使用者启动软件的方法及装置
CN103973790A (zh) * 2014-05-09 2014-08-06 中国电子科技集团公司第三十研究所 一种网络中存储的Web应用数据自动销毁的方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335615A (zh) * 2008-05-30 2008-12-31 北京飞天诚信科技有限公司 用于usb key音频加解密装置密钥协商的方法
CN101556635A (zh) * 2009-05-15 2009-10-14 西安擎天软件科技有限公司 一种基于Internet的保障电脑安全的防盗追踪方法
CN102045387A (zh) * 2010-11-08 2011-05-04 于琨洪 一种基于浏览器的新型2人单独即时聊天方法
CN104243439A (zh) * 2013-11-12 2014-12-24 新华瑞德(北京)网络科技有限公司 文件传输处理方法、系统及终端
CN103619002A (zh) * 2013-12-16 2014-03-05 北京百纳威尔科技有限公司 手机远程安全保护的方法

Also Published As

Publication number Publication date
CN105991513A (zh) 2016-10-05

Similar Documents

Publication Publication Date Title
JP4931924B2 (ja) メディアデータ処理装置及びメディアデータ処理方法
US20090300368A1 (en) User interface for secure data entry
WO2016095623A1 (zh) 监控录像处理方法及装置
US8954605B1 (en) System and method for providing controlled communications
US20190065790A1 (en) Method Of Displaying Content On A Screen Of An Electronic Processing Device
CN104885082B (zh) 终端和数据信息的隐藏保护方法
KR102474243B1 (ko) 사용자 디바이스에 보안 모드를 제공하기 위한 방법 및 장치
US10311215B2 (en) Secure recording and rendering of encrypted multimedia content
CN104270353B (zh) 一种信息安全传递方法及系统、接收终端、发送终端
KR20190081297A (ko) 사물 인터넷 기반의 영상 송신 장치 및 영상 수신 장치를 포함하는 영상 처리 시스템 및 이를 이용한 영상 처리 방법
Pell You can't always get what you want: how will law enforcement get what it needs in a post-CALEA, Cybsecurity-Centric Encryption Era
US10019590B2 (en) Secure mobile phone document storage application
US9225514B2 (en) Method for image encryption and decryption incorporating physiological features and image capture device thereof
CN107147636A (zh) 邮件传输方法及装置
US9372965B2 (en) Methods and apparatus for displaying simulated digital content
US20090268056A1 (en) Digital camera with portrait image protecting function and portrait image protecting method thereof
WO2016119437A1 (zh) 一种数据的保护方法、装置和移动终端
WO2023046104A1 (zh) 对象移动方法、装置
Pfefferkorn Everything radiates: Does the fourth amendment regulate side-channel cryptanalysis
Chen et al. MobiWear: a plausibly deniable encryption system for wearable mobile devices
CN108696355B (zh) 一种防止用户头像盗用的方法及系统
CN111177770A (zh) 一种敏感信息的保护方法、移动设备及存储装置
GB2540138A (en) Method of exchanging digital content
EP3038298A1 (en) A computer-implemented method for protecting classified content on a computing device and computer programs thereof
CN114006721B (zh) 电子邮件的风险检测方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15879636

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15879636

Country of ref document: EP

Kind code of ref document: A1