WO2017071324A1 - 传输文件的加密和解密方法及加密和解密装置 - Google Patents

传输文件的加密和解密方法及加密和解密装置 Download PDF

Info

Publication number
WO2017071324A1
WO2017071324A1 PCT/CN2016/091081 CN2016091081W WO2017071324A1 WO 2017071324 A1 WO2017071324 A1 WO 2017071324A1 CN 2016091081 W CN2016091081 W CN 2016091081W WO 2017071324 A1 WO2017071324 A1 WO 2017071324A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
mobile terminal
module
key
transmitted
Prior art date
Application number
PCT/CN2016/091081
Other languages
English (en)
French (fr)
Inventor
张海平
周意保
Original Assignee
广东欧珀移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广东欧珀移动通信有限公司 filed Critical 广东欧珀移动通信有限公司
Publication of WO2017071324A1 publication Critical patent/WO2017071324A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Definitions

  • the present invention relates to the field of encryption and decryption technologies, and in particular, to a method and a method for encrypting and decrypting a transmission file.
  • the Internet and the mobile Internet have become an inseparable part of people's lives. While the Internet brings various conveniences and speeds, the leakage of users' personal privacy has also become the focus of attention.
  • the instant chat software or even the communication tool does not encrypt the file content itself when the file is transferred, that is, any other person can open the view and obtain the content as long as the file is obtained. This is very bad security. If you need to pass some confidential files through live chat software, or if the computer is invaded by others, some valuable personal privacy or confidential documents may be easily leaked.
  • an object of the present invention is to provide a method for encrypting and decrypting a transmission file and an encryption and decryption device, which aim to solve the problem that a private file of an Internet user in the prior art has a large security problem.
  • the embodiment of the present invention provides the following technical solutions:
  • the present invention provides an encryption method for transmitting a file, and the encryption method of the transmission file includes the following steps:
  • the present invention also provides a method for decrypting a transmission file, the method for decrypting the transmission file comprising the following steps:
  • the present invention also provides an encryption device for transmitting a file, the encryption device for transmitting the file comprising:
  • a receiving module configured to receive a file to be transmitted and a file transfer instruction, where the file transfer instruction carries a key target user identifier
  • a key obtaining module configured to acquire, according to the key target user identifier, a key for encrypting the file to be transmitted;
  • An encryption module configured to encrypt the file to be transmitted by using the key
  • a transmission module configured to transmit the encrypted file to be transmitted to the receiver mobile terminal according to the file transmission instruction.
  • the present invention also provides a decryption device for transferring a file, the decryption device for transferring the file comprising:
  • a receiving module configured to receive an encrypted file sent by the sending mobile terminal and decrypt the specified user identifier
  • a key obtaining module configured to acquire a key for decrypting the encrypted file according to the decrypted specified user identifier
  • a decryption module configured to decrypt the encrypted file by using the decrypted key
  • the file open module is used to decrypt the file, and the file is opened.
  • the present invention also provides a mobile terminal including the encryption device for transmitting a file as described above.
  • the present invention also provides a mobile terminal including the decryption device for transmitting a file as described above.
  • the encryption and decryption method and the encryption and decryption device of the transmission file of the present invention encrypt the file according to the specified eyeball information when transmitting the file, and then transmit the encrypted file to the receiving mobile terminal.
  • the receiving mobile terminal acquires the specified eyeball information to decrypt the received encrypted file, and only after the decryption is successful, the file can be opened for viewing. Therefore, the present invention can ensure the security of the network transmission file, which is convenient and fast, and greatly improves the user experience.
  • FIG. 1 is a schematic flowchart of an implementation method of an encryption method for transmitting a file according to Embodiment 1 of the present invention
  • FIG. 2 is a schematic flowchart of an implementation method of encrypting a transmission file according to Embodiment 2 of the present invention
  • FIG. 3 is a schematic flowchart of an implementation method of encrypting a transmission file according to Embodiment 3 of the present invention.
  • FIG. 4 is a schematic flowchart showing an implementation process of a method for decrypting a transmission file according to Embodiment 4 of the present invention
  • FIG. 5 is a schematic flowchart showing an implementation process of a method for decrypting a transmission file according to Embodiment 5 of the present invention
  • FIG. 6 is a schematic flowchart showing an implementation process of a method for decrypting a transmission file according to Embodiment 6 of the present invention
  • FIG. 7 is a schematic structural diagram of an apparatus for encrypting a transmission file according to Embodiment 7 of the present invention.
  • FIG. 8 is a schematic structural diagram of an apparatus for encrypting a transmission file according to Embodiment 8 of the present invention.
  • FIG. 9 is a schematic structural diagram of an apparatus for encrypting a transmission file according to Embodiment 9 of the present invention.
  • FIG. 10 is a schematic structural diagram of a device for decrypting a transmission file according to Embodiment 10 of the present invention.
  • FIG. 11 is a schematic structural diagram of a device for decrypting a transmission file according to Embodiment 11 of the present invention.
  • FIG. 12 is a schematic structural diagram of a device for decrypting a transmission file according to Embodiment 12 of the present invention.
  • FIG. 13 is a schematic structural diagram of a mobile terminal according to Embodiment 13 of the present invention.
  • the method for encrypting and decrypting transmission files and the encryption and decryption device provided by the invention are mainly applied to terminal devices, such as mobile phones, computers, personal digital assistants (Personal Digital) Assistant, PDA), etc.
  • terminal devices such as mobile phones, computers, personal digital assistants (Personal Digital) Assistant, PDA), etc.
  • FIG. 1 a method for encrypting a transmission file according to an embodiment of the present invention is shown.
  • the method for encrypting the transmission file is applied to the mobile terminal device, and specifically includes the following steps:
  • step S101 a file to be transmitted and a file transfer instruction are received, where the file transfer instruction carries a key target user identifier
  • the method further includes: determining whether the file to be transmitted includes a preset keyword; if it is determined that the file to be transmitted includes a preset key And determining that the file to be transmitted is a file that needs to be encrypted, and then executing step S102.
  • the keywords can be “contract”, “agreement”, “important”, etc., and can be set according to user requirements.
  • the file to be transmitted After receiving the file to be transmitted, it is determined whether the file content contains the word "contract", and if the "contract" is included, it is determined that the file to be transmitted is a file that needs to be encrypted. At this time, according to the specified user information, the eyeball information of the specified user is acquired as a key for encrypting the file to be transmitted.
  • step S102 acquiring a key for encrypting the file to be transmitted according to the key target user identifier
  • the eyeball information of the specified user is obtained as a key for encrypting the file to be transmitted according to the specified user information.
  • eyeball information includes, but is not limited to, iris information, scleral information, and the like.
  • step S103 the file to be transmitted is encrypted by using the key
  • the file to be transmitted is encrypted by using the eyeball information of the specified user.
  • step S104 the encrypted file to be transmitted is transmitted to the recipient mobile terminal according to the file transmission instruction.
  • the present invention can ensure the security of the network transmission file, which is convenient and fast, and greatly improves the user experience.
  • FIG. 2 a method for encrypting a transmission file according to an embodiment of the present invention is shown.
  • the method for encrypting the transmission file is applied to the mobile terminal device, and specifically includes the following steps:
  • step S201 a file to be transmitted and a file transfer instruction are received, where the file transfer instruction carries a key target user identifier
  • the method further includes: determining whether the file to be transmitted includes a preset keyword; if it is determined that the file to be transmitted includes a preset key And determining that the file to be transmitted is a file that needs to be encrypted, and then performing step S202.
  • the file to be transmitted does not include a preset keyword, the file is directly transmitted to the recipient mobile terminal without encryption.
  • step S202 according to the key target user identifier, open an eyeball collection module of the sender mobile terminal;
  • the specified user is the local mobile phone user
  • the eyeball collection module of the local mobile phone is turned on.
  • step S203 the eyeball information of the sender mobile terminal user is collected by the eyeball collection module
  • step S204 the file to be transmitted is encrypted by using the collected eyeball information of the sender mobile terminal user.
  • the file to be transmitted is encrypted by using the eyeball information of the local mobile phone user.
  • step S205 the encrypted file to be transmitted is transmitted to the recipient mobile terminal according to the file transmission instruction.
  • the eyeball information of the specified user is directly read from the mobile terminal according to the key target user identifier (ie, the specified user information). And encrypting the file to be transmitted, and encrypting the file to be transmitted by using the eyeball information of the specified user.
  • the present invention when the file is transmitted, the local eyeball collection module is turned on, and the eyeball information of the user of the mobile terminal is collected; the file is encrypted according to the eyeball information, and then encrypted and then sent to the mobile terminal of the receiver. Therefore, the present invention can ensure the security of the network transmission file, which is convenient and fast, and greatly improves the user experience.
  • FIG. 3 a method for encrypting a transmission file according to an embodiment of the present invention is shown.
  • the method for encrypting the transmission file is applied to the mobile terminal device, and specifically includes the following steps:
  • step S301 a file to be transmitted and a file transfer instruction are received, where the file transfer instruction carries a key target user identifier
  • the method further includes: determining whether the file to be transmitted includes a preset keyword; if it is determined that the file to be transmitted includes a preset key And determining that the file to be transmitted is a file that needs to be encrypted, and executing step S302.
  • the file to be transmitted does not include a preset keyword, the file is directly transmitted to the recipient mobile terminal without encryption.
  • step S302 the video window of the sender mobile terminal is opened according to the key target user identifier
  • the eyeball information of the recipient mobile terminal user is collected through the video window of the sender mobile terminal.
  • step S303 collecting eyeball information of the mobile terminal user of the receiving party through the video window
  • eyeball information includes, but is not limited to, iris information, scleral information, and the like.
  • step S304 the collected file of the mobile terminal user of the receiving party is used to encrypt the file to be transmitted.
  • step S305 the encrypted file to be transmitted is transmitted to the recipient mobile terminal according to the file transmission instruction.
  • the present invention can ensure the security of the network transmission file, which is convenient and fast, and greatly improves the user experience.
  • FIG. 4 a method for decrypting a transmission file according to an embodiment of the present invention is shown.
  • the method for decrypting the transmission file is applied to the mobile terminal device, and specifically includes the following steps:
  • step S401 receiving an encrypted file sent by the sender mobile terminal and decrypting the specified user identifier
  • the received encrypted file is a file obtained by encrypting using the above-mentioned encryption method of the transmission file.
  • step S402 acquiring a key for decrypting the encrypted file according to the decrypted specified user identifier
  • step S403 the encrypted file is decrypted by using the decrypted key
  • the method further includes: determining whether the number of times of decryption failure exceeds a preset threshold within a preset time; if decrypting If the number of failures exceeds a preset threshold, the encrypted file is deleted.
  • step S404 if the decryption is successful, the file is opened.
  • the file is opened for the user to view; when the modification instruction is received, the modification operation corresponding to the modification instruction is not executed.
  • the file cannot be opened, and the encrypted file is deleted.
  • FIG. 5 a method for decrypting a transmission file according to an embodiment of the present invention is shown.
  • the method for decrypting the transmission file is applied to the mobile terminal device, and specifically includes the following steps:
  • step S501 receiving an encrypted file sent by the sender mobile terminal and decrypting the specified user identifier
  • step S502 according to the decryption designation user identifier, the eyeball collection module of the recipient mobile terminal is turned on;
  • the decryption designation user identifier is the user information of the receiver mobile terminal
  • the eyeball collection module of the receiver mobile terminal is started, and the eyeball information of the receiver mobile terminal user is collected.
  • the decrypted key is the decrypted key
  • step S503 the eyeball information of the user of the mobile terminal of the receiving party is collected by the eyeball collection module;
  • step S504 the encrypted file is decrypted by using the collected eyeball information of the recipient mobile terminal user.
  • the method further includes: determining whether the number of times of decryption failure exceeds a preset threshold within a preset time; if the number of decryption failures exceeds a preset threshold , the encrypted file is deleted.
  • step S505 if the decryption is successful, the file is opened.
  • the file cannot be opened, and the encrypted file is deleted.
  • the receiving mobile terminal decrypts the received encrypted file according to the specified eyeball information, and only if the decryption is successful, the file can be opened for viewing; if the decryption fails, the file cannot be opened and deleted.
  • the encrypted file Therefore, the present invention can ensure the security of the network transmission file, which is convenient and fast, and greatly improves the user experience.
  • FIG. 6 a method for decrypting a transmission file according to an embodiment of the present invention is shown.
  • the method for decrypting the transmission file is applied to the mobile terminal device, and specifically includes the following steps:
  • step S601 receiving an encrypted file sent by the sender mobile terminal and decrypting the specified user identifier
  • the received encrypted file is a file obtained by encrypting using the above-mentioned encryption method of the transmission file.
  • step S602 receiving eyeball information sent by the sender mobile terminal, and acquiring eyeball information according to the decrypted specified user identifier, wherein the eyeball information is eyeball information of the sender mobile terminal user;
  • the eyeball information of the sender mobile terminal user is obtained as a decrypted key.
  • step S603 the encrypted file is decrypted by using the acquired eyeball information of the sender mobile terminal user.
  • the method further includes: determining whether the number of times of decryption failure exceeds a preset threshold within a preset time; if the number of decryption failures exceeds a preset threshold , the encrypted file is deleted.
  • step S604 if the decryption is successful, the file is opened.
  • the file cannot be opened, and the encrypted file is deleted.
  • FIG. 7 is a schematic structural diagram of an apparatus for encrypting a transmission file according to Embodiment 7 of the present invention; for convenience of description, only parts related to the embodiment of the present invention are shown.
  • the encryption device for transmitting the file includes: a receiving module 101, a key obtaining module 102, an encryption module 103, and a transmission module 104.
  • the encryption device for transmitting the file may be a software unit, a hardware unit, or a combination of software and hardware built in the mobile terminal.
  • the receiving module 101 is configured to receive a file to be transmitted and a file transfer instruction, where the file transfer instruction carries a key target user identifier;
  • the key obtaining module 102 is configured to acquire, according to the key target user identifier, a key for encrypting the file to be transmitted;
  • the encryption module 103 is configured to encrypt the file to be transmitted by using the key
  • the transmission module 104 is configured to transmit the encrypted file to be transmitted to the receiver mobile terminal according to the file transmission instruction.
  • the encryption device for transmitting the file further includes: a determining module.
  • the receiving module 101 receives the file to be transmitted and the file transfer instruction, and after the file transfer instruction carries the key target user identifier, the determining module determines whether the file to be transmitted includes a preset keyword;
  • the key obtaining module is configured to: if the determining module determines that the file to be transmitted includes a preset keyword, determine that the file to be transmitted is a file that needs to be encrypted, and perform obtaining to perform the file to be transmitted. Encrypted key.
  • FIG. 8 is a schematic structural diagram of an apparatus for encrypting a transmission file according to Embodiment 8 of the present invention; for convenience of description, only parts related to the embodiment of the present invention are shown.
  • the encryption device for transmitting the file includes: a receiving module 201, an opening module 202, an eyeball collecting module 203, an encryption module 204, and a transmission module 205.
  • the encryption device for transmitting the file may be a software unit, a hardware unit, or a combination of software and hardware built in the mobile terminal.
  • the receiving module 201 is configured to receive a file to be transmitted and a file transfer instruction, where the file transfer instruction carries a key target user identifier;
  • the opening module 202 is configured to start an eyeball collection module of the sender mobile terminal according to the key target user identifier
  • the eyeball collection module 203 is configured to collect eyeball information of the mobile terminal user of the sender
  • the encryption module 204 is specifically configured to encrypt the file to be transmitted by using the collected eyeball information of the sender mobile terminal user.
  • the transmission module 205 is configured to transmit the encrypted file to be transmitted to the receiver mobile terminal according to the file transmission instruction.
  • FIG. 9 is a schematic structural diagram of an apparatus for encrypting a transmission file according to Embodiment 9 of the present invention; for convenience of description, only parts related to the embodiment of the present invention are shown.
  • the encryption device for transmitting the file includes: a receiving module 301, a video window opening module 302, a video collecting module 303, an encryption module 304, and a transmission module 305.
  • the encryption device for transmitting the file may be a software unit, a hardware unit, or a combination of software and hardware built in the mobile terminal.
  • the receiving module 301 is configured to receive a file to be transmitted and a file transfer instruction, where the file transfer instruction carries a key target user identifier;
  • the video window opening module 302 is configured to open a video window of the sender mobile terminal according to the key target user identifier
  • the video capture module 303 is configured to collect, by using the video window, eyeball information of the mobile terminal user of the receiver;
  • the encryption module 304 is specifically configured to encrypt the file to be transmitted by using the collected eyeball information of the mobile terminal user of the receiving party.
  • the transmission module 305 is configured to transmit the encrypted file to be transmitted to the receiver mobile terminal according to the file transmission instruction.
  • FIG. 10 is a schematic structural diagram of an apparatus for encrypting a transmission file according to Embodiment 10 of the present invention; for convenience of description, only parts related to the embodiment of the present invention are shown.
  • the encryption device for transmitting the file includes: a receiving module 401, a key obtaining module 402, a decrypting module 403, and a file opening module 404.
  • the encryption device for transmitting the file may be a software unit, a hardware unit, or a combination of software and hardware built in the mobile terminal.
  • the receiving module 401 is configured to receive an encrypted file sent by the sending mobile terminal and decrypt the specified user identifier.
  • the key obtaining module 402 is configured to acquire a key for decrypting the encrypted file according to the decrypted specified user identifier.
  • a decryption module 403 configured to decrypt the encrypted file by using the decrypted key
  • the file opening module 404 for decryption success, opens the file.
  • the decrypting device for transmitting the file further includes: a number determining module.
  • the number determining module is configured to determine whether the number of decryption failures exceeds a preset threshold within a preset time; the file deletion module uses And when the number of times determining module determines that the number of times of decryption failure exceeds a preset threshold, deleting the encrypted file.
  • the decrypting device for transmitting the file further includes: a control module;
  • the file opening module is specifically used to open the file for the user to view after successful decryption
  • control module configured to, when receiving the modification instruction, control not to perform a modification operation corresponding to the modification instruction.
  • FIG. 11 is a schematic structural diagram of an apparatus for encrypting a transmission file according to Embodiment 11 of the present invention; for convenience of description, only parts related to the embodiment of the present invention are shown.
  • the encryption device for transmitting the file includes: a receiving module 501, an opening module 502, an eyeball collecting module 503, a decrypting module 504, and a file opening module 505.
  • the encryption device for transmitting the file may be a software unit, a hardware unit, or a combination of software and hardware built in the mobile terminal.
  • the receiving module 501 is configured to receive an encrypted file sent by the sender mobile terminal and decrypt the specified user identifier.
  • the opening module 502 is configured to: open an eyeball collection module of the mobile terminal of the receiving party according to the decrypted specified user identifier;
  • the eyeball collection module 503 is configured to collect eyeball information of the mobile terminal user of the receiving party;
  • the decryption module 504 is specifically configured to decrypt the encrypted file by using the collected eyeball information of the mobile terminal user of the recipient.
  • the file opening module 505, for decryption success, opens the file.
  • the decrypting device for transmitting the file further includes: a number determining module.
  • the number determining module is configured to determine whether the number of times of decryption failure exceeds a preset threshold within a preset time; and the file deletion module is configured to: The number determining module determines that the number of times the decryption fails exceeds a preset threshold, and deletes the encrypted file.
  • the decrypting device for transmitting the file further includes: a control module;
  • the file opening module is specifically used to open the file for the user to view after successful decryption
  • control module configured to, when receiving the modification instruction, control not to perform a modification operation corresponding to the modification instruction.
  • FIG. 12 is a schematic structural diagram of an apparatus for encrypting a transmission file according to Embodiment 12 of the present invention; for convenience of description, only parts related to the embodiment of the present invention are shown.
  • the encryption device for transmitting the file includes: a receiving module 601, a key obtaining module 602, a decrypting module 603, and a file opening module 604.
  • the encryption device for transmitting the file may be a software unit, a hardware unit, or a combination of software and hardware built in the mobile terminal.
  • the receiving module 601 is configured to receive an encrypted file sent by the sending mobile terminal and decrypt the specified user identifier.
  • the key acquisition module 602 is specifically configured to receive and obtain eyeball information sent by the sender mobile terminal according to the decrypted specified user identifier, where the eyeball information is eyeball information of the mobile terminal user of the sender;
  • the decryption module 603 is specifically configured to decrypt the encrypted file by using the acquired eyeball information of the sender mobile terminal user.
  • the file opening module 604 for decryption success, opens the file.
  • the decrypting device for transmitting the file further includes: a number determining module.
  • the number determining module is configured to determine whether the number of times of decryption failure exceeds a preset threshold within a preset time; and the file deletion module is configured to: The number determining module determines that the number of times the decryption fails exceeds a preset threshold, and deletes the encrypted file.
  • the decrypting device for transmitting the file further includes: a control module;
  • the file opening module is specifically used to open the file for the user to view after successful decryption
  • control module configured to, when receiving the modification instruction, control not to perform a modification operation corresponding to the modification instruction.
  • the encryption and decryption method and the encryption and decryption device of the transmission file of the present invention encrypt the file according to the specified eyeball information when the file is transmitted, encrypt it, and then send it to the mobile terminal of the receiving party, and the receiving mobile terminal acquires the designation.
  • the eyeball information is used to decrypt the received encrypted file. Only when the decryption is successful can the file be opened for viewing. Therefore, the present invention can ensure the security of the network transmission file, which is convenient and fast, and greatly improves the user experience.
  • the encryption and decryption method and the encryption and decryption device of the transmission file provided by the embodiment of the present invention belong to the same concept, and the specific implementation process thereof is described in the full text of the specification, and details are not described herein again.
  • FIG. 13 is a block diagram showing a specific structure of a mobile terminal according to Embodiment 13 of the present invention.
  • the mobile terminal can be used to implement the encryption and decryption method and the encryption and decryption apparatus of the transmission file provided in the foregoing embodiment.
  • the mobile terminal 1200 can be a smartphone or a tablet.
  • the mobile terminal 1200 may include RF (Radio) Frequency (RF) circuit 110, memory 120 including one or more (only one shown) computer readable storage medium, input unit 130, display unit 140, sensor 150, audio circuit 160, transmission module 170, including There are one or more (only one shown in the figure) processing core processor 180 and power supply 190 and the like. It will be understood by those skilled in the art that the structure of the mobile terminal 1200 shown in FIG. 13 does not constitute a limitation of the mobile terminal 1200, and may include more or less components than those illustrated, or combine some components, or different components. Arrangement. among them:
  • the RF circuit 110 is configured to receive and transmit electromagnetic waves, and realize mutual conversion between electromagnetic waves and electrical signals, thereby communicating with a communication network or other devices.
  • the RF circuit 110 may include various existing circuit elements for performing these functions, such as an antenna, a radio frequency transceiver, a digital signal processor, an encryption/decryption chip, a Subscriber Identity Module (SIM) card, a memory, and the like.
  • SIM Subscriber Identity Module
  • the RF circuit 110 can communicate with various networks such as the Internet, an intranet, a wireless network, or communicate with other devices over a wireless network.
  • the wireless network described above may include a cellular telephone network, a wireless local area network, or a metropolitan area network.
  • the above wireless networks may use various communication standards, protocols and technologies, including but not limited to global mobile communication systems (Global System for Mobile Communication, GSM), Enhanced Data GSM Environment (Enhanced Data GSM Environment, EDGE), Wideband Code Division Multiple Access (WCDMA), Code Division Multiple Access (Code) Division Access, CDMA), Time Division Multiple Access (Time Division Multiple Access, TDMA), Wireless Fidelity (Wi-Fi) (eg American Institute of Electrical and Electronics Engineers Standard IEEE 802.11a, IEEE) 802.11b, IEEE802.11g and/or IEEE 802.11n), Voice over Internet Protocol (Voice over Internet Protocol, VoIP), Worldwide Interoperability for Microwave Access, Wi-Max, other protocols for mail, instant messaging, and short messages, as well as any other suitable communication protocol, may even include protocols that are not currently being developed.
  • GSM Global System for Mobile Communication
  • EDGE Enhanced Data GSM Environment
  • WCDMA Wideband Code Division Multiple Access
  • Code Division Multiple Access Code Division Multiple Access
  • CDMA Code Division Multiple Access
  • Time Division Multiple Access
  • the memory 120 can be used to store software programs and modules, such as the encryption and decryption methods of the transfer files and the program instructions/modules corresponding to the encryption and decryption devices in the above embodiments, and the processor 180 runs the software programs and modules stored in the memory 120. Thereby performing various functional applications and data processing, that is, implementing the function of encrypting and decrypting the transmitted file.
  • Memory 120 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid state memory.
  • memory 120 can further include memory remotely located relative to processor 180, which can be connected to mobile terminal 1200 via a network. Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • the input unit 130 can be configured to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function controls.
  • input unit 130 can include touch-sensitive surface 131 as well as other input devices 132.
  • Touch-sensitive surface 131 also referred to as a touch display or trackpad, can collect touch operations on or near the user (such as a user using a finger, stylus, etc., on any suitable object or accessory on touch-sensitive surface 131 or The operation near the touch-sensitive surface 131) and driving the corresponding connecting device according to a preset program.
  • the touch-sensitive surface 131 can include two portions of a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 180 is provided and can receive commands from the processor 180 and execute them.
  • the touch-sensitive surface 131 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 130 can also include other input devices 132.
  • other input devices 132 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 140 can be used to display information input by the user or information provided to the user and various graphical user interfaces of the mobile terminal 1200, which can be composed of graphics, text, icons, video, and any combination thereof.
  • the display unit 140 may include a display panel 141, and optionally, an LCD (Liquid may be used) Crystal Display, LCD (Organic Light-Emitting)
  • the display panel 141 is configured in the form of a Diode, an organic light emitting diode, or the like.
  • touch-sensitive surface 131 may cover the display panel 141, and when the touch-sensitive surface 131 detects a touch operation thereon or nearby, it is transmitted to the processor 180 to determine the type of the touch event, and then the processor 180 according to the touch event The type provides a corresponding visual output on display panel 141.
  • touch-sensitive surface 131 and display panel 141 are implemented as two separate components to implement input and input functions, in some embodiments, touch-sensitive surface 131 can be integrated with display panel 141 for input. And output function.
  • Mobile terminal 1200 may also include at least one type of sensor 150, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 141 according to the brightness of the ambient light, and the proximity sensor may close the display panel 141 when the mobile terminal 1200 moves to the ear. And / or backlight.
  • the gravity acceleration sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • Other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, and the like that can be configured in the mobile terminal 1200 are not described herein.
  • the audio circuit 160, the speaker 161, and the microphone 162 can provide an audio interface between the user and the mobile terminal 1200.
  • the audio circuit 160 can transmit the converted electrical data of the received audio data to the speaker 161 for conversion to the sound signal output by the speaker 161; on the other hand, the microphone 162 converts the collected sound signal into an electrical signal by the audio circuit 160. After receiving, it is converted into audio data, and then processed by the audio data output processor 180, transmitted to the terminal, for example, via the RF circuit 110, or outputted to the memory 120 for further processing.
  • the audio circuit 160 may also include an earbud jack to provide communication of the peripheral earphones with the mobile terminal 1200.
  • the mobile terminal 1200 can help the user to send and receive emails, browse web pages, access streaming media, etc. through the transmission module 170 (eg, Wi-Fi module), which provides wireless broadband Internet access to the user.
  • the transmission module 170 eg, Wi-Fi module
  • FIG. 13 shows the transmission module 170, it can be understood that it does not belong to the essential configuration of the mobile terminal 1200, and may be omitted as needed within the scope of not changing the essence of the invention.
  • the processor 180 is a control center of the mobile terminal 1200 that connects various portions of the entire handset with various interfaces and lines, by running or executing software programs and/or modules stored in the memory 120, and recalling data stored in the memory 120.
  • the various functions and processing data of the mobile terminal 1200 are executed to perform overall monitoring of the mobile phone.
  • the processor 180 may include one or more processing cores; preferably, the processor 180 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It can be understood that the above modem processor may not be integrated into the processor 180.
  • the mobile terminal 1200 also includes a power source 190 (such as a battery) for powering various components.
  • the power source can be logically connected to the processor 180 through the power management system to manage functions such as charging, discharging, and power management through the power management system.
  • Power supply 190 may also include any one or more of a DC or AC power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
  • the mobile terminal 1200 may further include a camera, a Bluetooth module, and the like, and details are not described herein.
  • the display unit of the mobile terminal is a touch screen display
  • the mobile terminal further includes a memory, and one or more programs, wherein one or more programs are stored in the memory and configured to be one or one
  • the above processor executes one or more programs that include instructions for performing the following operations:
  • the mobile terminal provided by the embodiment of the present invention may be applied to the foregoing corresponding method embodiment.
  • the program may be stored in a computer readable storage medium, and the storage medium may include: Read only memory (ROM, Read Only Memory), Random Access Memory (RAM), disk or CD.
  • ROM Read only memory
  • RAM Random Access Memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

本发明提供传输文件的加密方法:接收待传输的文件及文件传输指令;根据密钥目标用户标识,获取对待传输的文件进行加密的密钥;采用密钥对待传输的文件加密;根据文件传输指令,将加密后的待传输的文件传输至接收方移动终端。本发明能确保网络传输文件的安全性,既方便又快捷,极大的提高用户的使用体验。

Description

传输文件的加密和解密方法及加密和解密装置
本申请要求于2015年10月28日提交中国专利局、申请号为201510719602.7、发明名称为“传输文件的加密和解密方法及加密和解密装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及加解密技术领域,尤其涉及一种传输文件的加密和解密方法及加密和解密装置。
背景技术
随着社会的发展,互联网以及移动互联网已经成为人们生活中,密不可分的一部分,在互联网带来各种方便与快捷的同时,用户个人隐私的泄露也成为了关注的焦点。在现有技术中,即时聊天软件或即使通讯工具在文件传输的时候都没有对文件内容本身进行加密,也就是说任何其他人只要获取到这个文件就能够正常打开查看,获取其中的内容。这样安全性很差,如果需要通过即时聊天软件传递一些机密文件,或者电脑被别人入侵,那么一些有价值的个人隐私或者机密文件可能就很容易泄露。
因此,在相关技术中应用互联网用户的私密文件存在较大的安全问题。
技术问题
有鉴于此,本发明的目的在于提供一种传输文件的加密和解密方法及加密和解密装置,旨在解决现有技术中应用互联网用户的私密文件存在较大的安全问题。
技术解决方案
为解决上述技术问题,本发明实施例提供了以下技术方案:
本发明提供了一种传输文件的加密方法,所述传输文件的加密方法包括以下步骤:
接收待传输的文件以及文件传输指令,所述文件传输指令中携带有密钥目标用户标识;
根据所述密钥目标用户标识,获取对所述待传输的文件进行加密的密钥;
采用所述密钥对所述待传输的文件进行加密;
根据所述文件传输指令,将加密后的所述待传输的文件传输至接收方移动终端。
本发明还提供了一种传输文件的解密方法,所述传输文件的解密方法包括以下步骤:
接收发送方移动终端发送的加密文件及解密指定用户标识;
根据所述解密指定用户标识,获取对所述加密文件进行解密的密钥;
采用所述解密的密钥,对所述加密文件进行解密;
解密成功,则打开所述文件。
本发明还提供了一种传输文件的加密装置,所述传输文件的加密装置包括:
接收模块,用于接收待传输的文件以及文件传输指令,所述文件传输指令中携带有密钥目标用户标识;
密钥获取模块,用于根据所述密钥目标用户标识,获取对所述待传输的文件进行加密的密钥;
加密模块,用于采用所述密钥对所述待传输的文件进行加密;
传输模块,用于根据所述文件传输指令,将加密后的所述待传输的文件传输至接收方移动终端。
本发明还提供了一种传输文件的解密装置,所述传输文件的解密装置包括:
接收模块,用于接收发送方移动终端发送的加密文件及解密指定用户标识;
密钥获取模块,用于根据所述解密指定用户标识,获取对所述加密文件进行解密的密钥;
解密模块,用于采用所述解密的密钥,对所述加密文件进行解密;
文件打开模块,用于解密成功,则打开所述文件。
本发明还提供了一种包括上面所述的传输文件的加密装置的移动终端。
本发明还提供了一种包括上面所述的传输文件的解密装置的移动终端。
有益效果
相对于现有技术,本发明的传输文件的加密和解密方法及加密和解密装置,通过在传输文件时,根据指定的眼球信息对所述文件进行加密,加密后再发送给接收方移动终端,接收方移动终端获取指定的眼球信息,来对接收到的加密文件进行解密,只有解密成功,才能打开文件进行查看。因此,本发明能确保网络传输文件的安全性,既方便又快捷,极大的提高用户的使用体验。
附图说明
图1是本发明实施例一提供的传输文件的加密方法的实现流程示意图;
图2是本发明实施例二提供的传输文件的加密方法的实现流程示意图;
图3是本发明实施例三提供的传输文件的加密方法的实现流程示意图;
图4是本发明实施例四提供的传输文件的解密方法的实现流程示意图;
图5是本发明实施例五提供的传输文件的解密方法的实现流程示意图;
图6是本发明实施例六提供的传输文件的解密方法的实现流程示意图;
图7是本发明实施例七提供的传输文件的加密装置的结构示意图;
图8是本发明实施例八提供的传输文件的加密装置的结构示意图;
图9是本发明实施例九提供的传输文件的加密装置的结构示意图;
图10是本发明实施例十提供的传输文件的解密装置的结构示意图;
图11是本发明实施例十一提供的传输文件的解密装置的结构示意图;
图12是本发明实施例十二提供的传输文件的解密装置的结构示意图;
图13是本发明实施例十三提供的移动终端的结构示意图。
本发明的最佳实施方式
具体实施方式
请参照附图中的图式,其中相同的组件符号代表相同的组件,本发明的原理是以实施在一适当的运算环境中来举例说明。以下的说明是基于所示例的本发明的具体实施例,其不应被视为限制本发明未在此详述的其它具体实施例。
本发明原理以上述文字来说明,其并不代表为一种限制,本领域技术人员将可了解到以下所述的多种步骤及操作亦可实施在硬件当中。本发明的原理使用许多其它泛用性或特定目的运算、通信环境或组态来进行操作。
本发明提供的传输文件的加密和解密方法及加密和解密装置,主要应用于终端设备,如:手机、电脑、个人数字助理(Personal Digital Assistant,PDA)等。
以下将分别进行详细说明。
实施例一
请参阅图1,所示为本发明实施例提供的传输文件的加密方法。
所述传输文件的加密方法,应用于移动终端设备中,具体包括如下步骤:
在步骤S101中,接收待传输的文件以及文件传输指令,所述文件传输指令中携带有密钥目标用户标识;
在本发明实施例中,在接收到待传输的文件的步骤之后,还包括:判断所述待传输的文件是否包括预设的关键字;如果判断出所述待传输的文件包括预设的关键字,确定所述待传输的文件为需要加密的文件,则执行步骤S102。
然而,可以理解的是,关键字可以是“合同”、“协议”、“重要”等等,可根据用户要求自行设定。
例如,在接收到待传输的文件之后,判断所述文件内容中是否包含有“合同”二个字,如果包含有“合同”,则确定所述待传输的文件为需要加密的文件。这时,根据指定用户信息,获取所述指定用户的眼球信息作为对所述待传输的文件进行加密的密钥。
然而,可以理解的是,如果判断出所述文件内容中不包含“合同”二个字,则不用加密,直接将文件传输至接收方移动终端。
在步骤S102中,根据所述密钥目标用户标识,获取对所述待传输的文件进行加密的密钥;
在本发明实施例中,根据指定用户信息,获取所述指定用户的眼球信息作为对所述待传输的文件进行加密的密钥。例如,眼球信息包括但不限于;虹膜信息、巩膜信息等等。
在步骤S103中,采用所述密钥对所述待传输的文件进行加密;
在本发明实施例中,采用指定用户的眼球信息,对所述待传输的文件进行加密。
在步骤S104中,根据所述文件传输指令,将加密后的所述待传输的文件传输至接收方移动终端。
由上可知,本实施例通过在传输文件时,根据指定的眼球信息对所述文件进行加密,加密后再发送给接收方移动终端。因此,本发明能确保网络传输文件的安全性,既方便又快捷,极大的提高用户的使用体验。
实施例二
请参阅图2,所示为本发明实施例提供的传输文件的加密方法。
所述传输文件的加密方法,应用于移动终端设备中,具体包括如下步骤:
在步骤S201中,接收待传输的文件以及文件传输指令,所述文件传输指令中携带有密钥目标用户标识;
在本发明实施例中,在接收到待传输的文件的步骤之后,还包括:判断所述待传输的文件是否包括预设的关键字;如果判断出所述待传输的文件包括预设的关键字,确定所述待传输的文件为需要加密的文件,则执行步骤S202。
然而,可以理解的是,如果判断出所述待传输的文件不包括预设的关键字,则不用加密,直接将文件传输至接收方移动终端。
在步骤S202中,根据所述密钥目标用户标识,开启发送方移动终端的眼球采集模块;
在本发明实施例中,根据指定用户信息,如指定的用户为本端手机用户,那么,开启本端手机(发送方移动终端)的眼球采集模块。
在步骤S203中,通过所述眼球采集模块,采集发送方移动终端用户的眼球信息;
在步骤S204中,采用采集到的发送方移动终端用户的眼球信息,对所述待传输的文件进行加密。
在本发明实施例中,采用本端手机用户的眼球信息,对所述待传输的文件进行加密。
在步骤S205中,根据所述文件传输指令,将加密后的所述待传输的文件传输至接收方移动终端。
然而,可以理解的是,如果指定的用户信息预先保存在移动终端中,那么,根据所述密钥目标用户标识(即指定的用户信息),从移动终端中直接读取指定用户的眼球信息作为对所述待传输的文件进行加密的密钥,采用该指定用户的眼球信息,对所述待传输的文件进行加密。
由上可知,本实施例通过在传输文件时,开启本端眼球采集模块,采集本移动终端用户的眼球信息;根据该眼球信息对所述文件进行加密,加密后再发送给接收方移动终端。因此,本发明能确保网络传输文件的安全性,既方便又快捷,极大的提高用户的使用体验。
实施例三
请参阅图3,所示为本发明实施例提供的传输文件的加密方法。
所述传输文件的加密方法,应用于移动终端设备中,具体包括如下步骤:
在步骤S301中,接收待传输的文件以及文件传输指令,所述文件传输指令中携带有密钥目标用户标识;
在本发明实施例中,在接收到待传输的文件的步骤之后,还包括:判断所述待传输的文件是否包括预设的关键字;如果判断出所述待传输的文件包括预设的关键字,确定所述待传输的文件为需要加密的文件,则执行步骤S302。
然而,可以理解的是,如果判断出所述待传输的文件不包括预设的关键字,则不用加密,直接将文件传输至接收方移动终端。
在步骤S302中,根据所述密钥目标用户标识,开启发送方移动终端的视频窗口;
在本发明实施例中,当密钥目标用户为接收方移动终端用户时,那么通过发送方移动终端的视频窗口,来采集接收方移动终端用户的眼球信息。
在步骤S303中,通过所述视频窗口采集接收方移动终端用户的眼球信息;
在本发明实施例中,例如,眼球信息包括但不限于;虹膜信息、巩膜信息等等。
在步骤S304中,采用采集到的接收方移动终端用户的眼球信息,对所述待传输的文件进行加密。
在步骤S305中,根据所述文件传输指令,将加密后的所述待传输的文件传输至接收方移动终端。
由上可知,本实施例通过在传输文件时,开启视频窗口,采集接收方移动终端用户的眼球信息作为加密密钥;根据该眼球信息对所述文件进行加密,加密后再发送给接收方移动终端。因此,本发明能确保网络传输文件的安全性,既方便又快捷,极大的提高用户的使用体验。
实施例四
请参阅图4,所示为本发明实施例提供的传输文件的解密方法。
所述传输文件的解密方法,应用于移动终端设备中,具体包括如下步骤:
在步骤S401中,接收发送方移动终端发送的加密文件及解密指定用户标识;
在本发明实施例中,接收到的加密文件是采用上述传输文件的加密方法进行加密得到的文件。
在步骤S402中,根据所述解密指定用户标识,获取对所述加密文件进行解密的密钥;
在步骤S403中,采用所述解密的密钥,对所述加密文件进行解密;
在本发明实施例中,采用所述解密的密钥,对所述加密文件进行解密的步骤之后,还包括:判断在预设的时间内,解密失败的次数是否超过预设的阈值;如果解密失败的次数超过预设的阈值,则删除所述加密文件。
在步骤S404中,解密成功,则打开所述文件。
在本发明实施例中,解密成功后,打开所述文件供接收方用户查看;当接收到修改指令时,不执行所述修改指令对应的修改操作。
然而,可以理解的是,如果解密失败,则无法打开所述文件。
进一步的,如果解密失败,则无法打开所述文件,并且删除所述加密文件。
由上可知,本实施例接收方移动终端根据指定的眼球信息,来对接收到的加密文件进行解密,只有解密成功,才能打开文件进行查看;如果解密失败,则无法打开所述文件,并且删除所述加密文件。因此,本发明能确保网络传输文件的安全性,既方便又快捷,极大的提高用户的使用体验。
实施例五
请参阅图5,所示为本发明实施例提供的传输文件的解密方法。
所述传输文件的解密方法,应用于移动终端设备中,具体包括如下步骤:
在步骤S501中,接收发送方移动终端发送的加密文件及解密指定用户标识;
在本发明实施例中,接收到的加密文件是采用上述传输文件的加密方法进行加密得到的文件。
在步骤S502中,根据所述解密指定用户标识,开启接收方移动终端的眼球采集模块;
在本发明实施例中,当所述解密指定用户标识为接收方移动终端的用户信息时,根据该用户信息,开启接收方移动终端的眼球采集模块,采集接收方移动终端用户的眼球信息,以作为解密的密钥。
在步骤S503中,通过所述眼球采集模块,采集接收方移动终端用户的眼球信息;
在步骤S504中,采用采集到的接收方移动终端用户的眼球信息,对所述加密文件进行解密。
在本发明实施例中,对所述加密文件进行解密的步骤之后,还包括:判断在预设的时间内,解密失败的次数是否超过预设的阈值;如果解密失败的次数超过预设的阈值,则删除所述加密文件。
在步骤S505中,解密成功,则打开所述文件。
在本发明实施例中,解密成功后,打开所述文件供接收方用户查看;当接收到修改指令时,不执行所述修改指令对应的修改操作。
然而,可以理解的是,如果解密失败,则无法打开所述文件。
进一步的,如果解密失败,则无法打开所述文件,并且删除所述加密文件。
由上可知,本实施例接收方移动终端根据指定的眼球信息,来对接收到的加密文件进行解密,只有解密成功,才能打开文件进行查看;如果解密失败,则无法打开所述文件,并且删除所述加密文件。因此,本发明能确保网络传输文件的安全性,既方便又快捷,极大的提高用户的使用体验。
实施例六
请参阅图6,所示为本发明实施例提供的传输文件的解密方法。
所述传输文件的解密方法,应用于移动终端设备中,具体包括如下步骤:
在步骤S601中,接收发送方移动终端发送的加密文件及解密指定用户标识;
在本发明实施例中,接收到的加密文件是采用上述传输文件的加密方法进行加密得到的文件。
在步骤S602中,接收发送方移动终端发送的眼球信息,并根据解密指定用户标识获取眼球信息,其中,所述眼球信息为发送方移动终端用户的眼球信息;
在本发明实施例中,当解密指定用户标识为发送方移动终端的用户信息,那么获取发送方移动终端用户的眼球信息,以作为解密的密钥。
在步骤S603中,采用获取到的发送方移动终端用户的眼球信息,对所述加密文件进行解密。
在本发明实施例中,对所述加密文件进行解密的步骤之后,还包括:判断在预设的时间内,解密失败的次数是否超过预设的阈值;如果解密失败的次数超过预设的阈值,则删除所述加密文件。
在步骤S604中,解密成功,则打开所述文件。
在本发明实施例中,解密成功后,打开所述文件供接收方用户查看;当接收到修改指令时,不执行所述修改指令对应的修改操作。
然而,可以理解的是,如果解密失败,则无法打开所述文件。
进一步的,如果解密失败,则无法打开所述文件,并且删除所述加密文件。
由上可知,本实施例接收方移动终端根据指定的眼球信息,来对接收到的加密文件进行解密,只有解密成功,才能打开文件进行查看;如果解密失败,则无法打开所述文件,并且删除所述加密文件。因此,本发明能确保网络传输文件的安全性,既方便又快捷,极大的提高用户的使用体验。
实施例七
请参阅图7,为本发明实施例七提供的传输文件的加密装置的结构示意图;为了便于说明,仅示出了与本发明实施例相关的部分。所述传输文件的加密装置包括:接收模块101、密钥获取模块102、加密模块103、以及传输模块104。所述传输文件的加密装置可以是内置于移动终端中的软件单元、硬件单元或者是软硬件结合的单元。
接收模块101,用于接收待传输的文件以及文件传输指令,所述文件传输指令中携带有密钥目标用户标识;
密钥获取模块102,用于根据所述密钥目标用户标识,获取对所述待传输的文件进行加密的密钥;
加密模块103,用于采用所述密钥对所述待传输的文件进行加密;
传输模块104,用于根据所述文件传输指令,将加密后的所述待传输的文件传输至接收方移动终端。
在本发明实施例中,所述传输文件的加密装置还包括:判断模块。
即在接收模块101接收待传输的文件以及文件传输指令,所述文件传输指令中携带有密钥目标用户标识后,通过判断模块来判断所述待传输的文件是否包括预设的关键字;密钥获取模块,具体用于如果所述判断模块判断出所述待传输的文件包括预设的关键字,确定所述待传输的文件为需要加密的文件,执行获取对所述待传输的文件进行加密的密钥。
实施例八
请参阅图8,为本发明实施例八提供的传输文件的加密装置的结构示意图;为了便于说明,仅示出了与本发明实施例相关的部分。所述传输文件的加密装置包括:接收模块201、开启模块202、眼球采集模块203、加密模块204、以及传输模块205。所述传输文件的加密装置可以是内置于移动终端中的软件单元、硬件单元或者是软硬件结合的单元。
接收模块201,用于接收待传输的文件以及文件传输指令,所述文件传输指令中携带有密钥目标用户标识;
开启模块202,用于根据所述密钥目标用户标识,开启发送方移动终端的眼球采集模块;
眼球采集模块203,用于采集发送方移动终端用户的眼球信息;
加密模块204,具体用于采用采集到的发送方移动终端用户的眼球信息,对所述待传输的文件进行加密。
传输模块205,用于根据所述文件传输指令,将加密后的所述待传输的文件传输至接收方移动终端。
实施例九
请参阅图9,为本发明实施例九提供的传输文件的加密装置的结构示意图;为了便于说明,仅示出了与本发明实施例相关的部分。所述传输文件的加密装置包括:接收模块301、视频窗口开启模块302、视频采集模块303、加密模块304、以及传输模块305。所述传输文件的加密装置可以是内置于移动终端中的软件单元、硬件单元或者是软硬件结合的单元。
接收模块301,用于接收待传输的文件以及文件传输指令,所述文件传输指令中携带有密钥目标用户标识;
视频窗口开启模块302,用于根据所述密钥目标用户标识,开启发送方移动终端的视频窗口;
视频采集模块303,用于通过所述视频窗口采集接收方移动终端用户的眼球信息;
加密模块304,具体用于采用采集到的接收方移动终端用户的眼球信息,对所述待传输的文件进行加密。
传输模块305,用于根据所述文件传输指令,将加密后的所述待传输的文件传输至接收方移动终端。
实施例十
请参阅图10,为本发明实施例十提供的传输文件的加密装置的结构示意图;为了便于说明,仅示出了与本发明实施例相关的部分。所述传输文件的加密装置包括:接收模块401、密钥获取模块402、解密模块403、以及文件打开模块404。所述传输文件的加密装置可以是内置于移动终端中的软件单元、硬件单元或者是软硬件结合的单元。
接收模块401,用于接收发送方移动终端发送的加密文件及解密指定用户标识;
密钥获取模块402,用于根据所述解密指定用户标识,获取对所述加密文件进行解密的密钥;
解密模块403,用于采用所述解密的密钥,对所述加密文件进行解密;
文件打开模块404,用于解密成功,则打开所述文件。
在本发明实施例中,所述传输文件的解密装置还包括:次数判断模块。
即当解密模块403采用所述解密的密钥对所述加密文件进行解密;次数判断模块,用于判断在预设的时间内,解密失败的次数是否超过预设的阈值;文件删除模块,用于所述次数判断模块判断出解密失败的次数超过预设的阈值,则删除所述加密文件。
在本发明实施例中,所述传输文件的解密装置还包括:控制模块;
文件打开模块,具体用于解密成功后,打开所述文件供接收方用户查看;
控制模块,用于当接收到修改指令时,控制不执行所述修改指令对应的修改操作。
实施例十一
请参阅图11,为本发明实施例十一提供的传输文件的加密装置的结构示意图;为了便于说明,仅示出了与本发明实施例相关的部分。所述传输文件的加密装置包括:接收模块501、开启模块502、眼球采集模块503、解密模块504、以及文件打开模块505。所述传输文件的加密装置可以是内置于移动终端中的软件单元、硬件单元或者是软硬件结合的单元。
接收模块501,用于接收发送方移动终端发送的加密文件及解密指定用户标识;
开启模块502,用于根据所述解密指定用户标识,开启接收方移动终端的眼球采集模块;
眼球采集模块503,用于采集接收方移动终端用户的眼球信息;
解密模块504,具体用于采用采集到的接收方移动终端用户的眼球信息,对所述加密文件进行解密。
文件打开模块505,用于解密成功,则打开所述文件。
在本发明实施例中,所述传输文件的解密装置还包括:次数判断模块。
即当解密模块采用所述解密的密钥对所述加密文件进行解密;次数判断模块,用于判断在预设的时间内,解密失败的次数是否超过预设的阈值;文件删除模块,用于所述次数判断模块判断出解密失败的次数超过预设的阈值,则删除所述加密文件。
在本发明实施例中,所述传输文件的解密装置还包括:控制模块;
文件打开模块,具体用于解密成功后,打开所述文件供接收方用户查看;
控制模块,用于当接收到修改指令时,控制不执行所述修改指令对应的修改操作。
实施例十二
请参阅图12,为本发明实施例十二提供的传输文件的加密装置的结构示意图;为了便于说明,仅示出了与本发明实施例相关的部分。所述传输文件的加密装置包括:接收模块601、密钥获取模块602、解密模块603、以及文件打开模块604。所述传输文件的加密装置可以是内置于移动终端中的软件单元、硬件单元或者是软硬件结合的单元。
接收模块601,用于接收发送方移动终端发送的加密文件及解密指定用户标识;
密钥获取模块602,具体用于根据所述解密指定用户标识,接收并获取发送方移动终端发送的眼球信息,其中,所述眼球信息为发送方移动终端用户的眼球信息;
解密模块603,具体用于采用获取到的发送方移动终端用户的眼球信息,对所述加密文件进行解密。
文件打开模块604,用于解密成功,则打开所述文件。
在本发明实施例中,所述传输文件的解密装置还包括:次数判断模块。
即当解密模块采用所述解密的密钥对所述加密文件进行解密;次数判断模块,用于判断在预设的时间内,解密失败的次数是否超过预设的阈值;文件删除模块,用于所述次数判断模块判断出解密失败的次数超过预设的阈值,则删除所述加密文件。
在本发明实施例中,所述传输文件的解密装置还包括:控制模块;
文件打开模块,具体用于解密成功后,打开所述文件供接收方用户查看;
控制模块,用于当接收到修改指令时,控制不执行所述修改指令对应的修改操作。
本发明的传输文件的加密和解密方法及加密和解密装置,通过在传输文件时,根据指定的眼球信息对所述文件进行加密,加密后再发送给接收方移动终端,接收方移动终端获取指定的眼球信息,来对接收到的加密文件进行解密,只有解密成功,才能打开文件进行查看。因此,本发明能确保网络传输文件的安全性,既方便又快捷,极大的提高用户的使用体验。
本发明实施例提供的传输文件的加密和解密方法及加密和解密装置属于同一构思,其具体实现过程详见说明书全文,此处不再赘述。
实施例十三
图13示出了本发明实施例十三提供的移动终端的具体结构框图,该移动终端可以用于实施上述实施例中提供的传输文件的加密和解密方法及加密和解密装置。该移动终端1200可以为智能手机或平板电脑。
如图13所示,移动终端1200可以包括RF(Radio Frequency,射频)电路110、包括有一个或一个以上(图中仅示出一个)计算机可读存储介质的存储器120、输入单元130、显示单元140、传感器150、音频电路160、传输模块170、包括有一个或者一个以上(图中仅示出一个)处理核心的处理器180以及电源190等部件。本领域技术人员可以理解,图13中示出的移动终端1200结构并不构成对移动终端1200的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。其中:
RF电路110用于接收以及发送电磁波,实现电磁波与电信号的相互转换,从而与通讯网络或者其他设备进行通讯。RF电路110可包括各种现有的用于执行这些功能的电路元件,例如,天线、射频收发器、数字信号处理器、加密/解密芯片、用户身份模块(SIM)卡、存储器等等。RF电路110可与各种网络如互联网、企业内部网、无线网络进行通讯或者通过无线网络与其他设备进行通讯。上述的无线网络可包括蜂窝式电话网、无线局域网或者城域网。上述的无线网络可以使用各种通信标准、协议及技术,包括但并不限于全球移动通信系统(Global System for Mobile Communication, GSM)、增强型移动通信技术(Enhanced Data GSM Environment, EDGE),宽带码分多址技术(Wideband Code Division Multiple Access, WCDMA),码分多址技术(Code Division Access, CDMA)、时分多址技术(Time Division Multiple Access, TDMA),无线保真技术(Wireless Fidelity, Wi-Fi)(如美国电气和电子工程师协会标准 IEEE 802.11a, IEEE 802.11b, IEEE802.11g 和/或 IEEE 802.11n)、网络电话(Voice over Internet Protocol, VoIP)、全球微波互联接入(Worldwide Interoperability for Microwave Access, Wi-Max)、其他用于邮件、即时通讯及短消息的协议,以及任何其他合适的通讯协议,甚至可包括那些当前仍未被开发出来的协议。
存储器120可用于存储软件程序以及模块,如上述实施例中传输文件的加密和解密方法及加密和解密装置对应的程序指令/模块,处理器180通过运行存储在存储器120内的软件程序以及模块,从而执行各种功能应用以及数据处理,即实现传输文件的加密和解密的功能。存储器120可包括高速随机存储器,还可包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,存储器120可进一步包括相对于处理器180远程设置的存储器,这些远程存储器可以通过网络连接至移动终端1200。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
输入单元130可用于接收输入的数字或字符信息,以及产生与用户设置以及功能控制有关的键盘、鼠标、操作杆、光学或者轨迹球信号输入。具体地,输入单元130可包括触敏表面131以及其他输入设备132。触敏表面131,也称为触摸显示屏或者触控板,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触敏表面131上或在触敏表面131附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触敏表面131可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器180,并能接收处理器180发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触敏表面131。除了触敏表面131,输入单元130还可以包括其他输入设备132。具体地,其他输入设备132可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元140可用于显示由用户输入的信息或提供给用户的信息以及移动终端1200的各种图形用户接口,这些图形用户接口可以由图形、文本、图标、视频和其任意组合来构成。显示单元140可包括显示面板141,可选的,可以采用LCD(Liquid Crystal Display,液晶显示器)、OLED(Organic Light-Emitting Diode,有机发光二极管)等形式来配置显示面板141。进一步的,触敏表面131可覆盖显示面板141,当触敏表面131检测到在其上或附近的触摸操作后,传送给处理器180以确定触摸事件的类型,随后处理器180根据触摸事件的类型在显示面板141上提供相应的视觉输出。虽然在图13中,触敏表面131与显示面板141是作为两个独立的部件来实现输入和输入功能,但是在某些实施例中,可以将触敏表面131与显示面板141集成而实现输入和输出功能。
移动终端1200还可包括至少一种传感器150,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板141的亮度,接近传感器可在移动终端1200移动到耳边时,关闭显示面板141和/或背光。作为运动传感器的一种,重力加速度传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等; 至于移动终端1200还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路160、扬声器161,传声器162可提供用户与移动终端1200之间的音频接口。音频电路160可将接收到的音频数据转换后的电信号,传输到扬声器161,由扬声器161转换为声音信号输出;另一方面,传声器162将收集的声音信号转换为电信号,由音频电路160接收后转换为音频数据,再将音频数据输出处理器180处理后,经RF电路110以发送给比如另一终端,或者将音频数据输出至存储器120以便进一步处理。音频电路160还可能包括耳塞插孔,以提供外设耳机与移动终端1200的通信。
移动终端1200通过传输模块170(例如Wi-Fi模块)可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图13示出了传输模块170,但是可以理解的是,其并不属于移动终端1200的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。
处理器180是移动终端1200的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器120内的软件程序和/或模块,以及调用存储在存储器120内的数据,执行移动终端1200的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器180可包括一个或多个处理核心;优选的,处理器180可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器180中。
移动终端1200还包括给各个部件供电的电源190(比如电池),优选的,电源可以通过电源管理系统与处理器180逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。电源190还可以包括一个或一个以上的直流或交流电源、再充电系统、电源故障检测电路、电源转换器或者逆变器、电源状态指示器等任意组件。
尽管未示出,移动终端1200还可以包括摄像头、蓝牙模块等,在此不再赘述。具体在本实施例中,移动终端的显示单元是触摸屏显示器,移动终端还包括有存储器,以及一个或者一个以上的程序,其中一个或者一个以上程序存储于存储器中,且经配置以由一个或者一个以上处理器执行述一个或者一个以上程序包含用于进行以下操作的指令:
接收待传输的文件以及文件传输指令,所述文件传输指令中携带有密钥目标用户标识;
根据所述密钥目标用户标识,获取对所述待传输的文件进行加密的密钥;
采用所述密钥对所述待传输的文件进行加密;
根据所述文件传输指令,将加密后的所述待传输的文件传输至接收方移动终端。
以及,
接收发送方移动终端发送的加密文件及解密指定用户标识;
根据所述解密指定用户标识,获取对所述加密文件进行解密的密钥;
采用所述解密的密钥,对所述加密文件进行解密;
解密成功,则打开所述文件。
本发明实施例提供的移动终端可以应用在前述对应的方法实施例中,详情参见上述实施例的描述,在此不再赘述。
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读存储介质中,存储介质可以包括:只读存储器(ROM,Read Only Memory)、随机存取记忆体(RAM,Random Access Memory)、磁盘或光盘等。
综上所述,虽然本发明已以优选实施例揭露如上,但上述优选实施例并非用以限制本发明,本领域的普通技术人员,在不脱离本发明的精神和范围内,均可作各种更动与润饰,因此本发明的保护范围以权利要求界定的范围为准。

Claims (20)

  1. 一种传输文件的加密方法,其中所述传输文件的加密方法包括以下步骤:
    接收待传输的文件以及文件传输指令,所述文件传输指令中携带有密钥目标用户标识;
    根据所述密钥目标用户标识,获取对所述待传输的文件进行加密的密钥;
    采用所述密钥对所述待传输的文件进行加密;
    根据所述文件传输指令,将加密后的所述待传输的文件传输至接收方移动终端。
  2. 如权利要求1所述的传输文件的加密方法,其中在所述接收到待传输的文件的步骤之后,还包括:
    判断所述待传输的文件是否包括预设的关键字;
    如果判断出所述待传输的文件包括预设的关键字,确定所述待传输的文件为需要加密的文件,则执行所述获取对所述待传输的文件进行加密的密钥的步骤。
  3. 如权利要求1所述的传输文件的加密方法,其中所述获取对所述待传输的文件进行加密的密钥的步骤,具体包括:
    开启发送方移动终端的眼球采集模块;
    通过所述眼球采集模块,采集发送方移动终端用户的眼球信息;
    采用所述密钥对所述待传输的文件进行加密的步骤,具体包括:
    采用采集到的发送方移动终端用户的眼球信息,对所述待传输的文件进行加密。
  4. 如权利要求1所述的传输文件的加密方法,其中所述获取对所述待传输的文件进行加密的密钥的步骤,具体包括:
    开启发送方移动终端的视频窗口;
    通过所述视频窗口采集接收方移动终端用户的眼球信息;
    采用所述密钥对所述待传输的文件进行加密的步骤,具体包括:
    采用采集到的接收方移动终端用户的眼球信息,对所述待传输的文件进行加密。
  5. 一种传输文件的解密方法,其中所述传输文件的解密方法包括以下步骤:
    接收发送方移动终端发送的加密文件及解密指定用户标识;
    根据所述解密指定用户标识,获取对所述加密文件进行解密的密钥;
    采用所述解密的密钥,对所述加密文件进行解密;
    解密成功,则打开所述文件。
  6. 如权利要求5所述的传输文件的解密方法,其中当所述密钥为接收方移动终端用户的眼球信息时,所述获取对所述加密文件进行解密的密钥的步骤,具体包括:
    开启接收方移动终端的眼球采集模块;
    通过所述眼球采集模块,采集接收方移动终端用户的眼球信息;
    所述采用所述解密的密钥,对所述加密文件进行解密的步骤,具体包括:
    采用采集到的接收方移动终端用户的眼球信息,对所述加密文件进行解密。
  7. 如权利要求5所述的传输文件的解密方法,其中当所述密钥为发送方移动终端用户的眼球信息时,所述获取对所述加密文件进行解密的密钥的步骤,具体包括:
    接收并获取发送方移动终端发送的眼球信息,其中,所述眼球信息为发送方移动终端用户的眼球信息;
    所述采用所述解密的密钥,对所述加密文件进行解密的步骤,具体包括:
    采用获取到的发送方移动终端用户的眼球信息,对所述加密文件进行解密。
  8. 如权利要求5所述的传输文件的解密方法,其中采用所述解密的密钥,对所述加密文件进行解密的步骤之后,还包括:
    判断在预设的时间内,解密失败的次数是否超过预设的阈值;
    如果解密失败的次数超过预设的阈值,则删除所述加密文件。
  9. 如权利要求5所述的传输文件的解密方法,其中所述解密成功,则打开所述文件的步骤,具体包括:
    解密成功后,打开所述文件供接收方用户查看;
    当接收到修改指令时,不执行所述修改指令对应的修改操作。
  10. 一种传输文件的加密装置,其中所述传输文件的加密装置包括:
    接收模块,用于接收待传输的文件以及文件传输指令,所述文件传输指令中携带有密钥目标用户标识;
    密钥获取模块,用于根据所述密钥目标用户标识,获取对所述待传输的文件进行加密的密钥;
    加密模块,用于采用所述密钥对所述待传输的文件进行加密;
    传输模块,用于根据所述文件传输指令,将加密后的所述待传输的文件传输至接收方移动终端。
  11. 如权利要求10所述的传输文件的加密装置,其中所述传输文件的加密装置还包括:判断模块;
    判断模块,用于判断所述待传输的文件是否包括预设的关键字;
    密钥获取模块,具体用于如果所述判断模块判断出所述待传输的文件包括预设的关键字,确定所述待传输的文件为需要加密的文件,执行获取对所述待传输的文件进行加密的密钥。
  12. 如权利要求10所述的传输文件的加密装置,其中所述密钥获取模块具体包括:开启模块以及眼球采集模块;
    开启模块,用于开启发送方移动终端的眼球采集模块;
    眼球采集模块,用于采集发送方移动终端用户的眼球信息;
    加密模块,具体用于采用采集到的发送方移动终端用户的眼球信息,对所述待传输的文件进行加密。
  13. 如权利要求10所述的传输文件的加密装置,其中所述密钥获取模块具体包括:视频窗口开启模块以及视频采集模块;
    视频窗口开启模块,用于开启发送方移动终端的视频窗口;
    视频采集模块,用于通过所述视频窗口采集接收方移动终端用户的眼球信息;
    加密模块,具体用于采用采集到的接收方移动终端用户的眼球信息,对所述待传输的文件进行加密。
  14. 一种传输文件的解密装置,其中所述传输文件的解密装置包括:
    接收模块,用于接收发送方移动终端发送的加密文件及解密指定用户标识;
    密钥获取模块,用于根据所述解密指定用户标识,获取对所述加密文件进行解密的密钥;
    解密模块,用于采用所述解密的密钥,对所述加密文件进行解密;
    文件打开模块,用于解密成功,则打开所述文件。
  15. 如权利要求14所述的传输文件的解密装置,其中当所述密钥为接收方移动终端用户的眼球信息时,所述密钥获取模块具体包括:开启模块以及眼球采集模块;
    开启模块,用于开启接收方移动终端的眼球采集模块;
    眼球采集模块,用于采集接收方移动终端用户的眼球信息;
    解密模块,具体用于采用采集到的接收方移动终端用户的眼球信息,对所述加密文件进行解密。
  16. 如权利要求14所述的传输文件的解密装置,其中
    密钥获取模块,具体用于接收并获取发送方移动终端发送的眼球信息,其中,所述眼球信息为发送方移动终端用户的眼球信息;
    解密模块,具体用于采用获取到的发送方移动终端用户的眼球信息,对所述加密文件进行解密。
  17. 如权利要求14所述的传输文件的解密装置,其中所述传输文件的解密装置还包括:
    次数判断模块,用于判断在预设的时间内,解密失败的次数是否超过预设的阈值;
    文件删除模块,用于所述次数判断模块判断出解密失败的次数超过预设的阈值,则删除所述加密文件。
  18. 如权利要求14所述的传输文件的解密装置,其中所述传输文件的解密装置还包括:控制模块;
    文件打开模块,具体用于解密成功后,打开所述文件供接收方用户查看;
    控制模块,用于当接收到修改指令时,控制不执行所述修改指令对应的修改操作。
  19. 一种包括权利要求10-13任一项所述的传输文件的加密装置的移动终端。
  20. 一种包括权利要求14-18任一项所述的传输文件的解密装置的移动终端。
PCT/CN2016/091081 2015-10-28 2016-07-22 传输文件的加密和解密方法及加密和解密装置 WO2017071324A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510719602.7A CN105227578B (zh) 2015-10-28 2015-10-28 传输文件的加密和解密方法
CN201510719602.7 2015-10-28

Publications (1)

Publication Number Publication Date
WO2017071324A1 true WO2017071324A1 (zh) 2017-05-04

Family

ID=54996257

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/091081 WO2017071324A1 (zh) 2015-10-28 2016-07-22 传输文件的加密和解密方法及加密和解密装置

Country Status (2)

Country Link
CN (2) CN108200093B (zh)
WO (1) WO2017071324A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020103059A1 (zh) * 2018-11-21 2020-05-28 深圳市欢太科技有限公司 数据处理方法、装置、电子设备以及存储介质
CN111464531A (zh) * 2020-03-31 2020-07-28 洛阳理工学院 一种基于多重加密的即时确认式文件传输方法
CN113486380A (zh) * 2021-07-23 2021-10-08 西安万像电子科技有限公司 文本文件的加密方法
CN115174136A (zh) * 2022-05-23 2022-10-11 北京旷视科技有限公司 数据获取和数据传送方法、终端、服务器及存储介质

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108200093B (zh) * 2015-10-28 2021-08-24 Oppo广东移动通信有限公司 传输文件的加密和解密方法及加密和解密装置
CN106170006A (zh) * 2016-09-29 2016-11-30 广州鹤互联网科技有限公司 一种电子签批安全管理方法及系统
CN108377319B (zh) * 2018-03-15 2020-04-17 北京顶象技术有限公司 图片传输方法及装置
CN109218451A (zh) * 2018-11-14 2019-01-15 郑州云海信息技术有限公司 一种分布式集群系统的数据传输方法、装置、设备及介质
CN116965011A (zh) * 2021-03-25 2023-10-27 华为技术有限公司 数据传输的加密控制方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104145274A (zh) * 2012-07-30 2014-11-12 英特尔公司 基于生物测定数据的媒体加密
CN104507080A (zh) * 2014-11-19 2015-04-08 广东欧珀移动通信有限公司 一种文件处理方法及终端
US20150106892A1 (en) * 2013-10-14 2015-04-16 Greg Hauw Method and Device for Credential and Data Protection
CN104992100A (zh) * 2015-07-15 2015-10-21 西安凯虹电子科技有限公司 用于电子文档流转的虹膜动态加密解密系统及方法
CN105227578A (zh) * 2015-10-28 2016-01-06 广东欧珀移动通信有限公司 传输文件的加密和解密方法及加密和解密装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003535559A (ja) * 2000-06-02 2003-11-25 キネティック サイエンシーズ インコーポレイテッド 電子メールの生物測定暗号化方法
WO2008021041A2 (en) * 2006-08-07 2008-02-21 Id Rank Security, Inc. Systems and methods for conducting secure wired and wireless networked telephony
FR2930830A1 (fr) * 2008-04-30 2009-11-06 Thales Sa Ressource de confiance integree a un dispositif de controle de donnees biometriques assurant la securite du controle et celle des donnees
CN102710613B (zh) * 2012-05-14 2014-12-17 西安电子科技大学 多接收者生物特征签密方法
CN103414790A (zh) * 2013-08-30 2013-11-27 苏州跨界软件科技有限公司 基于nfc的文件传输系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104145274A (zh) * 2012-07-30 2014-11-12 英特尔公司 基于生物测定数据的媒体加密
US20150106892A1 (en) * 2013-10-14 2015-04-16 Greg Hauw Method and Device for Credential and Data Protection
CN104507080A (zh) * 2014-11-19 2015-04-08 广东欧珀移动通信有限公司 一种文件处理方法及终端
CN104992100A (zh) * 2015-07-15 2015-10-21 西安凯虹电子科技有限公司 用于电子文档流转的虹膜动态加密解密系统及方法
CN105227578A (zh) * 2015-10-28 2016-01-06 广东欧珀移动通信有限公司 传输文件的加密和解密方法及加密和解密装置

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020103059A1 (zh) * 2018-11-21 2020-05-28 深圳市欢太科技有限公司 数据处理方法、装置、电子设备以及存储介质
CN111464531A (zh) * 2020-03-31 2020-07-28 洛阳理工学院 一种基于多重加密的即时确认式文件传输方法
CN113486380A (zh) * 2021-07-23 2021-10-08 西安万像电子科技有限公司 文本文件的加密方法
CN113486380B (zh) * 2021-07-23 2023-04-11 西安万像电子科技有限公司 文本文件的加密方法
CN115174136A (zh) * 2022-05-23 2022-10-11 北京旷视科技有限公司 数据获取和数据传送方法、终端、服务器及存储介质
CN115174136B (zh) * 2022-05-23 2024-02-02 北京旷视科技有限公司 数据获取和数据传送方法、终端、服务器及存储介质

Also Published As

Publication number Publication date
CN105227578B (zh) 2018-02-16
CN108200093A (zh) 2018-06-22
CN105227578A (zh) 2016-01-06
CN108200093B (zh) 2021-08-24

Similar Documents

Publication Publication Date Title
WO2017071330A1 (zh) 数据的加密和解密方法及加密和解密装置
WO2017071324A1 (zh) 传输文件的加密和解密方法及加密和解密装置
WO2018090823A1 (zh) 一种系统分区关键数据的保护方法及系统、终端
WO2018076866A1 (zh) 数据处理方法、装置、存储介质、电子设备及服务器
WO2018076818A1 (zh) 数据的备份方法、装置、电子设备、存储介质及系统
WO2015064858A1 (ko) 단말기 및 그 제어 방법
WO2015180013A1 (zh) 一种终端的触摸操作方法及装置
WO2017150901A1 (en) Electronic device and method for displaying and transmitting images thereof
WO2018076864A1 (zh) 一种数据同步方法、装置、存储介质及电子设备
WO2018076819A1 (zh) 数据的上传方法、装置、存储介质、电子设备及系统
WO2018076888A1 (zh) 移动终端数据的同步方法、装置及系统、存储介质及移动终端
WO2017142373A1 (en) Method of controlling the sharing of videos and electronic device adapted thereto
WO2018026059A1 (ko) 이동 단말기 및 그 제어방법
WO2018090822A1 (zh) 基于智能手表的移动终端相机控制方法及控制系统
WO2017071326A1 (zh) 一种终端的控制方法、装置和系统
WO2015057013A1 (ko) 휴대용 장치가 웨어러블 장치를 통하여 정보를 표시하는 방법 및 그 장치
WO2018124334A1 (ko) 전자장치
WO2018076842A1 (zh) 一种数据备份方法、装置、系统、存储介质及电子设备
WO2018028128A1 (zh) 一种上行数据的信息反馈方法及相关设备
WO2018076830A1 (zh) 数据同步周期的调整方法、装置、电子设备、存储介质及系统
WO2016036048A1 (en) Method and device for data encrypting
WO2016188285A1 (zh) 一种终端应用的进程管理方法及装置
WO2018035930A1 (zh) 一种系统解锁方法和设备
WO2017052004A1 (ko) 이동 단말기 및 그 제어방법
WO2015125993A1 (ko) 이동 단말기 및 이동 단말기의 제어방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16858763

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16858763

Country of ref document: EP

Kind code of ref document: A1