WO2019071513A1 - Data encryption method and data encryption system for intelligent terminal - Google Patents

Data encryption method and data encryption system for intelligent terminal Download PDF

Info

Publication number
WO2019071513A1
WO2019071513A1 PCT/CN2017/105833 CN2017105833W WO2019071513A1 WO 2019071513 A1 WO2019071513 A1 WO 2019071513A1 CN 2017105833 W CN2017105833 W CN 2017105833W WO 2019071513 A1 WO2019071513 A1 WO 2019071513A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic map
target
target file
data encryption
unlocked
Prior art date
Application number
PCT/CN2017/105833
Other languages
French (fr)
Chinese (zh)
Inventor
黄国军
Original Assignee
深圳传音通讯有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳传音通讯有限公司 filed Critical 深圳传音通讯有限公司
Priority to PCT/CN2017/105833 priority Critical patent/WO2019071513A1/en
Publication of WO2019071513A1 publication Critical patent/WO2019071513A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Definitions

  • the invention relates to the field of encryption technology of an intelligent terminal, in particular to a data encryption method and a data encryption system of an intelligent terminal.
  • the privacy protection of smart terminals is increasingly valued by users.
  • the privacy protection of smart terminals is increasingly valued by users.
  • the encryption methods of files and the like in smart terminals on the market are still limited to encryption methods such as numbers, characters, letters, pattern encryption or fingerprints. Encrypted passwords consisting of numbers, characters, letters, etc. are cumbersome, which increases the difficulty of the user's memory; while fingerprints and other encryption methods rely on the integrity of the user's fingerprints, when the user affects the shape of the fingerprint due to trauma, etc., Decryption of files and the like that affect the smart terminal.
  • the present invention provides a data encryption method and a data encryption system for an intelligent terminal.
  • the invention provides a data encryption method and a data encryption system for encrypting data files by using an electronic map, which associates a data encryption system with an electronic map, and uses a geographical location as an unlocking password of the data file, thereby being able to arrive by carrying the intelligent terminal.
  • the data file is decrypted by specifically unlocking the location or by modulating the unlocked location with the electronic map.
  • the present invention provides a data encryption method for an intelligent terminal, comprising the steps of: starting a data encryption system; locking an object file to be encrypted; initiating an electronic map associated with the data encryption system; The map is locked to a target precision layer; under the target precision layer, an operation instruction is captured, and an unlocked position is locked in the electronic map according to the operation instruction; and the unlocked position is an unlock password,
  • the target file is encrypted, and the target file is converted into a target ciphertext and stored in a storage space of the smart terminal.
  • capturing an operation instruction, and locking an unlocking position in the electronic map includes: capturing an operation instruction under the target precision layer, and selecting according to the operation instruction Determining an unlocked position in the electronic map, reading position information of the unlocked position in the electronic map, and obtaining an unlocking Location information and sent out.
  • the step of encrypting the target file by using the unlocking position as an unlocking key comprises: setting an error value, and calculating a circle centering on the unlocking position information and the error value is a radius Position information of each point in the shape, and an unlock data list is created by using the position information of each point in the circular area, and the location information of each point in the unlock list is used as an unlocking key, and an encryption operation is performed. Converting the target file into a target ciphertext, and storing the target ciphertext in a storage space of the smart terminal.
  • the step of decrypting the target file includes capturing current geographic location information of the smart terminal, comparing the current geographic location information with the unlocked location, when the current geographic location information and the When the unlocking position is matched, the target file is decrypted, and the target file is converted from ciphertext to plaintext.
  • the step of decrypting the target file further includes: capturing an operation instruction, selecting a first unlocking position in the electronic map, and comparing the first unlocking position with the unlocking position; When the first unlocking position matches the unlocking position, the target file is decrypted, and the target file is converted from ciphertext to plaintext.
  • a data encryption system for an intelligent terminal which includes the following modules, a system control module, and a data encryption system; a target selection module that locks an object file to be encrypted; and an electronic map control module that initiates an An electronic map associated with the data encryption system; an accuracy adjustment module that locks the electronic map to a target accuracy layer; the first positioning module captures an operation instruction, and locks in the electronic map according to the operation instruction An unlocking location, wherein the unlocking password is an unlocking password, and the target file is encrypted, and the target file is converted into a target ciphertext and stored in a storage space of the smart terminal.
  • the first positioning module includes: a first instruction unit, capturing an operation instruction, and a first positioning unit, according to the operation instruction, selecting an unlocking position in the electronic map, the information identifying unit, and reading the location The location information of the unlocked location in the electronic map is obtained, and an unlocked location information is obtained and sent out.
  • the encryption module includes: a second instruction unit that captures an operation instruction, acquires an error value, and the data processing unit calculates a circular area centered on the unlock position information and the error value is a radius.
  • the location information of each point in the data the data statistics unit, establishes an unlock data list by using the location information of each point in the circle, and the encryption unit uses the location information of each point in the unlock list as the unlocking key.
  • performing an encryption operation converting the target file into a target ciphertext, and storing, by the storage unit, the target ciphertext in a storage space of the smart terminal.
  • the data encryption system further includes: a second positioning module that captures current geographic location information of the smart terminal, and a first verification module that compares the current geographic location information with the unlocked location, first Decrypt And when the current geographic location information matches the unlocked location, the module decrypts the target file, and converts the target file from ciphertext to plaintext.
  • a second positioning module that captures current geographic location information of the smart terminal
  • a first verification module that compares the current geographic location information with the unlocked location, first Decrypt And when the current geographic location information matches the unlocked location, the module decrypts the target file, and converts the target file from ciphertext to plaintext.
  • the data encryption system further includes: an instruction module, capturing an operation instruction, a third positioning module, selecting a first unlocking position in the electronic map, and a second verification module, the first unlocking position The unlocking position is compared, and the second decrypting module decrypts the target file when the first unlocking position matches the unlocking position, and converts the target file from ciphertext to plaintext.
  • the present invention provides an encryption method for encrypting data files by using an electronic map, which associates a data encryption system with an electronic map, and uses a geographical location as an unlock password of the data file, thereby being able to reach a specific unlocked position by carrying the smart terminal. Or decrypt the data file by modulating the unlocked location of the electronic map again.
  • the data encryption system of the intelligent terminal provided by the present invention is provided with a system control module, an electronic map control module, a positioning module, etc., and the present invention utilizes the mutual cooperation of the above modules to realize the technical effect of encrypting by using a geographical location, and improving The convenience and effectiveness of data encryption, while avoiding the hassle of calculating passwords cumbersomely.
  • FIG. 1 is a schematic flow chart of a data encryption method of an intelligent terminal according to a preferred embodiment of the present invention
  • FIG. 2 is a schematic flow chart of a step of locking an unlocking position in an electronic map according to FIG. 1;
  • FIG. 3 is a schematic flow chart of the steps of performing encryption processing on the target file in FIG. 1;
  • FIG. 4 is a schematic flow chart of a method for decrypting an encrypted file corresponding to FIG. 1;
  • FIG. 5 is a schematic flow chart of another decryption method corresponding to the encrypted file in FIG. 1;
  • FIG. 6 is a structural diagram of a data encryption system of a smart terminal in accordance with a preferred embodiment of the present invention.
  • Figure 7 is a structural view of the first positioning module in accordance with Figure 6;
  • FIG 8 is a structural diagram of the encryption module in accordance with Figure 6;
  • FIG. 9 is a structural diagram of a data encryption system in accordance with another preferred smart terminal of the present invention.
  • FIG. 10 is a block diagram of a data encryption system in accordance with another preferred intelligent terminal of the present invention.
  • first, second, third, etc. may be employed in the present disclosure to describe various information, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • the first intelligent terminal may also be referred to as a second smart terminal without departing from the scope of the present disclosure.
  • the second smart terminal may also be referred to as a first smart terminal.
  • FIG. 1 is a schematic flowchart of a data encryption method of a smart terminal according to a preferred embodiment of the present invention. It can be seen from the figure that the data encryption method of the intelligent terminal provided by this embodiment mainly includes the following steps:
  • the smart terminal when the user needs to encrypt a certain file data in the smart terminal, the smart terminal may be sent to the smart terminal by touching a shortcut icon of the smart terminal display interface or a text name in the shortcut menu. A start command.
  • the system control module of the intelligent terminal reads an operation instruction issued by the user, and starts the data encryption system of the intelligent terminal according to the startup instruction after parsing.
  • the smart terminal starts the data encryption system according to a triggering instruction of the user.
  • the user can select the file to be encrypted according to his own needs.
  • it is called an object file.
  • the target selection module of the smart terminal can read an operation instruction input by the user to the smart terminal, and after parsing, lock the target file to be encrypted selected by the user according to the operation instruction.
  • the target file is maintained in a pending state.
  • the data encryption system of the smart terminal is associated with an electronic map in the smart terminal in advance, that is, the function of the electronic map can be invoked by the data encryption system.
  • an electronic map associated with the data encryption system can be initiated by an electronic map control module of the data encryption system.
  • Electronic map is a map form that records and stores geographic location information in digital form.
  • the accuracy of an electronic map refers to the resolution of an electronic map, that is, the actual floor area represented by one pixel.
  • the relationship between the resolution of the electronic map and the ground resolution, display scale, and data source scale of the reaction can be seen in the following table:
  • the different resolutions of the electronic map represent different geographical locations. Therefore, in this embodiment, before selecting a specific geographic location in the electronic map, first, the precision layer of the electronic map called by the data encryption system should be locked. Therefore, in this embodiment, the user may input an operation instruction to the smart terminal, and the precision adjustment module of the smart terminal may capture an operation instruction, and after parsing, lock the electronic map according to the operation instruction. To a target precision layer. Thereby, the display scale, the ground resolution, and the like of the electronic map are accordingly locked.
  • the user can select an unlocked position for encryption in the electronic map displayed by the smart terminal according to the needs of the user.
  • the smart terminal is further configured with a first positioning module, where the positioning module can capture an operation instruction that triggers the smart terminal by the user, and after parsing the operation instruction, acquire the electronic map according to the operation instruction. An unlocked position.
  • FIG. 2 it is a schematic flowchart of a step of locking an unlocking position in an electronic map according to FIG. 1.
  • the step of locking an unlocked position in the electronic map comprises:
  • the first positioning module specifically includes a first instruction unit, where the first instruction unit can capture a trigger action of the user on the smart terminal, and read the trigger pressure and time of the trigger action. And action information such as location, and retrieving the operation instruction expressed by the action information in the instruction database of the smart terminal according to the action information, and generating a corresponding running instruction to send out.
  • the first positioning module further includes a first positioning unit, the first positioning unit may receive a running instruction sent by the first instruction unit, and select the electronic according to the running instruction. An unlocked location in the map.
  • an information identifying unit of the first positioning module can read specific location information in the electronic map of the unlocked location selected by the first positioning unit, thereby obtaining an unlocking location information. And sending the unlocked location information outward.
  • the smart terminal further includes an encryption module.
  • the encryption module may perform encryption processing on the target file, and finally set the decryption password as the decryption password of the target file.
  • FIG. 3 it is a schematic flowchart of the steps of performing encryption processing on the target file in FIG. It can be seen from the figure that, in this embodiment, the steps of performing encryption processing on the target file mainly include:
  • the encryption module includes a second instruction unit, and the second instruction unit can capture Obtaining a trigger action of the smart terminal by the user, and reading action information such as trigger pressure, time, position, and the like of the trigger action, and identifying an error value input by the user to the smart terminal according to the action information, And converting the error value into digital information readable by a smart terminal and transmitting the digital information.
  • the encryption module further includes a data processing unit, and the data processing unit may receive an error value sent by the second instruction unit and unlocked position information read by the first positioning module, and The unlocking position information is centered, the error value is a radius, a circular model is established, and position information of each point in the circular model is calculated.
  • the encryption module is further provided with a data statistics unit, wherein the data statistics unit can read the unlocked position information as a center, and the error value is a position of each point in the circular area defined by the radius.
  • Information and according to certain rules, such as latitude from small to large, an unlock data list is established and stored in the storage space of the smart terminal.
  • an encryption unit is further disposed in the encryption module.
  • the encryption unit may perform an encryption operation, and use the location information of each point in the unlock list as an unlocking key to convert the target file into a target ciphertext.
  • the encryption algorithm used may be a Data Encryption Standard (DES) algorithm, based on the Rijndael algorithm symmetric advanced data encryption standard AES, or an RSA algorithm.
  • DES Data Encryption Standard
  • AES Rijndael algorithm symmetric advanced data encryption standard
  • RSA RSA
  • the encryption module further includes a storage unit, and the storage unit may store the target ciphertext obtained by converting the target file in a storage space of the smart terminal.
  • the present invention further provides a method for decrypting the target file.
  • FIG. 4 it is a schematic flowchart of a method for decrypting the encrypted file in FIG.
  • the steps of the file decryption method mainly include:
  • the smart terminal when the user needs to encrypt the target file, the smart terminal may be carried to reach a preset decryption location. At this time, a second positioning module of the smart terminal may acquire current geographic location information of the smart terminal and feed back to the smart terminal.
  • a first check module is further disposed in the smart terminal, where the first check module can read current geographic location information of the smart terminal acquired by the second positioning module, and the current geographic location The information is compared to the unlocked location information.
  • the first verification module may compare the current geographic location information with the unlocked data in the unlocked data list, where the current geographic location information and one of the specific unlocked locations When the information is consistent, it is determined that the unlocked position is reached, and the first check module generates an unlock command to send out; otherwise, no operation is performed.
  • the first decryption module in the smart terminal may receive the unlocking instruction, and according to the unlocking instruction, decrypt the target file by a corresponding decryption operation, and convert the target file from ciphertext to Clear, user-readable, readable, and actionable.
  • the present invention further provides another method for decrypting the target file.
  • FIG. 5 it is an encrypted file corresponding to FIG. A schematic flow chart of another decryption method.
  • the steps of the file decryption method mainly include:
  • the smart terminal includes an instruction module, and the instruction module can capture a trigger action of the user on the smart terminal, and read action information such as trigger pressure, time, position, etc. of the trigger action, and according to The action information retrieves an operation instruction expressed by the action information in an instruction database of the smart terminal, and generates a corresponding run instruction to send out.
  • the instruction module can capture a trigger action of the user on the smart terminal, and read action information such as trigger pressure, time, position, etc. of the trigger action, and according to The action information retrieves an operation instruction expressed by the action information in an instruction database of the smart terminal, and generates a corresponding run instruction to send out.
  • a third positioning module is further disposed in the smart terminal, where the third positioning module can receive the running instruction, and select a first unlocking in the electronic map according to the running instruction. position.
  • a second verification module is further disposed in the smart terminal, where the second verification module can read specific geographic location information of the first unlocked location, and perform the geographic location information and the unlocked location information. Compared to right.
  • the second verification module may compare the geographical location information with the unlock data in the unlock data list, where the geographic location information is consistent with one of the specific unlocked location information.
  • the second verification module generates an unlock command to send out; otherwise, no operation is performed.
  • the second decryption module in the smart terminal may receive the unlocking instruction, and according to the unlocking instruction, decrypt the target file by using a corresponding decryption operation, and the target file is Converted from ciphertext to clear, readable, and operable plain text.
  • the present invention provides an encryption method for encrypting data files by using an electronic map, which associates a data encryption system with an electronic map, and uses a geographical location as an unlock password of the data file, thereby being able to arrive by carrying the smart terminal.
  • the data file is decrypted by specifically unlocking the location or by modulating the unlocked location with the electronic map.
  • FIG. 6 is a structural diagram of a data encryption system of a smart terminal in accordance with a preferred embodiment of the present invention.
  • the data encryption system of the intelligent terminal provided by this embodiment mainly includes the following modules or units:
  • the smart terminal is provided with a system control module, and the system control module implements a technology for reading a trigger action of the user on the smart terminal, and starting a data encryption system of the smart terminal according to the triggering action. effect;
  • the target selection module of the smart terminal can read the operation instruction and lock the operation instruction accordingly.
  • the encrypted target file maintains the target file in a pending state.
  • the data encryption system in this embodiment is provided with an electronic map control module, and the electronic map control module can start a data and the data
  • the electronic map in advance associated with the encryption system invokes all functional modules of the electronic map to implement functions such as positioning and searching for a location.
  • the data processing system further includes a precision adjustment module.
  • the user can input an operation instruction to the smart terminal, and the precision adjustment module of the smart terminal can capture an operation instruction, and after parsing, lock the electronic map to a target precision layer according to the operation instruction.
  • the display scale, the ground resolution, and the like of the electronic map are accordingly locked.
  • the electronic map is locked to a target precision layer.
  • a first positioning module is further disposed in the smart terminal, and the positioning module can be used for capturing. After triggering the operation instruction of the smart terminal and parsing the operation instruction, the user acquires an unlocked position in the electronic map according to the operation instruction.
  • FIG. 7 is a structural diagram conforming to the first positioning module in FIG. 6.
  • the first positioning module specifically includes the following units:
  • the first instruction unit may capture a trigger action of the user on the smart terminal, and read action information such as trigger pressure, time, position, etc. of the trigger action, and execute an instruction database of the smart terminal according to the action information. Searching for the operation instruction expressed by the action information, and generating a corresponding running instruction to send out.
  • the first positioning unit may receive a running instruction sent by the first instruction unit, and select an unlocking position in the electronic map according to the running instruction.
  • the information identifying unit may read specific location information in the electronic map of the unlocked location selected by the first positioning unit, thereby obtaining an unlocked location information and transmitting the unlocked location outward information.
  • the data encryption system further includes an encryption module, and after determining an unlocking position according to an operation instruction of the user, the encryption module may perform the target file. The encryption process is performed, and finally the unlocked location information is set as the decryption password of the target file.
  • FIG. 8 is a structural diagram of the cryptographic module in FIG. 6 , it can be seen from the figure that, in this embodiment, the cryptographic module specifically includes the following units:
  • the second instruction unit may capture a trigger action of the user on the smart terminal, and read action information such as trigger pressure, time, position, etc. of the trigger action, and identify the user to the smart according to the action information.
  • action information such as trigger pressure, time, position, etc. of the trigger action
  • An error value input by the terminal, and converting the error value into a digital information readable by a smart terminal to be sent out.
  • the data processing unit may receive the error value sent by the second instruction unit and the unlock position information read by the first positioning module, and center on the unlock position information, the error value is a radius, and establish a A circular model calculates the position information of each point in the circular model.
  • the data statistics unit can read the unlocked position information as a center, and the error value is limited to a radius. Position information of each point in the circular area, and according to a certain rule, such as latitude from small to large, an unlock data list is established and stored in the storage space of the smart terminal.
  • the encryption unit may perform an encryption operation, and use the location information of each point in the unlock list as an unlocking key to convert the target file into a target ciphertext.
  • the encryption algorithm used may be a Data Encryption Standard (DES) algorithm, based on the Rijndael algorithm symmetric advanced data encryption standard AES, or an RSA algorithm.
  • DES Data Encryption Standard
  • AES Rijndael algorithm symmetric advanced data encryption standard
  • RSA RSA
  • the storage unit may store the target ciphertext obtained by the conversion of the target file in a storage space of the smart terminal.
  • FIG. 9 is a structural diagram of a data encryption system according to another preferred smart terminal of the present invention.
  • the data encryption system provided in this embodiment further includes a target file decryption.
  • the first verification module may read current geographic location information of the smart terminal acquired by the second positioning module, and compare the current geographic location information with the unlocked location information.
  • the first verification module may compare the current geographic location information with the unlocked data in the unlocked data list, where the current geographic location information and one of the specific unlocked locations When the information is consistent, it is determined that the unlocked position is reached, and the first check module generates an unlock command to send out; otherwise, no operation is performed.
  • the first decryption module may receive the unlocking instruction, and according to the unlocking instruction, decrypt the target file by a corresponding decryption operation, and convert the target file from a ciphertext to a user, Readable, actionable plain text.
  • FIG. 10 is a structural diagram of a data encryption system according to another preferred smart terminal of the present invention.
  • the data encryption system provided in this embodiment further includes target file decryption.
  • the instruction module may capture a trigger action of the user on the smart terminal, and read action information such as trigger pressure, time, position, etc. of the trigger action, and check the command database in the smart terminal according to the action information.
  • the operation instruction expressed by the action information is sent, and a corresponding running instruction is generated and sent out.
  • the third positioning module can receive the running instruction, and select a first unlocking position in the electronic map according to the running instruction.
  • the second verification module may read specific geographic location information of the first unlocked location, and compare the geographic location information with the unlocked location information. Preferably, in this embodiment, the second verification module may compare the geographical location information with the unlock data in the unlock data list, where the geographic location information is consistent with one of the specific unlocked location information. The second verification module generates an unlock command to send out; otherwise, no operation is performed.
  • the second decryption module may receive the unlocking instruction, and according to the unlocking instruction, decrypt the target file by a corresponding decryption operation, and convert the target file from a ciphertext to a user, Readable, actionable plain text.
  • the data encryption system of the intelligent terminal provided by the present invention is provided with a system control module, an electronic map control module, a positioning module, and the like, and utilizes the mutual cooperation of the above modules to realize the technology of encrypting by using a geographical location.
  • the effect is to improve the convenience and effectiveness of data encryption while avoiding the trouble of cumbersome calculation of passwords.

Abstract

Provided are a data encryption method and data encryption system for an intelligent terminal. The data encryption method comprises the following steps: starting a data encryption system; locking a target file to be encrypted; starting an electronic map associated with the data encryption system; locking the electronic map to a target precision layer; under the target precision layer, capturing an operational instruction, and locking an unlocking position in the electronic map according to the operational instruction; and by using the unlocking position as an unlocking password, performing encryption processing on the target file, and converting the target file into a target ciphertext and storing same in a storage space of the intelligent terminal. By associating a data encryption system with an electronic map, and using a geographical position as an unlocking password of a data file, the data file can be decrypted by carrying an intelligent terminal to a specific unlocking position or utilizing the electronic map to modulate the unlocking position again.

Description

一种智能终端的数据加密方法及数据加密系统Data encryption method and data encryption system for intelligent terminal 技术领域Technical field
本发明涉及智能终端的加密技术领域,尤其一种智能终端的数据加密方法及数据加密系统。The invention relates to the field of encryption technology of an intelligent terminal, in particular to a data encryption method and a data encryption system of an intelligent terminal.
背景技术Background technique
随着智能终端的应用领域的拓展,智能终端的隐私保护越来越受到用户的重视,随着智能终端的应用领域的拓展,智能终端的隐私保护越来越受到用户的重视。但是,目前,市场上的智能终端中文件等的加密方式仍仅限于数字、文字、字母、图案加密或者指纹等加密方式。由数字、文字、字母等组成的加密密码较为繁琐,增加了用户的记忆难度;而指纹等加密方式,由于依赖于用户指纹的完整性,当用户由于外伤等影响指纹的形貌时,则会影响智能终端的文件等的解密。With the expansion of the application field of smart terminals, the privacy protection of smart terminals is increasingly valued by users. With the expansion of the application fields of smart terminals, the privacy protection of smart terminals is increasingly valued by users. However, at present, the encryption methods of files and the like in smart terminals on the market are still limited to encryption methods such as numbers, characters, letters, pattern encryption or fingerprints. Encrypted passwords consisting of numbers, characters, letters, etc. are cumbersome, which increases the difficulty of the user's memory; while fingerprints and other encryption methods rely on the integrity of the user's fingerprints, when the user affects the shape of the fingerprint due to trauma, etc., Decryption of files and the like that affect the smart terminal.
发明内容Summary of the invention
为解决上述问题,本发明提供一种智能终端的数据加密方法及数据加密系统。本发明提供一种利用电子地图进行数据文件加密的数据加密方法及数据加密系统,其将数据加密系统与电子地图相关联,利用地理位置作为数据文件的解锁密码,从而,可通过携带智能终端到达具体解锁位置或者利用将电子地图再次调制解锁位置对数据文件解密。To solve the above problems, the present invention provides a data encryption method and a data encryption system for an intelligent terminal. The invention provides a data encryption method and a data encryption system for encrypting data files by using an electronic map, which associates a data encryption system with an electronic map, and uses a geographical location as an unlocking password of the data file, thereby being able to arrive by carrying the intelligent terminal. The data file is decrypted by specifically unlocking the location or by modulating the unlocked location with the electronic map.
具体地,本发明提供一种智能终端的数据加密方法,其包括以下步骤:启动数据加密系统;锁定待加密的目标文件;启动一与所述数据加密系统相关联的电子地图;将所述电子地图锁定至一目标精度层;在所述目标精度层下,捕获一操作指令,根据所述操作指令,在所述电子地图中锁定一解锁位置;以所述解锁位置为解锁密码,对所述目标文件进行加密处理,将所述目标文件转换为一目标密文,存储于所述智能终端的存储空间中。Specifically, the present invention provides a data encryption method for an intelligent terminal, comprising the steps of: starting a data encryption system; locking an object file to be encrypted; initiating an electronic map associated with the data encryption system; The map is locked to a target precision layer; under the target precision layer, an operation instruction is captured, and an unlocked position is locked in the electronic map according to the operation instruction; and the unlocked position is an unlock password, The target file is encrypted, and the target file is converted into a target ciphertext and stored in a storage space of the smart terminal.
优选地,在所述目标精度层下,捕获一操作指令,在所述电子地图中锁定一解锁位置的步骤包括,在所述目标精度层下,捕获一操作指令,根据所述操作指令,选定所述电子地图中一解锁位置,读取所述解锁位置在所述电子地图中的位置信息,获得一解锁 位置信息,并向外发送。Preferably, under the target precision layer, capturing an operation instruction, and locking an unlocking position in the electronic map includes: capturing an operation instruction under the target precision layer, and selecting according to the operation instruction Determining an unlocked position in the electronic map, reading position information of the unlocked position in the electronic map, and obtaining an unlocking Location information and sent out.
优选地,以所述解锁位置为解锁密钥,对所述目标文件进行加密处理的步骤包括,设置一误差数值,计算获得一以所述解锁位置信息为中心,所述误差数值为半径的圆形内的各点的位置信息,以所述圆形面积内的各点的位置信息,建立一解锁数据列表,以所述解锁列表中各点的位置信息为解锁密钥,进行一加密运算,将所述目标文件转换为一目标密文,将所述目标密文存储于所述智能终端的存储空间中。Preferably, the step of encrypting the target file by using the unlocking position as an unlocking key comprises: setting an error value, and calculating a circle centering on the unlocking position information and the error value is a radius Position information of each point in the shape, and an unlock data list is created by using the position information of each point in the circular area, and the location information of each point in the unlock list is used as an unlocking key, and an encryption operation is performed. Converting the target file into a target ciphertext, and storing the target ciphertext in a storage space of the smart terminal.
优选地,所述目标文件的解密的步骤包括,捕获所述智能终端的当前地理位置信息,将所述当前地理位置信息与所述解锁位置相比对,当所述当前地理位置信息与所述解锁位置匹配时,对所述目标文件进行解密处理,将所述目标文件由密文转换为明文。Preferably, the step of decrypting the target file includes capturing current geographic location information of the smart terminal, comparing the current geographic location information with the unlocked location, when the current geographic location information and the When the unlocking position is matched, the target file is decrypted, and the target file is converted from ciphertext to plaintext.
优选地,所述目标文件的解密的步骤还包括,捕获一操作指令,选定所述电子地图中一第一解锁位置,将所述第一解锁位置与所述解锁位置进行比对,当所述第一解锁位置与所述解锁位置相匹配时,对所述目标文件进行解密处理,将所述目标文件由密文转换为明文。Preferably, the step of decrypting the target file further includes: capturing an operation instruction, selecting a first unlocking position in the electronic map, and comparing the first unlocking position with the unlocking position; When the first unlocking position matches the unlocking position, the target file is decrypted, and the target file is converted from ciphertext to plaintext.
本发明另一方面,还提供一种智能终端的数据加密系统,其包括以下模块,系统控制模块,启动数据加密系统;目标选择模块,锁定待加密的目标文件;电子地图控制模块,启动一与所述数据加密系统相关联的电子地图;精度调节模块,将所述电子地图锁定至一目标精度层;第一定位模块,捕获一操作指令,根据所述操作指令,在所述电子地图中锁定一解锁位置;加密模块,以所述解锁位置为解锁密码,对所述目标文件进行加密处理,将所述目标文件转换为一目标密文,存储于所述智能终端的存储空间中。Another aspect of the present invention provides a data encryption system for an intelligent terminal, which includes the following modules, a system control module, and a data encryption system; a target selection module that locks an object file to be encrypted; and an electronic map control module that initiates an An electronic map associated with the data encryption system; an accuracy adjustment module that locks the electronic map to a target accuracy layer; the first positioning module captures an operation instruction, and locks in the electronic map according to the operation instruction An unlocking location, wherein the unlocking password is an unlocking password, and the target file is encrypted, and the target file is converted into a target ciphertext and stored in a storage space of the smart terminal.
优选地,所述第一定位模块包括,第一指令单元,捕获一操作指令,第一定位单元,根据所述操作指令,选定所述电子地图中一解锁位置,信息识别单元,读取所述解锁位置在所述电子地图中的位置信息,获得一解锁位置信息,并向外发送。Preferably, the first positioning module includes: a first instruction unit, capturing an operation instruction, and a first positioning unit, according to the operation instruction, selecting an unlocking position in the electronic map, the information identifying unit, and reading the location The location information of the unlocked location in the electronic map is obtained, and an unlocked location information is obtained and sent out.
优选地,所述加密模块包括,第二指令单元,捕获一操作指令,获取一误差数值,数据处理单元,计算获得一以所述解锁位置信息为中心,所述误差数值为半径的圆形面积内的各点的位置信息,数据统计单元,以所述圆形内的各点的位置信息,建立一解锁数据列表,加密单元,以所述解锁列表中各点的位置信息为解锁密钥,进行一加密运算,将所述目标文件转换为一目标密文,存储单元,将所述目标密文存储于所述智能终端的存储空间中。Preferably, the encryption module includes: a second instruction unit that captures an operation instruction, acquires an error value, and the data processing unit calculates a circular area centered on the unlock position information and the error value is a radius. The location information of each point in the data, the data statistics unit, establishes an unlock data list by using the location information of each point in the circle, and the encryption unit uses the location information of each point in the unlock list as the unlocking key. And performing an encryption operation, converting the target file into a target ciphertext, and storing, by the storage unit, the target ciphertext in a storage space of the smart terminal.
优选地,上述数据加密系统还包括,第二定位模块,捕获所述智能终端的当前地理位置信息,第一校验模块,将所述当前地理位置信息与所述解锁位置相比对,第一解密 模块,当所述当前地理位置信息与所述解锁位置匹配时,对所述目标文件进行解密处理,将所述目标文件由密文转换为明文。Preferably, the data encryption system further includes: a second positioning module that captures current geographic location information of the smart terminal, and a first verification module that compares the current geographic location information with the unlocked location, first Decrypt And when the current geographic location information matches the unlocked location, the module decrypts the target file, and converts the target file from ciphertext to plaintext.
优选地,上述数据加密系统还包括,指令模块,捕获一操作指令,第三定位模块,选定所述电子地图中一第一解锁位置,第二校验模块,将所述第一解锁位置与所述解锁位置进行比对,第二解密模块,当所述第一解锁位置与所述解锁位置相匹配时,对所述目标文件进行解密处理,将所述目标文件由密文转换为明文。Preferably, the data encryption system further includes: an instruction module, capturing an operation instruction, a third positioning module, selecting a first unlocking position in the electronic map, and a second verification module, the first unlocking position The unlocking position is compared, and the second decrypting module decrypts the target file when the first unlocking position matches the unlocking position, and converts the target file from ciphertext to plaintext.
与现有技术相比较,本发明的技术优势在于:Compared with the prior art, the technical advantages of the present invention are:
1)本发明提供一种利用电子地图进行数据文件加密的加密方法,其将数据加密系统与电子地图相关联,利用地理位置作为数据文件的解锁密码,从而,可通过携带智能终端到达具体解锁位置或者利用将电子地图再次调制解锁位置对数据文件解密。1) The present invention provides an encryption method for encrypting data files by using an electronic map, which associates a data encryption system with an electronic map, and uses a geographical location as an unlock password of the data file, thereby being able to reach a specific unlocked position by carrying the smart terminal. Or decrypt the data file by modulating the unlocked location of the electronic map again.
2)本发明所提供的智能终端的数据加密系统,设置有系统控制模块、电子地图控制模块、定位模块等,利用本发明利用上述模块的相互配合,实现利用地理位置进行加密的技术效果,提高数据加密的便捷性和有效性,同时避免用户繁琐计算密码的麻烦。2) The data encryption system of the intelligent terminal provided by the present invention is provided with a system control module, an electronic map control module, a positioning module, etc., and the present invention utilizes the mutual cooperation of the above modules to realize the technical effect of encrypting by using a geographical location, and improving The convenience and effectiveness of data encryption, while avoiding the hassle of calculating passwords cumbersomely.
附图说明DRAWINGS
图1为一符合本发明一优选实施例的智能终端的数据加密方法的流程示意图;1 is a schematic flow chart of a data encryption method of an intelligent terminal according to a preferred embodiment of the present invention;
图2为一符合图1中的在电子地图中锁定一解锁位置的步骤的流程示意图;2 is a schematic flow chart of a step of locking an unlocking position in an electronic map according to FIG. 1;
图3为图1中的对目标文件进行加密处理的步骤的流程示意图;3 is a schematic flow chart of the steps of performing encryption processing on the target file in FIG. 1;
图4为一对应图1中加密文件的解密方法的流程示意图;4 is a schematic flow chart of a method for decrypting an encrypted file corresponding to FIG. 1;
图5为一对应图1中加密文件的另一解密方法的流程示意图;5 is a schematic flow chart of another decryption method corresponding to the encrypted file in FIG. 1;
图6为一符合本发明一优选实施例的智能终端的数据加密系统的结构图;6 is a structural diagram of a data encryption system of a smart terminal in accordance with a preferred embodiment of the present invention;
图7为一符合图6中第一定位模块的结构图;Figure 7 is a structural view of the first positioning module in accordance with Figure 6;
图8为一符合图6中的加密模块的结构图;Figure 8 is a structural diagram of the encryption module in accordance with Figure 6;
图9为一符合本发明另一优选的智能终端的数据加密系统的结构图;9 is a structural diagram of a data encryption system in accordance with another preferred smart terminal of the present invention;
图10为一符合本发明另一优选的智能终端的数据加密系统的结构图。Figure 10 is a block diagram of a data encryption system in accordance with another preferred intelligent terminal of the present invention.
具体实施方式Detailed ways
下面结合附图及具体实施例,详细阐述本发明的优势。The advantages of the present invention are explained in detail below with reference to the accompanying drawings and specific embodiments.
下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开相一致的所有实施方式。 相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置和方法的例子。The following description refers to the same or similar elements in the different figures unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present disclosure. Instead, they are merely examples of devices and methods consistent with aspects of the present disclosure as detailed in the appended claims.
首先,应当理解,尽管在本公开可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开范围的情况下,第一智能终端也可以被称为第二智能终端,类似地,第二智能终端也可以被称为第一智能终端。First, it should be understood that although the terms first, second, third, etc. may be employed in the present disclosure to describe various information, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other. For example, the first intelligent terminal may also be referred to as a second smart terminal without departing from the scope of the present disclosure. Similarly, the second smart terminal may also be referred to as a first smart terminal.
随着智能终端的应用领域的拓展,智能终端的隐私保护越来越受到用户的重视。但是,目前,市场上的智能终端中文件等的加密方式仍仅限于数字、文字、字母、图案加密或者指纹等加密方式。由数字、文字、字母等组成的加密密码较为繁琐,增加了用户的记忆难度;而指纹等加密方式,由于依赖于用户指纹的完整性,当用户由于外伤等影响指纹的形貌时,则会影响智能终端的文件等的解密。With the expansion of the application field of smart terminals, the privacy protection of smart terminals is increasingly valued by users. However, at present, the encryption methods of files and the like in smart terminals on the market are still limited to encryption methods such as numbers, characters, letters, pattern encryption or fingerprints. Encrypted passwords consisting of numbers, characters, letters, etc. are cumbersome, which increases the difficulty of the user's memory; while fingerprints and other encryption methods rely on the integrity of the user's fingerprints, when the user affects the shape of the fingerprint due to trauma, etc., Decryption of files and the like that affect the smart terminal.
为克服现有智能终端加密技术中存在的问题,本发明一方面提供一种智能终端的数据加密方法。参阅图1,其为一符合本发明一优选实施例的智能终端的数据加密方法的流程示意图。从图中可以看出,本实施例所提供的智能终端的数据加密方法主要包括以下步骤:To overcome the problems existing in the existing smart terminal encryption technology, the present invention provides a data encryption method for an intelligent terminal. Referring to FIG. 1, which is a schematic flowchart of a data encryption method of a smart terminal according to a preferred embodiment of the present invention. It can be seen from the figure that the data encryption method of the intelligent terminal provided by this embodiment mainly includes the following steps:
-启动数据加密系统- Start the data encryption system
本实施例中,当用户需要对所述智能终端中某一文件资料进行加密时,可通过触动所述智能终端显示界面的快捷图标或者快捷菜单中的文字名称等方式,向所述智能终端发送一启动指令。所述智能终端的系统控制模块将读取用户发出的操作指令,并在解析后根据所述启动指令,启动所述智能终端的数据加密系统。In this embodiment, when the user needs to encrypt a certain file data in the smart terminal, the smart terminal may be sent to the smart terminal by touching a shortcut icon of the smart terminal display interface or a text name in the shortcut menu. A start command. The system control module of the intelligent terminal reads an operation instruction issued by the user, and starts the data encryption system of the intelligent terminal according to the startup instruction after parsing.
-锁定待加密的目标文件-Lock the target file to be encrypted
本实施例中,所述智能终端根据用户的触发指令启动所述数据加密系统后。用户可根据自身需求,选择待加密的文件资料,本实施例中,称之为目标文件。所述智能终端的目标选择模块可读取用户对所述智能终端输入的操作指令,并解析后,根据所述操作指令锁定用户选择的待加密的目标文件。使所述目标文件维持一待处理状态。In this embodiment, the smart terminal starts the data encryption system according to a triggering instruction of the user. The user can select the file to be encrypted according to his own needs. In this embodiment, it is called an object file. The target selection module of the smart terminal can read an operation instruction input by the user to the smart terminal, and after parsing, lock the target file to be encrypted selected by the user according to the operation instruction. The target file is maintained in a pending state.
-启动一与所述数据加密系统相关联的电子地图- initiating an electronic map associated with the data encryption system
本实施例中,预先将所述智能终端的数据加密系统与所述智能终端中一电子地图相关联,即,可通过所述数据加密系统调用所述电子地图的功能。从而,当所述智能终端启动所述数据加密系统后,可通过所述数据加密系统的电子地图控制模块启动一与所述数据加密系统相关联的电子地图。 In this embodiment, the data encryption system of the smart terminal is associated with an electronic map in the smart terminal in advance, that is, the function of the electronic map can be invoked by the data encryption system. Thus, after the smart terminal activates the data encryption system, an electronic map associated with the data encryption system can be initiated by an electronic map control module of the data encryption system.
-将所述电子地图锁定至一目标精度层- Locking the electronic map to a target precision layer
电子地图(Electronic map)也即数字地图,是以数字形式记录、存储地理位置信息的地图形式。电子地图的精度指的是电子地图的分辨率,也即一个像素代表的实际地面面积。所述电子地图分辨率与其反应的地面分辨率、显示比例尺、数据源比例尺的关系可参见下表:Electronic map (digital map) is a map form that records and stores geographic location information in digital form. The accuracy of an electronic map refers to the resolution of an electronic map, that is, the actual floor area represented by one pixel. The relationship between the resolution of the electronic map and the ground resolution, display scale, and data source scale of the reaction can be seen in the following table:
电子地图分级Electronic map rating
级别level 地面分辨率(m/像素)Ground resolution (m/pixel) 显示比例尺Display scale 数据源比例尺Data source scale
11 78 271.517 078 271.517 0 1∶295 829 355.451:295 829 355.45 1∶100万1:1 million
22 39 135.758 539 135.758 5 1∶147 914 677.731:147 914 677.73 1∶100万1:1 million
33 19 567.879 219 567.879 2 1∶73 957 338.861:73 957 338.86 1∶100万1:1 million
44 9 783.939 69 783.939 6 1∶36 978 669.431:36 978 669.43 1∶100万1:1 million
55 4 891.969 84 891.969 8 1∶18 489 334.721:18 489 334.72 1∶100万1:1 million
66 2 445.984 92 445.984 9 1∶9 244 667.361:9 244 667.36 1∶100万1:1 million
77 1 222.992 51 222.992 5 1∶4 622 333.681:4 622 333.68 1∶100万1:1 million
88 611.496 2611.496 2 1∶2 311 166.841:2 311 166.84 1∶100万1:1 million
99 305.748 1305.748 1 1∶1 155 583.421:1 155 583.42 1∶100万1:1 million
1010 152.874 1152.874 1 1∶577 791.711:577 791.71 1∶100万1:1 million
1111 76.437 076.437 0 1∶288 895.851:288 895.85 1∶25万1:250,000
1212 38.218 538.218 5 1∶144 447.931:144 447.93 1∶25万1:250,000
1313 19.109 319.109 3 1∶72 223.961:72 223.96 1∶5万1:50,000
1414 9.554 69.554 6 1∶36 111.981:36 111.98 1∶5万1:50,000
1515 4.777 34.777 3 1∶18 055.991:18 055.99 1∶1万1:1 million
1616 2.388 72.388 7 1∶9 028.001:9 028.00 1∶1万1:1 million
1717 1.194 31.194 3 1∶4 514.001:4 514.00 1∶5000或1∶1万1:5000 or 1:1 million
1818 0.597 20.597 2 1∶2 257.001:2 257.00 1∶2000或1∶10001:2000 or 1:1000
1919 0.298 60.298 6 1∶1 128.51:1 128.5 1∶1000或1∶20001:1000 or 1:2000
2020 0.149 30.149 3 1∶564.251:564.25 1∶500或1∶10001:500 or 1:1000
从上述表格中可以看出,电子地图的不同分辨率表示了不同的地面地理位置的情况。故,本实施例中,在所述电子地图中选定具体地理位置之前,首先,应当锁定所述数据加密系统所调用的电子地图的精度层。故,本实施例中,用户可对所述智能终端输入一操作指令,所述智能终端的精度调节模块则可捕获一操作指令,并解析后,根据所述操作指令,将所述电子地图锁定至一目标精度层。从而,所述电子地图的显示比例尺、地面分辨率等相应地被锁定。 As can be seen from the above table, the different resolutions of the electronic map represent different geographical locations. Therefore, in this embodiment, before selecting a specific geographic location in the electronic map, first, the precision layer of the electronic map called by the data encryption system should be locked. Therefore, in this embodiment, the user may input an operation instruction to the smart terminal, and the precision adjustment module of the smart terminal may capture an operation instruction, and after parsing, lock the electronic map according to the operation instruction. To a target precision layer. Thereby, the display scale, the ground resolution, and the like of the electronic map are accordingly locked.
-在所述目标精度层下,捕获一操作指令,根据所述操作指令,在所述电子地图中锁定一解锁位置- capturing an operation command under the target precision layer, and locking an unlocked position in the electronic map according to the operation instruction
本实施例中,锁定所调用的所述电子地图的精度层后,用户可根据自身需求在所述智能终端显示的电子地图中选择一用于加密的解锁位置。所述智能终端中还设置有一第一定位模块,所述定位模块可以捕获用户触发所述智能终端的操作指令,并解析所述操作指令后,根据所述操作指令,获取所述电子地图中的一解锁位置。In this embodiment, after the accuracy layer of the electronic map that is invoked is locked, the user can select an unlocked position for encryption in the electronic map displayed by the smart terminal according to the needs of the user. The smart terminal is further configured with a first positioning module, where the positioning module can capture an operation instruction that triggers the smart terminal by the user, and after parsing the operation instruction, acquire the electronic map according to the operation instruction. An unlocked position.
参见图2,其为一符合图1中的在电子地图中锁定一解锁位置的步骤的流程示意图。从图中可以看出,优选地,本实施例中,在电子地图中锁定一解锁位置的步骤具备包括:Referring to FIG. 2, it is a schematic flowchart of a step of locking an unlocking position in an electronic map according to FIG. 1. As can be seen from the figure, preferably, in this embodiment, the step of locking an unlocked position in the electronic map comprises:
-在所述目标精度层下,捕获一操作指令- capturing an operation instruction under the target precision layer
本实施例中,所述第一定位模块具体包括,一第一指令单元,所述第一指令单元可捕获用户对所述智能终端的触发动作,并读取所述触发动作的触发压力、时间、位置等动作信息,并根据所述动作信息在所述智能终端的指令数据库中检索所述动作信息表达的操作指令,并生成一相应的运行指令向外发送。In this embodiment, the first positioning module specifically includes a first instruction unit, where the first instruction unit can capture a trigger action of the user on the smart terminal, and read the trigger pressure and time of the trigger action. And action information such as location, and retrieving the operation instruction expressed by the action information in the instruction database of the smart terminal according to the action information, and generating a corresponding running instruction to send out.
-根据所述操作指令,选定所述电子地图中一解锁位置- selecting an unlocked position in the electronic map according to the operation instruction
本实施例中,所述第一定位模块还包括一第一定位单元,所述第一定位单元可接收所述第一指令单元发送的运行指令,并根据所述运行指令,选定所述电子地图中一解锁位置。In this embodiment, the first positioning module further includes a first positioning unit, the first positioning unit may receive a running instruction sent by the first instruction unit, and select the electronic according to the running instruction. An unlocked location in the map.
-读取所述解锁位置在所述电子地图中的位置信息,获得一解锁位置信息,并向外发送Reading the location information of the unlocked location in the electronic map, obtaining an unlocked location information, and sending the information
相应地,所述第一定位模块的一信息识别单元可读取所述第一定位单元选定的所述解锁位置的在所述电子地图中的具体位置信息,从而,可获得一解锁位置信息,并向外发送所述解锁位置信息。Correspondingly, an information identifying unit of the first positioning module can read specific location information in the electronic map of the unlocked location selected by the first positioning unit, thereby obtaining an unlocking location information. And sending the unlocked location information outward.
-以所述解锁位置为解锁密码,对所述目标文件进行加密处理- encrypting the target file by using the unlocked location as an unlock password
继续参阅图1,本实施例中,所述智能终端中还包括一加密模块。当根据用户的操作指令确定解锁位置后,所述加密模块可对所述目标文件进行加密处理,并最终以所述解锁位置信息设置为所述目标文件的解密密码。With continued reference to FIG. 1, in the embodiment, the smart terminal further includes an encryption module. After determining the unlocking position according to the operation instruction of the user, the encryption module may perform encryption processing on the target file, and finally set the decryption password as the decryption password of the target file.
参阅图3,其为图1中的对目标文件进行加密处理的步骤的流程示意图。从图中可以看出,优选地,本实施例中,对目标文件进行加密处理的步骤主要包括:Referring to FIG. 3, it is a schematic flowchart of the steps of performing encryption processing on the target file in FIG. It can be seen from the figure that, in this embodiment, the steps of performing encryption processing on the target file mainly include:
-设置一误差数值- set an error value
具体地,本实施例中,所述加密模块包括一第二指令单元,所述第二指令单元可捕 获用户对所述智能终端的触发动作,并读取所述触发动作的触发压力、时间、位置等动作信息,并根据所述动作信息识别所述用户对所述智能终端输入的一误差数值,并将所述误差数值转换为一智能终端可读的数字信息向外发送。Specifically, in this embodiment, the encryption module includes a second instruction unit, and the second instruction unit can capture Obtaining a trigger action of the smart terminal by the user, and reading action information such as trigger pressure, time, position, and the like of the trigger action, and identifying an error value input by the user to the smart terminal according to the action information, And converting the error value into digital information readable by a smart terminal and transmitting the digital information.
-计算获得一以所述解锁位置信息为中心,所述误差数值为半径的圆形内的各点的位置信息- calculating a positional information of each point within a circle centered on said unlocked position information and said error value being a radius
本实施例中,所述加密模块还包括一数据处理单元,所述数据处理单元可接收所述第二指令单元发出的误差数值以及所述第一定位模块读取的解锁位置信息,并以所述解锁位置信息为中心,所述误差数值为半径,建立一圆形模型,计算获得该圆形模型中各点的位置信息。In this embodiment, the encryption module further includes a data processing unit, and the data processing unit may receive an error value sent by the second instruction unit and unlocked position information read by the first positioning module, and The unlocking position information is centered, the error value is a radius, a circular model is established, and position information of each point in the circular model is calculated.
-以所述圆形内的各点的位置信息,建立一解锁数据列表- establishing an unlock data list with position information of points in the circle
本实施例中,所述加密模块还设置有一数据统计单元,所述数据统计单元可以读取以所述解锁位置信息为中心,所述误差数值为半径所限定的圆形区域内各点的位置信息,并按照一定的规律,如纬度从小到大等,建立一解锁数据列表,存储于所述智能终端的存储空间中。In this embodiment, the encryption module is further provided with a data statistics unit, wherein the data statistics unit can read the unlocked position information as a center, and the error value is a position of each point in the circular area defined by the radius. Information, and according to certain rules, such as latitude from small to large, an unlock data list is established and stored in the storage space of the smart terminal.
-以所述解锁列表中各点的位置信息为解锁密钥,进行一加密运算,将所述目标文件转换为一目标密文- performing an encryption operation by using the location information of each point in the unlock list as an unlocking key, and converting the target file into a target ciphertext
本实施例中,所述加密模块中还设置有一加密单元。所述加密单元可进行一加密运算,以所述解锁列表中各点的位置信息为解锁密钥,将所述目标文件转换为一目标密文。In this embodiment, an encryption unit is further disposed in the encryption module. The encryption unit may perform an encryption operation, and use the location information of each point in the unlock list as an unlocking key to convert the target file into a target ciphertext.
优选地,本实施例中,所采用的加密算法可以为数据加密标准(DES)算法,基于Rijndael算法对称高级数据加密标准AES,或者RSA算法。Preferably, in this embodiment, the encryption algorithm used may be a Data Encryption Standard (DES) algorithm, based on the Rijndael algorithm symmetric advanced data encryption standard AES, or an RSA algorithm.
-将所述目标密文存储于所述智能终端的存储空间中。- storing the target ciphertext in a storage space of the smart terminal.
本实施例中,所述加密模块还包括一存储单元,所述存储单元可以将由所述目标文件转换获得的目标密文存储于所述智能终端的存储空间中。In this embodiment, the encryption module further includes a storage unit, and the storage unit may store the target ciphertext obtained by converting the target file in a storage space of the smart terminal.
对应上述目标文件的加密方法,本发明还提供一种对所述目标文件的解密方法,参阅图4,其为一对应图1中加密文件的解密方法的流程示意图。从图中可以看出,本实施例中,文件解密方法的步骤主要包括:Corresponding to the encryption method of the target file, the present invention further provides a method for decrypting the target file. Referring to FIG. 4, it is a schematic flowchart of a method for decrypting the encrypted file in FIG. As can be seen from the figure, in the embodiment, the steps of the file decryption method mainly include:
-捕获所述智能终端的当前地理位置信息- capturing current geographic location information of the smart terminal
对应于上述文件加密方法,用户需要对所述目标文件进行加密时,可携带所述智能终端到达预先设定的解密位置。此时,所述智能终端中的一第二定位模块可获取所述智能终端的当前地理位置信息,并反馈至所述智能终端中。 Corresponding to the above file encryption method, when the user needs to encrypt the target file, the smart terminal may be carried to reach a preset decryption location. At this time, a second positioning module of the smart terminal may acquire current geographic location information of the smart terminal and feed back to the smart terminal.
-将所述当前地理位置信息与所述解锁位置相比对- comparing the current geographic location information to the unlocked location
所述智能终端中还设置有一第一校验模块,所述第一校验模块可读取所述第二定位模块所获取的所述智能终端的当前地理位置信息,并将所述当前地理位置信息与所述解锁位置信息进行相比对。优选地,本实施例中,所述第一校验模块可将所述当前地理位置信息与所述解锁数据列表中的解锁数据进行比对,当所述当前地理位置信息与其中一具体解锁位置信息一致时,则判断为到达解锁位置,所述第一校验模块生成一解锁指令向外发送;否则,不进行任何操作。A first check module is further disposed in the smart terminal, where the first check module can read current geographic location information of the smart terminal acquired by the second positioning module, and the current geographic location The information is compared to the unlocked location information. Preferably, in this embodiment, the first verification module may compare the current geographic location information with the unlocked data in the unlocked data list, where the current geographic location information and one of the specific unlocked locations When the information is consistent, it is determined that the unlocked position is reached, and the first check module generates an unlock command to send out; otherwise, no operation is performed.
-对所述目标文件进行解密处理,将所述目标文件由密文转换为明文。Decrypting the target file, converting the target file from ciphertext to plaintext.
所述智能终端中的第一解密模块可接收所述解锁指令,并根据所述解锁指令,通过一相应的解密运算,对所述目标文件进行解密处理,将所述目标文件由密文转换为用户可视、可读、可操作的明文。The first decryption module in the smart terminal may receive the unlocking instruction, and according to the unlocking instruction, decrypt the target file by a corresponding decryption operation, and convert the target file from ciphertext to Clear, user-readable, readable, and actionable.
对应上述目标文件的加密方法,为提供用户无法达到解锁位置时的解锁方案,本发明还提供另一种对所述目标文件的解密方法,参阅图5,其为一对应图1中加密文件的另一解密方法的流程示意图。从图中可以看出,本实施例中,文件解密方法的步骤主要包括:For the encryption method corresponding to the foregoing target file, in order to provide an unlocking scheme when the user cannot reach the unlocked position, the present invention further provides another method for decrypting the target file. Referring to FIG. 5, it is an encrypted file corresponding to FIG. A schematic flow chart of another decryption method. As can be seen from the figure, in the embodiment, the steps of the file decryption method mainly include:
-捕获一操作指令- Capture an operation command
本实施例中,所述智能终端包括一指令模块,所述指令模块可捕获用户对所述智能终端的触发动作,并读取所述触发动作的触发压力、时间、位置等动作信息,并根据所述动作信息在所述智能终端的指令数据库中检索所述动作信息表达的操作指令,并生成一相应的运行指令向外发送。In this embodiment, the smart terminal includes an instruction module, and the instruction module can capture a trigger action of the user on the smart terminal, and read action information such as trigger pressure, time, position, etc. of the trigger action, and according to The action information retrieves an operation instruction expressed by the action information in an instruction database of the smart terminal, and generates a corresponding run instruction to send out.
-选定所述电子地图中一第一解锁位置- selecting a first unlocked location in the electronic map
本实施例中,所述智能终端中还设置有一第三定位模块,所述第三定位模块可接收所述运行指令,并根据所述运行指令,在所述电子地图中选定一第一解锁位置。In this embodiment, a third positioning module is further disposed in the smart terminal, where the third positioning module can receive the running instruction, and select a first unlocking in the electronic map according to the running instruction. position.
-将所述第一解锁位置与所述解锁位置进行比对- comparing the first unlocked position with the unlocked position
所述智能终端中还设置有一第二校验模块,所述第二校验模块可读取所述第一解锁位置的具体地理位置信息,并将所述地理位置信息与所述解锁位置信息进行相比对。优选地,本实施例中,所述第二校验模块可将所述地理位置信息与所述解锁数据列表中的解锁数据进行比对,当所述地理位置信息与其中一具体解锁位置信息一致时,所述第二校验模块生成一解锁指令向外发送;否则,不进行任何操作。A second verification module is further disposed in the smart terminal, where the second verification module can read specific geographic location information of the first unlocked location, and perform the geographic location information and the unlocked location information. Compared to right. Preferably, in this embodiment, the second verification module may compare the geographical location information with the unlock data in the unlock data list, where the geographic location information is consistent with one of the specific unlocked location information. The second verification module generates an unlock command to send out; otherwise, no operation is performed.
-对所述目标文件进行解密处理,将所述目标文件由密文转换为明文。 Decrypting the target file, converting the target file from ciphertext to plaintext.
本实施例中,所述智能终端中的第二解密模块可接收所述解锁指令,并根据所述解锁指令,通过一相应的解密运算,对所述目标文件进行解密处理,将所述目标文件由密文转换为用户可视、可读、可操作的明文。In this embodiment, the second decryption module in the smart terminal may receive the unlocking instruction, and according to the unlocking instruction, decrypt the target file by using a corresponding decryption operation, and the target file is Converted from ciphertext to clear, readable, and operable plain text.
综上所述,本发明提供一种利用电子地图进行数据文件加密的加密方法,其将数据加密系统与电子地图相关联,利用地理位置作为数据文件的解锁密码,从而,可通过携带智能终端到达具体解锁位置或者利用将电子地图再次调制解锁位置对数据文件解密。In summary, the present invention provides an encryption method for encrypting data files by using an electronic map, which associates a data encryption system with an electronic map, and uses a geographical location as an unlock password of the data file, thereby being able to arrive by carrying the smart terminal. The data file is decrypted by specifically unlocking the location or by modulating the unlocked location with the electronic map.
本发明另一方面,在于提供一种智能终端的数据加密系统。参阅图6,其为一符合本发明一优选实施例的智能终端的数据加密系统的结构图。从图中可以看出,本实施例提供的智能终端的的数据加密系统主要包括以下模块或单元:Another aspect of the present invention is to provide a data encryption system for an intelligent terminal. Referring to FIG. 6, which is a structural diagram of a data encryption system of a smart terminal in accordance with a preferred embodiment of the present invention. As can be seen from the figure, the data encryption system of the intelligent terminal provided by this embodiment mainly includes the following modules or units:
-系统控制模块-System Control Module
本实施例中,所述智能终端设置有一系统控制模块,所述系统控制模块实现读取用户对所述智能终端的触发动作,并根据所述触发动作启动所述智能终端的数据加密系统的技术效果;In this embodiment, the smart terminal is provided with a system control module, and the system control module implements a technology for reading a trigger action of the user on the smart terminal, and starting a data encryption system of the smart terminal according to the triggering action. effect;
-目标选择模块-Target selection module
所述智能终端的用户根据自身需求选择一待加密的目标文件,并向所述智能终端发送一操作指令后,所述智能终端的目标选择模块可以读取所述操作指令,并相应地锁定待加密的目标文件,使所述目标文件维持一待处理状态。After the user of the smart terminal selects an object file to be encrypted according to its own needs and sends an operation instruction to the smart terminal, the target selection module of the smart terminal can read the operation instruction and lock the operation instruction accordingly. The encrypted target file maintains the target file in a pending state.
-电子地图控制模块- Electronic map control module
为实现利用地理位置加密/解密智能终端中的文件资料或者应用程序的技术效果,本实施例中的数据加密系统中设置有一电子地图控制模块,所述电子地图控制模块可启动一与所述数据加密系统预先相关联的电子地图,调用所述电子地图的所有功能模块,实现定位、搜索位置等功能。In order to realize the technical effect of encrypting/decrypting the file data or the application program in the smart terminal by using the geographic location, the data encryption system in this embodiment is provided with an electronic map control module, and the electronic map control module can start a data and the data The electronic map in advance associated with the encryption system invokes all functional modules of the electronic map to implement functions such as positioning and searching for a location.
-精度调节模块- Precision adjustment module
由于电子地图的不同分辨率表示了不同的地面地理位置的情况。故,本实施例中,所述数据处理系统中还包括一精度调剂模块。用户可对所述智能终端输入一操作指令,所述智能终端的精度调节模块则可捕获一操作指令,并解析后,根据所述操作指令,将所述电子地图锁定至一目标精度层。从而,所述电子地图的显示比例尺、地面分辨率等相应地被锁定。将所述电子地图锁定至一目标精度层。Since the different resolutions of the electronic map represent different geographical locations. Therefore, in this embodiment, the data processing system further includes a precision adjustment module. The user can input an operation instruction to the smart terminal, and the precision adjustment module of the smart terminal can capture an operation instruction, and after parsing, lock the electronic map to a target precision layer according to the operation instruction. Thereby, the display scale, the ground resolution, and the like of the electronic map are accordingly locked. The electronic map is locked to a target precision layer.
-第一定位模块- first positioning module
本实施例中,所述智能终端中还设置有一第一定位模块,所述定位模块可以捕获用 户触发所述智能终端的操作指令,并解析所述操作指令后,根据所述操作指令,获取所述电子地图中的一解锁位置。In this embodiment, a first positioning module is further disposed in the smart terminal, and the positioning module can be used for capturing. After triggering the operation instruction of the smart terminal and parsing the operation instruction, the user acquires an unlocked position in the electronic map according to the operation instruction.
优选地,参与图7,其为一符合图6中第一定位模块的结构图,从图中可以看出,本实施例中,所述第一定位模块具体包括以下单元:Preferably, FIG. 7 is a structural diagram conforming to the first positioning module in FIG. 6. As can be seen from the figure, in the embodiment, the first positioning module specifically includes the following units:
-第一指令单元- first instruction unit
所述第一指令单元可捕获用户对所述智能终端的触发动作,并读取所述触发动作的触发压力、时间、位置等动作信息,并根据所述动作信息在所述智能终端的指令数据库中检索所述动作信息表达的操作指令,并生成一相应的运行指令向外发送。The first instruction unit may capture a trigger action of the user on the smart terminal, and read action information such as trigger pressure, time, position, etc. of the trigger action, and execute an instruction database of the smart terminal according to the action information. Searching for the operation instruction expressed by the action information, and generating a corresponding running instruction to send out.
-第一定位单元- first positioning unit
所述第一定位单元可接收所述第一指令单元发送的运行指令,并根据所述运行指令,选定所述电子地图中一解锁位置。The first positioning unit may receive a running instruction sent by the first instruction unit, and select an unlocking position in the electronic map according to the running instruction.
-信息识别单元-Information identification unit
所述信息识别单元可读取所述第一定位单元选定的所述解锁位置的在所述电子地图中的具体位置信息,从而,可获得一解锁位置信息,并向外发送所述解锁位置信息。The information identifying unit may read specific location information in the electronic map of the unlocked location selected by the first positioning unit, thereby obtaining an unlocked location information and transmitting the unlocked location outward information.
-加密模块- encryption module
继续参阅图6,从图中可以看出,本实施例中,所述数据加密系统还包括一加密模块,当根据用户的操作指令确定解锁位置后,所述加密模块可对所述目标文件进行加密处理,并最终以所述解锁位置信息设置为所述目标文件的解密密码。With reference to FIG. 6, it can be seen from the figure that in the embodiment, the data encryption system further includes an encryption module, and after determining an unlocking position according to an operation instruction of the user, the encryption module may perform the target file. The encryption process is performed, and finally the unlocked location information is set as the decryption password of the target file.
具体优选地,参阅图8,其为一符合图6中的加密模块的结构图,从图中可以看出,本实施例中,所述加密模块具体包括以下单元:Specifically, referring to FIG. 8 , which is a structural diagram of the cryptographic module in FIG. 6 , it can be seen from the figure that, in this embodiment, the cryptographic module specifically includes the following units:
-第二指令单元- second instruction unit
所述第二指令单元可捕获用户对所述智能终端的触发动作,并读取所述触发动作的触发压力、时间、位置等动作信息,并根据所述动作信息识别所述用户对所述智能终端输入的一误差数值,并将所述误差数值转换为一智能终端可读的数字信息向外发送。The second instruction unit may capture a trigger action of the user on the smart terminal, and read action information such as trigger pressure, time, position, etc. of the trigger action, and identify the user to the smart according to the action information. An error value input by the terminal, and converting the error value into a digital information readable by a smart terminal to be sent out.
-数据处理单元-Data processing unit
所述数据处理单元可接收所述第二指令单元发出的误差数值以及所述第一定位模块读取的解锁位置信息,并以所述解锁位置信息为中心,所述误差数值为半径,建立一圆形模型,计算获得该圆形模型中各点的位置信息。The data processing unit may receive the error value sent by the second instruction unit and the unlock position information read by the first positioning module, and center on the unlock position information, the error value is a radius, and establish a A circular model calculates the position information of each point in the circular model.
-数据统计单元-Data Statistics Unit
所述数据统计单元可以读取以所述解锁位置信息为中心,所述误差数值为半径所限 定的圆形区域内各点的位置信息,并按照一定的规律,如纬度从小到大等,建立一解锁数据列表,存储于所述智能终端的存储空间中。The data statistics unit can read the unlocked position information as a center, and the error value is limited to a radius. Position information of each point in the circular area, and according to a certain rule, such as latitude from small to large, an unlock data list is established and stored in the storage space of the smart terminal.
-加密单元- encryption unit
所述加密单元可进行一加密运算,以所述解锁列表中各点的位置信息为解锁密钥,将所述目标文件转换为一目标密文。The encryption unit may perform an encryption operation, and use the location information of each point in the unlock list as an unlocking key to convert the target file into a target ciphertext.
优选地,本实施例中,所采用的加密算法可以为数据加密标准(DES)算法,基于Rijndael算法对称高级数据加密标准AES,或者RSA算法。Preferably, in this embodiment, the encryption algorithm used may be a Data Encryption Standard (DES) algorithm, based on the Rijndael algorithm symmetric advanced data encryption standard AES, or an RSA algorithm.
-存储单元- storage unit
所述存储单元可以将由所述目标文件转换获得的目标密文存储于所述智能终端的存储空间中。The storage unit may store the target ciphertext obtained by the conversion of the target file in a storage space of the smart terminal.
另外,参阅图9,其为一符合本发明另一优选的智能终端的数据加密系统的结构图,从图中可以看出,本实施例所提供的数据加密系统还包括用于目标文件解密的下述模块:In addition, referring to FIG. 9, which is a structural diagram of a data encryption system according to another preferred smart terminal of the present invention, it can be seen from the figure that the data encryption system provided in this embodiment further includes a target file decryption. The following modules:
-第二定位模块-Second positioning module
用于获取所述智能终端的当前地理位置信息,并反馈至所述智能终端中。And acquiring current geographic location information of the smart terminal, and feeding back to the smart terminal.
-第一校验模块- first check module
所述第一校验模块可读取所述第二定位模块所获取的所述智能终端的当前地理位置信息,并将所述当前地理位置信息与所述解锁位置信息进行相比对。优选地,本实施例中,所述第一校验模块可将所述当前地理位置信息与所述解锁数据列表中的解锁数据进行比对,当所述当前地理位置信息与其中一具体解锁位置信息一致时,则判断为到达解锁位置,所述第一校验模块生成一解锁指令向外发送;否则,不进行任何操作。The first verification module may read current geographic location information of the smart terminal acquired by the second positioning module, and compare the current geographic location information with the unlocked location information. Preferably, in this embodiment, the first verification module may compare the current geographic location information with the unlocked data in the unlocked data list, where the current geographic location information and one of the specific unlocked locations When the information is consistent, it is determined that the unlocked position is reached, and the first check module generates an unlock command to send out; otherwise, no operation is performed.
-第一解密模块- first decryption module
所述第一解密模块可接收所述解锁指令,并根据所述解锁指令,通过一相应的解密运算,对所述目标文件进行解密处理,将所述目标文件由密文转换为用户可视、可读、可操作的明文。The first decryption module may receive the unlocking instruction, and according to the unlocking instruction, decrypt the target file by a corresponding decryption operation, and convert the target file from a ciphertext to a user, Readable, actionable plain text.
优选地,参阅图10,其为一符合本发明另一优选的智能终端的数据加密系统的结构图,从图中可以看出,本实施例所提供的数据加密系统还包括用于目标文件解密的下述模块:Preferably, referring to FIG. 10, which is a structural diagram of a data encryption system according to another preferred smart terminal of the present invention, it can be seen from the figure that the data encryption system provided in this embodiment further includes target file decryption. The following modules:
-指令模块- instruction module
所述指令模块可捕获用户对所述智能终端的触发动作,并读取所述触发动作的触发压力、时间、位置等动作信息,并根据所述动作信息在所述智能终端的指令数据库中检 索所述动作信息表达的操作指令,并生成一相应的运行指令向外发送。The instruction module may capture a trigger action of the user on the smart terminal, and read action information such as trigger pressure, time, position, etc. of the trigger action, and check the command database in the smart terminal according to the action information. The operation instruction expressed by the action information is sent, and a corresponding running instruction is generated and sent out.
-第三定位模块- third positioning module
所述第三定位模块可接收所述运行指令,并根据所述运行指令,在所述电子地图中选定一第一解锁位置。The third positioning module can receive the running instruction, and select a first unlocking position in the electronic map according to the running instruction.
-第二校验模块-Second check module
所述第二校验模块可读取所述第一解锁位置的具体地理位置信息,并将所述地理位置信息与所述解锁位置信息进行相比对。优选地,本实施例中,所述第二校验模块可将所述地理位置信息与所述解锁数据列表中的解锁数据进行比对,当所述地理位置信息与其中一具体解锁位置信息一致时,所述第二校验模块生成一解锁指令向外发送;否则,不进行任何操作。The second verification module may read specific geographic location information of the first unlocked location, and compare the geographic location information with the unlocked location information. Preferably, in this embodiment, the second verification module may compare the geographical location information with the unlock data in the unlock data list, where the geographic location information is consistent with one of the specific unlocked location information. The second verification module generates an unlock command to send out; otherwise, no operation is performed.
-第二解密模块- second decryption module
所述第二解密模块可接收所述解锁指令,并根据所述解锁指令,通过一相应的解密运算,对所述目标文件进行解密处理,将所述目标文件由密文转换为用户可视、可读、可操作的明文。The second decryption module may receive the unlocking instruction, and according to the unlocking instruction, decrypt the target file by a corresponding decryption operation, and convert the target file from a ciphertext to a user, Readable, actionable plain text.
综上所述,本发明所提供的智能终端的数据加密系统,设置有系统控制模块、电子地图控制模块、定位模块等,利用本发明利用上述模块的相互配合,实现利用地理位置进行加密的技术效果,提高数据加密的便捷性和有效性,同时避免用户繁琐计算密码的麻烦。In summary, the data encryption system of the intelligent terminal provided by the present invention is provided with a system control module, an electronic map control module, a positioning module, and the like, and utilizes the mutual cooperation of the above modules to realize the technology of encrypting by using a geographical location. The effect is to improve the convenience and effectiveness of data encryption while avoiding the trouble of cumbersome calculation of passwords.
应当注意的是,本发明的实施例有较佳的实施性,且并非对本发明作任何形式的限制,任何熟悉该领域的技术人员可能利用上述揭示的技术内容变更或修饰为等同的有效实施例,但凡未脱离本发明技术方案的内容,依据本发明的技术实质对以上实施例所作的任何修改或等同变化及修饰,均仍属于本发明技术方案的范围内。 It should be noted that the embodiments of the present invention are preferred embodiments, and are not intended to limit the scope of the present invention. Any one skilled in the art may use the above-disclosed technical contents to change or modify the equivalent embodiments. Any modification or equivalent changes and modifications of the above embodiments in accordance with the technical spirit of the present invention are still within the scope of the technical solutions of the present invention.

Claims (10)

  1. 一种智能终端的数据加密方法,其特征在于,包括以下步骤:A data encryption method for an intelligent terminal, comprising the steps of:
    启动数据加密系统;Start the data encryption system;
    锁定待加密的目标文件;Lock the target file to be encrypted;
    启动一与所述数据加密系统相关联的电子地图;Initiating an electronic map associated with the data encryption system;
    将所述电子地图锁定至一目标精度层;Locking the electronic map to a target precision layer;
    在所述目标精度层下,捕获一操作指令,根据所述操作指令,在所述电子地图中锁定一解锁位置;Under the target precision layer, capturing an operation instruction, and locking an unlocking position in the electronic map according to the operation instruction;
    以所述解锁位置为解锁密码,对所述目标文件进行加密处理,Encrypting the target file by using the unlocked location as an unlock password,
    将所述目标文件转换为一目标密文,存储于所述智能终端的存储空间中。Converting the target file into a target ciphertext and storing it in a storage space of the smart terminal.
  2. 如权利要求1所述的数据加密方法,其特征在于,A data encryption method according to claim 1, wherein
    在所述目标精度层下,捕获一操作指令,在所述电子地图中锁定一解锁位置的步骤包括,Steps of capturing an operation command in the target accuracy layer and locking an unlocked position in the electronic map include:
    在所述目标精度层下,捕获一操作指令,Capture an operation instruction under the target precision layer,
    根据所述操作指令,选定所述电子地图中一解锁位置,Selecting an unlocked position in the electronic map according to the operation instruction,
    读取所述解锁位置在所述电子地图中的位置信息,获得一解锁位置信息,并向外发送。Reading the location information of the unlocked location in the electronic map, obtaining an unlocked location information, and transmitting the information.
  3. 如权利要求2所述的数据加密方法,其特征在于,A data encryption method according to claim 2, wherein
    以所述解锁位置为解锁密钥,对所述目标文件进行加密处理的步骤包括,The step of performing encryption processing on the target file by using the unlocked position as an unlocking key includes:
    设置一误差数值,Set an error value,
    计算获得一以所述解锁位置信息为中心,所述误差数值为半径的圆形内的各点的位置信息,Calculating a position information of each point in a circle centered on the unlocked position information and having the error value as a radius,
    以所述圆形面积内的各点的位置信息,建立一解锁数据列表,Establishing an unlock data list by using position information of each point in the circular area.
    以所述解锁列表中各点的位置信息为解锁密钥,进行一加密运算,将所述目标文件转换为一目标密文,The location information of each point in the unlocking list is used as an unlocking key, and an encryption operation is performed to convert the target file into a target ciphertext.
    将所述目标密文存储于所述智能终端的存储空间中。The target ciphertext is stored in a storage space of the smart terminal.
  4. 如权利要求1所述的数据加密方法,其特征在于,A data encryption method according to claim 1, wherein
    所述目标文件的解密的步骤包括,The step of decrypting the target file includes,
    捕获所述智能终端的当前地理位置信息,Capturing current geographic location information of the smart terminal,
    将所述当前地理位置信息与所述解锁位置相比对, Comparing the current geographic location information with the unlocked location,
    当所述当前地理位置信息与所述解锁位置匹配时,When the current geographic location information matches the unlocked location,
    对所述目标文件进行解密处理,将所述目标文件由密文转换为明文。Decrypting the target file, converting the target file from ciphertext to plaintext.
  5. 如权利要求1所述的方法,其特征在于,The method of claim 1 wherein
    所述目标文件的解密的步骤还包括,The step of decrypting the target file further includes
    捕获一操作指令,Capture an operation command,
    选定所述电子地图中一第一解锁位置,Selecting a first unlocked position in the electronic map,
    将所述第一解锁位置与所述解锁位置进行比对,Comparing the first unlocked position with the unlocked position,
    当所述第一解锁位置与所述解锁位置相匹配时,When the first unlocked position matches the unlocked position,
    对所述目标文件进行解密处理,将所述目标文件由密文转换为明文。Decrypting the target file, converting the target file from ciphertext to plaintext.
  6. 一种智能终端的数据加密系统,其特征在于,包括以下模块,A data encryption system for an intelligent terminal, comprising the following modules,
    系统控制模块,启动数据加密系统;a system control module that starts a data encryption system;
    目标选择模块,锁定待加密的目标文件;The target selection module locks the target file to be encrypted;
    电子地图控制模块,启动一与所述数据加密系统相关联的电子地图;An electronic map control module that initiates an electronic map associated with the data encryption system;
    精度调节模块,将所述电子地图锁定至一目标精度层;a precision adjustment module that locks the electronic map to a target precision layer;
    第一定位模块,捕获一操作指令,根据所述操作指令,在所述电子地图中锁定一解锁位置;The first positioning module captures an operation instruction, and according to the operation instruction, locks an unlocking position in the electronic map;
    加密模块,以所述解锁位置为解锁密码,对所述目标文件进行加密处理,将所述目标文件转换为一目标密文,存储于所述智能终端的存储空间中。The cryptographic module encrypts the target file by using the unlocking location as an unlocking password, and converts the target file into a target ciphertext, and stores the target ciphertext in the storage space of the smart terminal.
  7. 如权利要求6所述的数据加密系统,其特征在于,A data encryption system according to claim 6 wherein:
    所述第一定位模块包括,The first positioning module includes
    第一指令单元,捕获一操作指令,a first instruction unit that captures an operation instruction,
    第一定位单元,根据所述操作指令,选定所述电子地图中一解锁位置,a first positioning unit, according to the operation instruction, selecting an unlocked position in the electronic map,
    信息识别单元,读取所述解锁位置在所述电子地图中的位置信息,获得一解锁位置信息,并向外发送。The information identifying unit reads the location information of the unlocked location in the electronic map, obtains an unlocked location information, and sends the unlocked location information.
  8. 如权利要求6所述的数据加密系统,其特征在于,A data encryption system according to claim 6 wherein:
    所述加密模块包括,The encryption module includes
    第二指令单元,捕获一操作指令,获取一误差数值,a second instruction unit that captures an operation instruction and acquires an error value,
    数据处理单元,计算获得一以所述解锁位置信息为中心,所述误差数值为半径的圆形面积内的各点的位置信息,The data processing unit calculates a position information of each point in a circular area centered on the unlocked position information and the error value is a radius,
    数据统计单元,以所述圆形内的各点的位置信息,建立一解锁数据列表, a data statistics unit, configured to establish an unlock data list by using location information of each point in the circle.
    加密单元,以所述解锁列表中各点的位置信息为解锁密钥,进行一加密运算,将所述目标文件转换为一目标密文,The encryption unit performs an encryption operation on the location information of each point in the unlock list, and converts the target file into a target ciphertext.
    存储单元,将所述目标密文存储于所述智能终端的存储空间中a storage unit, configured to store the target ciphertext in a storage space of the smart terminal
  9. 如权利要求6所述的数据加密系统,其特征在于,A data encryption system according to claim 6 wherein:
    还包括,Also includes,
    第二定位模块,捕获所述智能终端的当前地理位置信息,a second positioning module, capturing current geographic location information of the smart terminal,
    第一校验模块,将所述当前地理位置信息与所述解锁位置相比对,a first verification module, comparing the current geographic location information with the unlocked location,
    第一解密模块,当所述当前地理位置信息与所述解锁位置匹配时,对所述目标文件进行解密处理,将所述目标文件由密文转换为明文。The first decryption module decrypts the target file when the current geographic location information matches the unlocked location, and converts the target file from ciphertext to plaintext.
  10. 如权利要求6所述的数据加密系统,其特征在于,A data encryption system according to claim 6 wherein:
    还包括,Also includes,
    指令模块,捕获一操作指令,An instruction module that captures an operation instruction,
    第三定位模块,选定所述电子地图中一第一解锁位置,a third positioning module, selecting a first unlocking position in the electronic map,
    第二校验模块,将所述第一解锁位置与所述解锁位置进行比对,a second verification module that compares the first unlocked position with the unlocked position,
    第二解密模块,当所述第一解锁位置与所述解锁位置相匹配时,对所述目标文件进行解密处理,将所述目标文件由密文转换为明文。 And a second decryption module, when the first unlocking position matches the unlocking position, decrypting the target file, and converting the target file from ciphertext to plaintext.
PCT/CN2017/105833 2017-10-12 2017-10-12 Data encryption method and data encryption system for intelligent terminal WO2019071513A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/105833 WO2019071513A1 (en) 2017-10-12 2017-10-12 Data encryption method and data encryption system for intelligent terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/105833 WO2019071513A1 (en) 2017-10-12 2017-10-12 Data encryption method and data encryption system for intelligent terminal

Publications (1)

Publication Number Publication Date
WO2019071513A1 true WO2019071513A1 (en) 2019-04-18

Family

ID=66100225

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/105833 WO2019071513A1 (en) 2017-10-12 2017-10-12 Data encryption method and data encryption system for intelligent terminal

Country Status (1)

Country Link
WO (1) WO2019071513A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104077526A (en) * 2014-06-20 2014-10-01 珠海市君天电子科技有限公司 Polymorphic virus analyzing method and device and virus processing method and device
CN105243338A (en) * 2015-11-18 2016-01-13 哈尔滨工业大学 USB flash disk file encryption and decryption system and USB flash disk file encryption and decryption method based on combination of high-performance DSP and ARM
CN106650389A (en) * 2015-10-30 2017-05-10 东莞酷派软件技术有限公司 Intelligent terminal screen unlocking method and device and intelligent terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104077526A (en) * 2014-06-20 2014-10-01 珠海市君天电子科技有限公司 Polymorphic virus analyzing method and device and virus processing method and device
CN106650389A (en) * 2015-10-30 2017-05-10 东莞酷派软件技术有限公司 Intelligent terminal screen unlocking method and device and intelligent terminal
CN105243338A (en) * 2015-11-18 2016-01-13 哈尔滨工业大学 USB flash disk file encryption and decryption system and USB flash disk file encryption and decryption method based on combination of high-performance DSP and ARM

Similar Documents

Publication Publication Date Title
KR101958909B1 (en) Method of using one device to unlock another device
WO2020048241A1 (en) Blockchain cross-chain authentication method and system, and server and readable storage medium
CN103279411B (en) Enter the method and system of application program based on fingerprint recognition
US10469253B2 (en) Methods and apparatus for migrating keys
WO2017202025A1 (en) Terminal file encryption method, terminal file decryption method, and terminal
EP2731042A1 (en) Computer system for storing and retrieval of encrypted data items using a tablet computer and computer-implemented method
CN109525555B (en) Online registration and authentication method and device
CN104239815A (en) Electronic document encryption and decryption method and method based on iris identification
US9280650B2 (en) Authenticate a fingerprint image
US11328080B2 (en) Cryptographic key management
CN105429761A (en) Key generation method and device
CN112434336A (en) Block chain-based electronic medical record sharing method, device and system and storage medium
KR101809974B1 (en) A system for security certification generating authentication key combinating multi-user element and a method thereof
US20150304321A1 (en) An image management system and an image management method based on fingerprint authentication
US11449586B2 (en) Authenticated intention
US10867056B2 (en) Method and system for data protection
CN113282944B (en) Intelligent lock unlocking method and device, electronic equipment and storage medium
US10298399B2 (en) Location-locked data
CN112800477A (en) Data encryption and decryption system and method based on biological characteristic value
US11868457B2 (en) Device and method for authenticating user and obtaining user signature using user's biometrics
KR101809976B1 (en) A method for security certification generating authentication key combinating multi-user element
WO2019071513A1 (en) Data encryption method and data encryption system for intelligent terminal
JP2017108237A (en) System, terminal device, control method and program
CN113032802A (en) Data security storage method and system
JP2010199979A (en) Data backup system, decryption apparatus and data backup method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17928544

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17928544

Country of ref document: EP

Kind code of ref document: A1