[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN104185174A - Encryption method and terminal - Google Patents

Encryption method and terminal Download PDF

Info

Publication number
CN104185174A
CN104185174A CN201410342903.8A CN201410342903A CN104185174A CN 104185174 A CN104185174 A CN 104185174A CN 201410342903 A CN201410342903 A CN 201410342903A CN 104185174 A CN104185174 A CN 104185174A
Authority
CN
China
Prior art keywords
terminal
encrypted
information
file
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410342903.8A
Other languages
Chinese (zh)
Inventor
雷明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou TCL Mobile Communication Co Ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN201410342903.8A priority Critical patent/CN104185174A/en
Publication of CN104185174A publication Critical patent/CN104185174A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses an encryption method and terminal. The encryption method includes the following steps: the terminal receives an encryption command which is encryption command information automatically sent when the terminal judges that times for continuous unlocking failures of a user reach a preset value, or the encryption command is encryption command information sent by a cellphone number; whether the encryption command includes a password is judged; if the encryption command does not include a password, a preset password is used to encrypt a folder; and if the encryption command includes a password, the password is used to encrypt the folder. In the scheme, a condition for triggering sending of the encryption command is set and when the condition is met, the encryption command is sent to the terminal so as to encrypt all files in a folder which needs to be encrypted and the encryption command can be sent to the terminal through the cellphone number and thus remote encryption is realized and file cracking difficulty is increased and safety level of data is improved and thus data safety is ensured.

Description

A kind of encryption method and terminal
Technical field
The application relates to communication technical field, particularly relates to a kind of encryption method and terminal.
Background technology
Along with the development of mobile communication technology, the related application of mobile terminal is more and more extensive, such as, mobile terminal can be stored a large amount of files, photograph etc., can also apply Mobile banking etc.Meanwhile, after mobile terminal is lost, how to prevent the safety problem that data are revealed, become the huge challenge of mobile terminal extensive use.
Prior art provides a kind of method that prevents that data from revealing.User as startup password or unlocking pin, inputs numeral or pattern when with default numeral or pattern identical when mobile terminal identifies user by default numeral or pattern, carries out release and normally uses for user.Yet, after mobile terminal is lost, in the situation that can not passing through numeral or pattern release, thereby can carry out release to mobile terminal by some technological means, obtain the data in mobile terminal.So, because the data security in mobile terminal is on the hazard, and cause privacy of user to be leaked.
Summary of the invention
The technical problem that the application mainly solves is to provide a kind of encryption method and terminal, can triggering terminal automatically sending the file that encrypted command encrypts needs is encrypted, can also to terminal, send encrypted command by phone number, thereby realize remote encryption, increase the difficulty that cracks file, improve the safe class of data, thereby guarantee data security.
For solving the problems of the technologies described above, the technical scheme that the present invention adopts is: a kind of encryption method is provided, said method comprising the steps of: terminal receives encrypted command, wherein, described encrypted command is, the encrypted command information that the number of times of inputting continuously unlocking pin release failure as described terminal judges user sends while reaching preset value automatically, or described encrypted command is the encrypted command information that phone number sends, and described unlocking pin is pattern or symbol; Judge whether described encrypted command comprises password, wherein, described password is numeral and/or alphabetical combination; If described encrypted command does not comprise password, use preset password to be encrypted file, if described encrypted command comprises password, use described password to be encrypted file.
Wherein, before the step that receives encrypted command, also comprise, specify at least one file, and be described at least one folder allocation preset password, with the file in described at least one file, be encrypted, wherein, the file of described file for needing to encrypt.
Wherein, the step of described terminal reception encrypted command specifically comprises: terminal receives information; Judge whether described information is encrypted command information, wherein, if described information is the information automatically sending when number of times that described terminal receives the unlocking pin of user input reaches preset value, described information is identified as to encrypted command information, or, if sending the phone number of described information is preset number, and described packets of information is containing encrypted instruction, described information is identified as to encrypted command information.
Wherein, described method also comprises, described terminal is detecting while having changed new SIM card, adopt new digit corresponding to described new SIM card to send information to preset number, so that terminal corresponding to described preset number sends encrypted command information to described new digit, the file of described appointment is encrypted.
Wherein, described preset number is that user arranges in advance, corresponding at least one the default identifying code of described preset number, and wherein, when the identifying code of described terminal judges user's input is identical with described default identifying code, permission user changes preset number; When the identifying code of described terminal judges user input is different from described default identifying code, to preset number, send information, so that sending encrypted command information, terminal corresponding to described preset number arrive described terminal, the file of described appointment is encrypted.
For solving the problems of the technologies described above, the technical scheme that the present invention adopts is: a kind of encryption terminal is provided, described terminal comprises receiver module, judge module, control module, described receiver module is used for receiving encrypted command, wherein, described encrypted command is, automatically the encrypted command information sending when the number of times of the continuous unlocking pin of inputting of described terminal judges user release failure reaches preset value, or described encrypted command is the encrypted command information that phone number sends, described unlocking pin is pattern or symbol, described receiver module sends to described judge module by described encrypted command, described judge module is used for receiving described encrypted command, and judges whether described encrypted command comprises password, and wherein, described password is numeral and/or alphabetical combination, and described judge module sends to control module by judged result, described control module is used for receiving described judged result, when judgment result is that described encrypted command does not comprise password, use preset password to be encrypted described file, when judgment result is that described encrypted command comprises password, use described password to be encrypted described file.
Wherein, described terminal also comprises configuration module, and described configuration module is used to specify at least one file, and be described at least one folder allocation preset password, with the file in described at least one file, be encrypted, wherein, the file of described file for needing to encrypt.
Wherein, described receiver module comprises receiving element and recognition unit; Described receiving element is for reception information; Described recognition unit is used for judging whether described information is encrypted command information, wherein, if described information is the information automatically sending when number of times that described terminal judges user inputs unlocking pin release failure continuously reaches preset value, judge that described information is encrypted command information, or, if sending the phone number of described information is preset number, and described packets of information is containing encrypted instruction, judges that described information is encrypted command information.
Wherein, described terminal also comprises detection module, for detecting while having changed new SIM card, adopt new digit corresponding to described new SIM card to send information to preset number, so that terminal corresponding to described preset number sends encrypted command information to described new digit, the file of described appointment is encrypted.
Wherein, described preset number is that user arranges in advance, corresponding at least one the default identifying code of described preset number, and wherein, when the identifying code of described detection module judgement user input is identical with described default identifying code, permission user changes preset number; When the identifying code of described detection module judgement user input is different from described default identifying code, to preset number, send information, so that sending encrypted command information, terminal corresponding to described preset number arrive described terminal, the file of described appointment is encrypted.
The invention has the beneficial effects as follows: the situation that is different from prior art, the in the situation that the application opening safe release in terminal, by being set, triggering terminal sends the pre-conditioned of encrypted command, make when meeting when pre-conditioned, triggering terminal automatically sends encrypted command and is encrypted with the file that needs are encrypted.And, can to terminal, send encrypted command by default phone number, thereby realize, terminal is carried out to remote encryption.In this way, can increase the difficulty that cracks file, improve the safe class of data, thereby guarantee data security, when user brings back terminal, can directly file and the file encrypted are just decrypted and can be checked.
Accompanying drawing explanation
Fig. 1 is the application's encryption method one execution mode flow chart;
Fig. 2 is another execution mode flow chart of the application's encryption method;
Fig. 3 is that the application encrypts terminal one execution mode structural representation;
Fig. 4 is that the application encrypts another execution mode structural representation of terminal.
Embodiment
In below describing, in order to illustrate rather than in order limiting, to have proposed the detail such as particular system structure, interface, technology, to thoroughly understand the application.Yet, not it will be clear to one skilled in the art that in there is no other execution mode of these details and can realize the application yet.In other situation, omit the detailed description to well-known device, circuit and method, in order to avoid unnecessary details hinders the application's description.
Consult Fig. 1, Fig. 1 is the application's encryption method one execution mode flow chart.In present embodiment, encryption method comprises the following steps:
S101: terminal receives encrypted command, wherein, described encrypted command is, the encrypted command information that the number of times of inputting continuously unlocking pin release failure as described terminal judges user sends while reaching preset value automatically, or described encrypted command is the encrypted command information that phone number sends, and described unlocking pin is pattern or symbol.
In the situation that user is provided with unlocking pin, when user inputs unlocking pin to attempt that terminal is carried out to release, thereby while checking the content in terminal, terminal receives the unlocking pin of user's input.Wherein, unlocking pin is pattern or symbol, and symbol can be numeral or alphabetical, or digital and alphabetical combination.
Terminal, by the unlocking pin of the user's input receiving, compares with the default unlocking pin that is stored in terminal inner.If the unlocking pin of the user that terminal judges receives input is identical with default unlocking pin, terminal is carried out to release, so that user checks the content in terminal.If the unlocking pin of the user that terminal judges receives input is different from default unlocking pin, do not remove the protection to terminal, be judged as release failure, and the number of times of recording user release failure.For example, when the number of times of inputting continuously unlocking pin release failure as terminal judges user reaches preset value (, preset value is 5, but is not limited to this, can also be worth for other), triggering terminal sends encrypted command information automatically.The number of times of inputting continuously unlocking pin release failure as terminal judges user does not reach after preset value, if receive again the unlocking pin identical with default unlocking pin, terminal is carried out to release, the number of times of the release failure of having recorded is carried out to zero clearing processing simultaneously.
Or after terminal loss, terminal use is in order to prevent that the data of terminal from being leaked, while sending encrypted command information by phone number to terminal, terminal receives the encrypted command information that this phone number sends.Be understandable that, in the present embodiment, terminal use is when thinking that terminal data is on the hazard safely, initiatively by phone number, to terminal, sends encrypted command information, phone number can be that user associates by operation interface setting and terminal in advance, can be also not associated.In other embodiments, other trigger condition can also be set, make when meeting default trigger condition, trigger phone number and send encrypted command information to terminal, now, phone number can be that user associates by operation interface setting and terminal in advance, can be also not associated.When phone number and terminal are not associated, can directly by phone number, to terminal, send the encrypted command information that can be identified.When phone number be user arrange in advance the preset number associated with terminal time, when the operation of terminal meets when pre-conditioned, trigger default phone number and send encrypted command information to terminal, with file and the file that needs are encrypted, be encrypted.
S102: judge whether described encrypted command comprises password, wherein, described password is numeral and/or alphabetical combination;
Whether the encrypted command information that terminal judges receives comprises password, and wherein, password is numeral or alphabetical, or numeral and alphabetical combination.In other embodiments, password can be also extended formatting, such as, character string, binary code etc.
S103: if described encrypted command does not comprise password, use preset password to be encrypted described file, if described encrypted command comprises password, use described password to be encrypted described file.
If do not comprise password in terminal judges encrypted command information, the file that uses preset password to encrypt needs is encrypted, thereby uses preset password to be encrypted all files in the file of needs encryption.If comprise password in terminal judges encrypted command information, obtain the password in encrypted command information, and use the password getting to be encrypted the file of needs encryption, thereby use the password getting to be encrypted all files in the file of needs encryption.Wherein, needing the file of encrypting can be at least one, and preset password is the password default arranging in advance.
Be understandable that, in the present embodiment, password in file, preset password and the encrypted command information that needs to encrypt is one, and when encrypted command information does not comprise password, the file in the file that use preset password is encrypted needs and this document folder is encrypted; When encrypted command packets of information contains password, use the password getting to be encrypted the file in the file of needs encryption and this document folder.In other embodiments, needing the file of encrypting can be also two or more, the corresponding preset password of file that each need to be encrypted or one of them password in corresponding encrypted command information, or also can, the corresponding password of file that each need to be encrypted, the corresponding subcipher of each file in this document folder.
Be understandable that, the encrypted command information that terminal sends automatically, can comprise password, also can not comprise password.In the present embodiment, when this enciphered message comprises password, the file that uses the password in enciphered message to encrypt needs is encrypted, and when this enciphered message does not comprise enciphered message, the file that uses preset password to encrypt needs is encrypted.In other embodiments, when terminal judges encrypted command is, during encrypted command information that the number of times that terminal receives the unlocking pin of user input sends while reaching preset value automatically, also can skips steps S102, the file that directly uses preset password to encrypt needs is encrypted.
In other embodiments, in the time of can also being set to pre-conditioned when meeting (not being restricted pre-conditioned) herein, to terminal, send delete command, to delete the file of preserving important information; Or user can also send delete command to terminal by default phone number, preserves the file of important information with permanent delet, and then prevent important information leakage.
Such scheme, in the situation that terminal is opened safe release, sends the pre-conditioned of encrypted command by triggering terminal is set, and makes when meeting when pre-conditioned, and triggering terminal sends encrypted command automatically so that the file of needs encryption is encrypted.And, can to terminal, send encrypted command by default phone number, thereby realize, terminal is carried out to remote encryption.In this way, can increase the difficulty that cracks file, improve the safe class of data, thereby guarantee data security, when user brings back terminal, can directly file and the file encrypted are just decrypted and can be checked.
Consult Fig. 2, Fig. 2 is another execution mode flow chart of the application's encryption method.In present embodiment, encryption method comprises the following steps:
S201: specify at least one file, and be described at least one folder allocation preset password, with the file in described at least one file, be encrypted, wherein, the file of described file for needing to encrypt.
The file of specifying at least one to encrypt by operation interface as user, significant data is kept in the file of appointment, and during at least one the folder allocation preset password that need to encrypt of appointment, terminal receives the information of at least one file of user's appointment, and the password corresponding with the file of appointment, so that terminal can be used the preset password of distribution to be encrypted the file in file after receiving encrypted command, improve data security grade.
Wherein, encrypted command is, the encrypted command information that the number of times that receives the unlocking pin of user's input when terminal sends while reaching preset value automatically, or encrypted command is the encrypted command information that default phone number sends, unlocking pin is pattern or symbol.Be understandable that, for the preset password of at least one folder allocation of appointment can be identical, also can be different.
Be understandable that, user can also arrange at least one preset number and terminal associates by operation interface, so that terminal is detecting while having changed new SIM card, can adopt new digit corresponding to this new SIM card to send information to preset number, so that terminal corresponding to preset number sends encrypted command information to new digit, thereby can be encrypted the file of appointment.
User can also arrange default identifying code for preset number, so that when the identifying code of terminal judges user input is identical with default identifying code, can allow user to change preset number; When the identifying code of terminal judges user input is different from default identifying code, can send information to preset number, so that terminal corresponding to preset number can send encrypted command information to terminal, thereby can be encrypted the file of appointment.Wherein, corresponding at least one default identifying code of preset number.
Be understandable that, in other embodiments, can also trigger condition be set for terminal, when the operation of terminal meets default trigger condition, can trigger default phone number and send encrypted command information to terminal, with the file to appointment, be encrypted.
S202: terminal receives information.
Terminal receives information, and wherein, this information can work as and meets triggering terminal internal system when pre-conditioned and automatically generate and send, and also can be mounted in the information of phone number transmission corresponding to SIM card on other-end.
S203: judge whether described information is encrypted command information, wherein, if described information is the information automatically sending when number of times that described terminal judges user inputs unlocking pin release failure continuously reaches preset value, described information is identified as to encrypted command information, or, if sending the phone number of described information is preset number, and described packets of information is containing encrypted instruction, described information is identified as to encrypted command information.
Whether the information that terminal judges receives is encrypted command information.Wherein, the information that terminal receives can be the automatic information sending of terminal inner, also can be mounted in the information that phone number corresponding to SIM card on other-end sends.
If the information that terminal judges receives is the information that terminal inner automatically sends, judge that whether this information be the information of transmission automatically when number of times that terminal judges user inputs unlocking pin release failure continuously reaches preset value.If this information of terminal judges is, the number of times of inputting continuously unlocking pin release failure as terminal judges user (for example reaches preset value, preset value is 5, but be not limited to this, can also be worth for other), the information that triggering terminal internal system sends automatically, terminal is identified as encrypted command information by this information.
Wherein, when the unlocking pin of the user's input receiving when terminal judges is identical with the default unlocking pin that is stored in inside, terminal is carried out to release, so that user checks the content in terminal.The unlocking pin of the user's input receiving when terminal judges be stored in inner default unlocking pin when different, do not remove the protection to terminal, be judged as release unsuccessfully, the number of times of recording user release failure.If terminal judges user inputs the number of times of unlocking pin release failure continuously, reach preset value (for example, preset value is 5, but is not limited to this, can also be worth for other), triggering terminal sends encrypted command information automatically.The number of times of inputting continuously unlocking pin release failure as terminal judges user does not reach after preset value, if receive again the unlocking pin identical with default unlocking pin, terminal is carried out to release, the number of times of the release failure of having recorded is carried out to zero clearing processing simultaneously.
If the information that terminal judges receives is mounted in the information that phone number corresponding to SIM card on other-end sends, judge whether the phone number of transmission information is default phone number.If this phone number of terminal judges is default phone number, continue to judge whether this information comprises encrypted instruction; If this phone number of terminal judges is not default phone number, do not process this information.If it is default phone number that terminal judges is sent the phone number of information, and this packets of information is containing encrypted instruction, and terminal is identified as encrypted command information by this information.Wherein, while comprising encrypted instruction in the information that the default phone number of terminal judges sends, be not reported to upper layer application, that is, do not present to user, make user cannot obtain password, thereby prevent password leakage.
Be understandable that, in the present embodiment, encrypted command information is that, after terminal loss, terminal use, in order to prevent that the data of terminal from being leaked, initiatively sends to terminal by the phone number by default.In other embodiments, also other trigger conditions can be set, make when meeting default trigger condition, trigger default phone number and send encrypted command information to terminal.
S204: judge whether described encrypted command information comprises password, wherein, described password is numeral and/or alphabetical combination;
Whether terminal judges enciphered message comprises password, and wherein, password is numeral or alphabetical, or numeral and alphabetical combination.In other embodiments, password can be also extended formatting, such as, character string, binary code etc.
S205: if described encrypted command information does not comprise password, use preset password to be encrypted the file of described appointment, if described encrypted command packets of information is containing password, use described password to be encrypted the file of described appointment.
If do not comprise password in terminal judges encrypted command information, use preset password to be encrypted the file of appointment, thereby use preset password to be encrypted files all in the file of appointment.If comprise password in terminal judges encrypted command information, obtain the password in encrypted command information, and use the password getting to be encrypted the file of appointment, thereby use the password getting to be encrypted all files in the file of needs encryption.Wherein, after terminal gets the password in encrypted command information, can delete encrypted command information, to prevent that encrypted command information from being revealed.
Be understandable that, in the present embodiment, need the password in preset password and encrypted command information to be one, when encrypted command information does not comprise password, use preset password to be encrypted the file in the file of appointment and this document folder; When encrypted command packets of information contains password, use the password getting to be encrypted the file in the file of needs encryption and this document folder, wherein, at least one file of appointment is all used identical Crypted password to be encrypted.In other embodiments, when the file of appointment is during at least two, also can be the corresponding preset password of file of each appointment or one of them password in corresponding encrypted command information, or also can, the corresponding password of file of each appointment, the corresponding subcipher of each file in this document folder.
Be understandable that, the encrypted command information that terminal sends automatically, can comprise password, also can not comprise password.In the present embodiment, when this encrypted command packets of information contains password, use the password in encrypted command information to be encrypted the file of appointment, when this encrypted command information does not comprise enciphered message, use preset password to be encrypted the file of appointment.In other embodiments, also can be set to work as terminal judges encrypted command is, during encrypted command information that the number of times that receives the unlocking pin of user input sends while reaching preset value automatically, skips steps S204, is directly used preset password to be encrypted the file of appointment.
In other embodiments, in the time of can also being set to pre-conditioned when meeting (not being restricted pre-conditioned) herein, to terminal, send delete command, to delete the file of preserving important information; Or user can also send delete command to terminal by default phone number, preserves the file of important information with permanent delet, and then prevent important information leakage.
Such scheme, in the situation that terminal is opened safe release, by the file of specifying at least one to encrypt, triggering terminal is set and sends the pre-conditioned of encrypted command information, make when meeting when pre-conditioned, triggering terminal automatically sends encrypted command and is encrypted with the file to appointment.And, can a default phone number be set for terminal association, and the default phone number of triggering is set to the condition of terminal transmission encrypted command information, when meeting trigger condition, make default phone number send encrypted command to terminal and be encrypted with the file to appointment, thereby realize, terminal is carried out to remote encryption.In this way, can increase the difficulty that cracks file, improve the safe class of data, thereby guarantee data security, when user brings back terminal, can directly file and the file encrypted are just decrypted and can be checked.
Consult Fig. 3, Fig. 3 is that the application encrypts terminal one execution mode structure chart.The encryption terminal of present embodiment comprises receiver module 310, judge module 320, control module 330.
Receiver module 310 is for receiving encrypted command, wherein, encrypted command is, the encrypted command information that the number of times of inputting continuously unlocking pin release failure as judgement user sends while reaching preset value automatically, or, encrypted command is the encrypted command information that phone number sends, and unlocking pin is pattern or symbol.
For example, in the situation that user is provided with unlocking pin, when user inputs unlocking pin to attempt that terminal is carried out to release, thereby while checking the content in terminal, terminal receives the unlocking pin of user's input.Wherein, unlocking pin is pattern or symbol, and symbol can be numeral or alphabetical, or digital and alphabetical combination.
When the unlocking pin of the user's input receiving when terminal judges is identical with the default unlocking pin that is stored in inside, terminal is carried out to release, so that user checks the content in terminal.The unlocking pin of the user's input receiving when terminal judges be stored in inner default unlocking pin when different, do not remove the protection to terminal, be judged as release unsuccessfully, the number of times of recording user release failure.If terminal judges user inputs the number of times of unlocking pin release failure continuously, reach preset value (for example, preset value is 5, but is not limited to this, can also be worth for other), triggering terminal sends encrypted command information automatically.The number of times of inputting continuously unlocking pin release failure as terminal judges user does not reach after preset value, if receive again the unlocking pin identical with default unlocking pin, terminal is carried out to release, the number of times of the release failure of having recorded is carried out to zero clearing processing simultaneously.
The number of times of inputting continuously unlocking pin release failure as terminal judges user (for example reaches preset value, preset value is 5, but be not limited to this, can also be worth for other), when triggering terminal sends encrypted command information automatically, the encrypted command information that receiver module 310 receiving terminals send automatically.
Or after terminal loss, terminal use is in order to prevent that the data of terminal from being leaked, while sending encrypted command information by phone number to terminal, receiver module 310 receives the encrypted command information that phone number sends.Be understandable that, in the present embodiment, terminal use is when thinking that terminal data is on the hazard safely, initiatively by phone number, to terminal, sends encrypted command information, phone number can be that user associates by operation interface setting and terminal in advance, can be also not associated.In other embodiments, other trigger condition can also be set, make when meeting default trigger condition, trigger phone number and send encrypted command information to terminal, now, phone number can be that user associates by operation interface setting and terminal in advance, can be also not associated.When phone number and terminal are not associated, can directly by phone number, to terminal, send the encrypted command information that can be identified.When phone number be user arrange in advance the preset number associated with terminal time, when the operation of terminal meets when pre-conditioned, trigger default phone number and send encrypted command information to terminal, with file and the file that needs are encrypted, be encrypted.
Receiver module 310 sends to judge module 320 by encrypted command.
Judge module 320 is for receiving encrypted command, and judges whether encrypted command comprises password, and wherein, password is numeral and/or alphabetical combination.
For example, judge module 320 receives encrypted command information, and judges whether the encrypted command information receiving comprises password, and wherein, password is numeral or alphabetical, or numeral and alphabetical combination.In other embodiments, password can be also extended formatting, such as, character string, binary code etc.Judge module 320 sends to control module 330 by judged result.
Control module 330, for receiving judged result, when judgment result is that encrypted command does not comprise password, is used preset password to be encrypted file, when judgment result is that encrypted command comprises password, accesses to your password described file is encrypted.
For example, if judgment result is that in encrypted command information and do not comprise password, the file that control module 330 is used preset passwords to encrypt needs is encrypted, thereby uses all files in the file that preset password encrypts needs to be encrypted.If judgment result is that in encrypted command information and comprise password, control module 330 is obtained the password in encrypted command information, and use the password getting to be encrypted the file of needs encryption, thereby use the password getting to be encrypted all files in the file of needs encryption.Wherein, needing the file of encrypting can be at least one, and preset password is the password default arranging in advance.
Be understandable that, in the present embodiment, password in file, preset password and the encrypted command information that needs to encrypt is one, and when encrypted command information does not comprise password, the file in the file that use preset password is encrypted needs and this document folder is encrypted; When encrypted command packets of information contains password, use the password getting to be encrypted the file in the file of needs encryption and this document folder.In other embodiments, needing the file of encrypting can be also two or more, the corresponding preset password of file that each need to be encrypted or one of them password in corresponding encrypted command information, or also can, the corresponding password of file that each need to be encrypted, the corresponding subcipher of each file in this document folder.
Be understandable that, the encrypted command information that terminal sends automatically, can comprise password, also can not comprise password.In the present embodiment, when this enciphered message comprises password, the file that uses the password in enciphered message to encrypt needs is encrypted, and when this enciphered message does not comprise enciphered message, the file that uses preset password to encrypt needs is encrypted.In other embodiments, when terminal judges encrypted command is, during encrypted command information that the number of times that terminal receives the unlocking pin of user input sends while reaching preset value automatically, whether the enciphered message that terminal sends comprises the file that password all directly uses preset password to encrypt needs is encrypted.
In other embodiments, in the time of can also being set to pre-conditioned when meeting (not being restricted pre-conditioned) herein, to terminal, send delete command, to delete the file of preserving important information; Or user can also send delete command to terminal by default phone number, preserves the file of important information with permanent delet, and then prevent important information leakage.
Such scheme, in the situation that terminal is opened safe release, sends the pre-conditioned of encrypted command by triggering terminal is set, and makes when meeting when pre-conditioned, and triggering terminal sends encrypted command automatically so that the file of needs encryption is encrypted.And, can to terminal, send encrypted command by default phone number, thereby realize, terminal is carried out to remote encryption.In this way, can increase the difficulty that cracks file, improve the safe class of data, thereby guarantee data security, when user brings back terminal, can directly file and the file encrypted are just decrypted and can be checked.
Consult Fig. 4, Fig. 4 is that the application encrypts another execution mode structure chart of terminal.The encryption terminal of present embodiment comprises configuration module 410, detection module 420, receiver module 430, judge module 440, control module 450, and wherein, receiver module 430 comprises receiving element 431 and recognition unit 432.
Configuration module 410 is used to specify at least one file, and is at least one folder allocation preset password, with the file at least one file, be encrypted, wherein, the file of file for needing to encrypt.
For example, the file of specifying at least one to encrypt by operation interface as user, significant data is kept in the file of appointment, and during at least one the folder allocation preset password that need to encrypt of appointment, configuration module 410 receives the information of at least one file of user's appointment, and the password corresponding with the file of appointment, so that control module 440 can be after receiving encrypted command, can use the preset password of distribution to be encrypted the file in file, improve data security grade.
Wherein, encrypted command is, the encrypted command information that the number of times that receives the unlocking pin of user's input when terminal sends while reaching preset value automatically, or encrypted command is the encrypted command information that default phone number sends, unlocking pin is pattern or symbol.Be understandable that, for the preset password of at least one folder allocation of appointment can be identical, also can be different.
Be understandable that, configuration module 410 also receives at least one default phone number associated with terminal that user arranges by operation interface, so that detect while having changed new SIM card change dump when detection module 420, can adopt new digit corresponding to this new SIM card to send information to preset number, so that terminal corresponding to preset number sends encrypted command information to new digit, thereby can be encrypted the file of appointment.
Configuration module 410 also receives the default identifying code that user arranges for default phone number, so that the identifying code of inputting as detection module 420 judgement users when identical with default identifying code, can allow user to change default phone number; When the identifying code of detection module 420 judgement users input is different from default identifying code, can send information to default phone number, so that terminal corresponding to preset number can send encrypted command information to terminal, thereby can be encrypted the file of appointment.Wherein, corresponding at least one default identifying code of default phone number.
Be understandable that, in other embodiments, can also trigger condition be set for terminal, when the operation of terminal meets default trigger condition, can trigger default phone number and send encrypted command information to terminal, with the file to appointment, be encrypted.
Detection module 420, for detecting while having changed new SIM card, adopts new digit corresponding to new SIM card to send information to preset number, so that terminal corresponding to preset number sends encrypted command information to new digit, the file of appointment is encrypted.Preset number is the phone number that user arranges in advance, corresponding at least one the default identifying code of preset number, wherein,
When the identifying code of detection module 420 judgement users input is identical with default identifying code, permission user changes preset number; When the identifying code of detection module 420 judgement users input is different from default identifying code, to preset number, send information, so that sending encrypted command information, terminal corresponding to preset number arrive this terminal, the file of appointment is encrypted.
For example, detection module 420 detects SIM card information every a time interval, and judges that whether the double SIM information detecting is identical.In double detection, if detection module 420 judgement current detection to the SIM information that detects of SIM information and last time identical, be left intact.If detection module 420 judgement current detection to SIM information not identical with the last SIM information detecting, judge and changed new SIM card.Detection module 420 adopts new digit corresponding to new SIM card to send information to preset number, so that terminal corresponding to default phone number is after receiving this information, send encrypted command information to new digit, this terminal recognition is gone out after encrypted command information, can be encrypted the file of appointment, thereby the All Files in the file of appointment is encrypted.
When being provided with at least one default identifying code for default phone number, detection module 420 judges that whether the identifying code of user's input is identical with default identifying code.Whether, when user's input validation code is when attempting to revise default phone number or changing SIM card, detection module 420 compares identifying code and the default identifying code of the user's input detecting, identical with default identifying code to judge the identifying code that user inputs.When the identifying code of detection module 420 judgement users input is identical with default identifying code, allow user to revise phone number, the phone number that user is inputted saves as default phone number.When the identifying code of detection module 420 judgement user inputs is not identical with default identifying code, do not preserve the phone number of user's input, default phone number is constant.
When the unlocking pin of the user's input receiving when detection module 420 judgement is identical with the default unlocking pin that is stored in inside, terminal is carried out to release, so that user checks the content in terminal.The unlocking pin of the user's input receiving when detection module 420 judgement be stored in inner default unlocking pin when different, do not remove the protection to terminal, be judged as release unsuccessfully, and the number of times of recording user release failure.If detection module 420 judgement users input the number of times of unlocking pin release failure continuously, reach preset value (for example, preset value is 5, but is not limited to this, can also be worth for other), triggering terminal sends encrypted command information automatically.When detection module 420 judgement receives number of times that user inputs unlocking pin and does not reach preset value, after this, if receive again the unlocking pin identical with default unlocking pin, terminal is carried out to release, the number of times having recorded is carried out to zero clearing processing simultaneously.
Receiving element 431 is for reception information.For example, receiving element 431 reception information, wherein, this information can be worked as and meets triggering terminal internal system when pre-conditioned and automatically generate and send, and also can be mounted in the information that phone number corresponding to SIM card on other-end sends.Receiving element 431 sends to recognition unit 432 by the information receiving.
Recognition unit 432 is for judging whether the information receiving is encrypted command information, wherein, if this information is the information automatically sending when number of times that described terminal judges user inputs unlocking pin release failure continuously reaches preset value, judge that this information is encrypted command information, or, if sending the phone number of this information is preset number, and this packets of information is containing encrypted instruction, judges that this information is encrypted command information.
Whether the information that for example, recognition unit 432 judgements receive is encrypted command information.
If the information that recognition unit 432 judgement receives is the information that terminal inner sends automatically, judge that whether this information be the information of transmission automatically when number of times that terminal judges user inputs unlocking pin release failure continuously reaches preset value.If recognition unit 432 these information of judgement are, the number of times of inputting continuously unlocking pin release failure as terminal judges user (for example reaches preset value, preset value is 5, but be not limited to this, can also be worth for other), the information that triggering terminal internal system sends automatically, recognition unit 432 is identified as encrypted command information by this information.
If the information that recognition unit 432 judgements receive is mounted in the information that phone number corresponding to SIM card on other-end sends, judge whether the phone number of transmission information is default phone number.If recognition unit 432 these phone numbers of judgement are default phone numbers, continue to judge whether this information comprises encrypted instruction; If recognition unit 432 these phone numbers of judgement are not default phone numbers, do not process this information.If it is default phone number that the phone number of information is sent in recognition unit 432 judgements, and this packets of information is containing encrypted instruction, recognition unit 432 is identified as encrypted command information by this information.
Be understandable that, in the present embodiment, encrypted command information is that, after terminal loss, terminal use, in order to prevent that the data of terminal from being leaked, initiatively sends to terminal by the phone number by default.In other embodiments, also other trigger conditions can be set, make when meeting default trigger condition, trigger default phone number and send encrypted command information to terminal.
Judge module 440 is for judging whether encrypted command information comprises password, and wherein, password is numeral and/or alphabetical combination.
For example, after judge module 440 judges that the information receiving is enciphered message, judge whether enciphered message comprises password, wherein, password is numeral or alphabetical, or numeral and alphabetical combination.In other embodiments, password can be also extended formatting, such as, character string, binary code etc.
Judge module 440 sends to control module 450 by judged result.
The judged result that control module 450 does not comprise password for receiving encrypted command information, when encrypted command information does not comprise password, control module 450 is used preset password to be encrypted the file of appointment, when encrypted command packets of information contains password, the password that control module 450 is used encrypted command packets of information to contain is encrypted the file of described appointment.
For example, when judgment result is that of receiving of control module 450 do not comprise password in encrypted command information, control module 450 is used preset password to be encrypted the file of appointment, thereby uses preset password to be encrypted files all in the file of appointment.When judgment result is that in encrypted command information of receiving of control module 450 comprises password, control module 450 is obtained the password in encrypted command information, and use the password getting to be encrypted the file of appointment, thereby use the password getting to be encrypted all files in the file of needs encryption.Wherein, wherein, while comprising encrypted instruction in the information that the default phone number of judge module 440 judgements sends, control module 450 is not reported to upper layer application,, does not present to user that is, makes user cannot obtain password, thereby prevents password leakage.After control module 450 gets the password in encrypted command information, can delete encrypted command information, to prevent that encrypted command information from being revealed.
Be understandable that, in the present embodiment, need the password in preset password and encrypted command information to be one, when encrypted command information does not comprise password, use preset password to be encrypted the file in the file of appointment and this document folder; When encrypted command packets of information contains password, use the password getting to be encrypted the file in the file of needs encryption and this document folder, wherein, at least one file of appointment is all used identical Crypted password to be encrypted.In other embodiments, when the file of appointment is during at least two, also can be the corresponding preset password of file of each appointment or one of them password in corresponding encrypted command information, or also can, the corresponding password of file of each appointment, the corresponding subcipher of each file in this document folder.
Be understandable that, the encrypted command information that terminal sends automatically, can comprise password, also can not comprise password.In the present embodiment, when this encrypted command packets of information contains password, use the password in encrypted command information to be encrypted the file of appointment, when this encrypted command information does not comprise enciphered message, use preset password to be encrypted the file of appointment.In other embodiments, also can be set to work as terminal judges encrypted command is, during encrypted command information that the number of times that receives the unlocking pin of user input sends while reaching preset value automatically, no matter whether encrypted command information comprises password, directly use preset password to be encrypted the file of appointment.
In other embodiments, in the time of can also being set to pre-conditioned when meeting (not being restricted pre-conditioned) herein, to terminal, send delete command, to delete the file of preserving important information; Or user can also send delete command to terminal by default phone number, preserves the file of important information with permanent delet, and then prevent important information leakage.
Such scheme, in the situation that terminal is opened safe release, by the file of specifying at least one to encrypt, triggering terminal is set and sends the pre-conditioned of encrypted command information, make when meeting when pre-conditioned, triggering terminal automatically sends encrypted command and is encrypted with the file to appointment.And, can a default phone number be set for terminal association, and the default phone number of triggering is set to the condition of terminal transmission encrypted command information, when meeting trigger condition, make default phone number send encrypted command to terminal and be encrypted with the file to appointment, thereby realize, terminal is carried out to remote encryption.In this way, can increase the difficulty that cracks file, improve the safe class of data, thereby guarantee data security, when user brings back terminal, can directly file and the file encrypted are just decrypted and can be checked.
In several execution modes of the application, the file and the file that adopt DEA (Data Encryption Standard, DES) to encrypt needs are encrypted, but are not limited to this, also can adopt other cryptographic algorithm to be encrypted.
In more than describing, in order to illustrate rather than in order limiting, to have proposed the detail such as particular system structure, interface, technology, to thoroughly understand the application.Yet, not it will be clear to one skilled in the art that in there is no other execution mode of these details and can realize the application yet.In other situation, omit the detailed description to well-known device, circuit and method, in order to avoid unnecessary details hinders the application's description.

Claims (10)

1. an encryption method, is characterized in that, said method comprising the steps of:
Terminal receives encrypted command, wherein, described encrypted command is, the encrypted command information that the number of times of inputting continuously unlocking pin release failure as described terminal judges user sends while reaching preset value automatically, or described encrypted command is the encrypted command information that phone number sends, and described unlocking pin is pattern or symbol;
Judge whether described encrypted command comprises password, wherein, described password is numeral and/or alphabetical combination;
If described encrypted command does not comprise password, use preset password to be encrypted file, if described encrypted command comprises password, use described password to be encrypted file.
2. method according to claim 1, is characterized in that, before the step that receives encrypted command, also comprise,
Specify at least one file, and be described at least one folder allocation preset password, with the file in described at least one file, be encrypted, wherein, the file of described file for needing to encrypt.
3. method according to claim 1 and 2, is characterized in that, the step that described terminal receives encrypted command specifically comprises:
Terminal receives information;
Judge whether described information is encrypted command information, wherein, if described information is the information automatically sending when number of times that described terminal judges user inputs unlocking pin release failure reaches preset value, described information is identified as to encrypted command information, or, if sending the phone number of described information is preset number, and described packets of information is containing encrypted instruction, described information is identified as to encrypted command information.
4. method according to claim 3, it is characterized in that, described method also comprises, described terminal is detecting while having changed new SIM card, adopt new digit corresponding to described new SIM card to send information to preset number, so that terminal corresponding to described preset number sends encrypted command information to described new digit, the file of described appointment is encrypted.
5. method according to claim 4, is characterized in that, described preset number is that user arranges in advance, corresponding at least one the default identifying code of described preset number, wherein,
When the identifying code of described terminal judges user input is identical with described default identifying code, permission user changes preset number; When the identifying code of described terminal judges user input is different from described default identifying code, to preset number, send information, so that sending encrypted command information, terminal corresponding to described preset number arrive described terminal, the file of described appointment is encrypted.
6. encrypt a terminal, it is characterized in that, described terminal comprises receiver module, judge module, control module,
Described receiver module is used for receiving encrypted command, wherein, described encrypted command is, the encrypted command information that the number of times of inputting continuously unlocking pin release failure as described terminal judges user sends while reaching preset value automatically, or described encrypted command is the encrypted command information that phone number sends, described unlocking pin is pattern or symbol, and described receiver module sends to described judge module by described encrypted command;
Described judge module is used for receiving described encrypted command, and judges whether described encrypted command comprises password, and wherein, described password is numeral and/or alphabetical combination, and described judge module sends to control module by judged result;
Described control module is used for receiving described judged result, when judgment result is that described encrypted command does not comprise password, use preset password to be encrypted described file, when judgment result is that described encrypted command comprises password, use described password to be encrypted described file.
7. terminal according to claim 6, it is characterized in that, described terminal also comprises configuration module, described configuration module is used to specify at least one file, and be described at least one folder allocation preset password, with the file in described at least one file, be encrypted, wherein, the file of described file for needing to encrypt.
8. according to the terminal described in claim 6 or 7, it is characterized in that, described receiver module comprises receiving element and recognition unit,
Described receiving element is for reception information;
Described recognition unit is used for judging whether described information is encrypted command information, wherein, if described information is the information automatically sending when number of times that described terminal judges user inputs unlocking pin release failure reaches preset value, judge that described information is encrypted command information, or, if sending the phone number of described information is preset number, and described packets of information is containing encrypted instruction, judges that described information is encrypted command information.
9. terminal according to claim 8, it is characterized in that, described terminal also comprises detection module, for detecting while having changed new SIM card, adopt new digit corresponding to described new SIM card to send information to preset number, so that terminal corresponding to described preset number sends encrypted command information to described new digit, the file of described appointment is encrypted.
10. terminal according to claim 9, is characterized in that, described preset number is that user arranges in advance, corresponding at least one the default identifying code of described preset number, wherein,
When the identifying code of described detection module judgement user input is identical with described default identifying code, permission user changes preset number; When the identifying code of described detection module judgement user input is different from described default identifying code, to preset number, send information, so that sending encrypted command information, terminal corresponding to described preset number arrive described terminal, the file of described appointment is encrypted.
CN201410342903.8A 2014-07-17 2014-07-17 Encryption method and terminal Pending CN104185174A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410342903.8A CN104185174A (en) 2014-07-17 2014-07-17 Encryption method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410342903.8A CN104185174A (en) 2014-07-17 2014-07-17 Encryption method and terminal

Publications (1)

Publication Number Publication Date
CN104185174A true CN104185174A (en) 2014-12-03

Family

ID=51965846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410342903.8A Pending CN104185174A (en) 2014-07-17 2014-07-17 Encryption method and terminal

Country Status (1)

Country Link
CN (1) CN104185174A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1883029A1 (en) * 2006-07-21 2008-01-30 Acer Incorporated Protection method for use in portable communication device
CN101616495A (en) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 The method and system of individual privacy in the protection mobile phone
CN101656966A (en) * 2009-09-01 2010-02-24 成都市华为赛门铁克科技有限公司 Data protection method of mobile terminal, device thereof and mobile terminal
CN102158952A (en) * 2011-03-23 2011-08-17 中兴通讯股份有限公司 Method and system for protecting personal information
CN102833712A (en) * 2012-08-31 2012-12-19 北京小米科技有限责任公司 Method, device, server and system for preventing information leakage and equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1883029A1 (en) * 2006-07-21 2008-01-30 Acer Incorporated Protection method for use in portable communication device
CN101616495A (en) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 The method and system of individual privacy in the protection mobile phone
CN101656966A (en) * 2009-09-01 2010-02-24 成都市华为赛门铁克科技有限公司 Data protection method of mobile terminal, device thereof and mobile terminal
CN102158952A (en) * 2011-03-23 2011-08-17 中兴通讯股份有限公司 Method and system for protecting personal information
CN102833712A (en) * 2012-08-31 2012-12-19 北京小米科技有限责任公司 Method, device, server and system for preventing information leakage and equipment

Similar Documents

Publication Publication Date Title
CN103390026A (en) Mobile intelligent terminal security browser and working method thereof
CN103813334A (en) Right control method and right control device
CN105450406A (en) Data processing method and device
CN105975867B (en) A kind of data processing method
CN109446234B (en) Data processing method and device and electronic equipment
CN104702760A (en) Communication number updating method and device
WO2014051558A1 (en) Shared secret identification for secure communication
CN102542449A (en) Wireless communication device and payment authentication method
US20150071442A1 (en) Data-encrypting method and decrypting method for a mobile phone
CN103559435A (en) Method and device for controlling debugging ports of terminal equipment
CN105871892A (en) File cloud storage security solution method and system
CN105337722A (en) Data encryption method and apparatus
CN104144174B (en) Protect method, user equipment and the server of privacy of user data
CN101815292A (en) Device and method for protecting data of mobile terminal
CN104270754A (en) SIM authentication method and device
CN106550357A (en) A kind of note method for managing security, device and terminal
KR101834808B1 (en) Apparatus and method for protecting file from encryption
EP3193262A1 (en) Database operation method and device
CN107509180B (en) Method for automatically encrypting short message, storage device and mobile terminal
CN109347791B (en) Dual I/O bus SIM card
CN106453057B (en) A kind of method and terminal for preventing short message to be stolen
CN106293495A (en) The date storage method of terminal unit and terminal unit
CN104185174A (en) Encryption method and terminal
Igor et al. Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals.
KR20100085459A (en) Personal information protecting device for using filtering network transferring data method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20141203

RJ01 Rejection of invention patent application after publication