[go: up one dir, main page]

CN106162621A - communication encryption, decryption method and mobile terminal - Google Patents

communication encryption, decryption method and mobile terminal Download PDF

Info

Publication number
CN106162621A
CN106162621A CN201510145893.3A CN201510145893A CN106162621A CN 106162621 A CN106162621 A CN 106162621A CN 201510145893 A CN201510145893 A CN 201510145893A CN 106162621 A CN106162621 A CN 106162621A
Authority
CN
China
Prior art keywords
encryption data
party device
encryption
binding
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201510145893.3A
Other languages
Chinese (zh)
Inventor
魏明业
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510145893.3A priority Critical patent/CN106162621A/en
Priority to PCT/CN2015/086510 priority patent/WO2016155185A1/en
Publication of CN106162621A publication Critical patent/CN106162621A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of encryption method, obtain data to be encrypted and the configuration information of third party device certification bound with described first terminal by first terminal;According to the configuration information of the described certification obtained, described data to be encrypted are encrypted, generate the first encryption data;Described first encryption data generated is transmitted.The invention also discloses a kind of decryption method and mobile terminal.The present invention participates in ciphering process by third party device so that decryption information only the machine can solve, it is achieved data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication, communication encryption is served and further consolidates and booster action.

Description

Communication encryption, decryption method and mobile terminal
Technical field
The present invention relates to communication field, particularly relate to communication encryption, decryption method and mobile terminal.
Background technology
In recent years, user increasingly focuses on individual privacy safety, particularly Privacy Protection during communication, But, again and again expose, along with domestic, the event that the privacy of user such as privacy are compromised of stealing such as iPhone, The communication privacy worrying oneself making user unprecedented can be compromised, and information security has been put on schedule.Therefore, How to protect individual privacy when communication, be a problem demanding prompt solution.
Summary of the invention
A kind of communication encryption of offer, decryption method and mobile terminal are provided, it is intended to Solve individual privacy protection problem during communication.
For achieving the above object, a kind of encryption method that the present invention provides, described encryption method includes following Step:
First terminal obtains data to be encrypted and the third party device certification bound with described first terminal Configuration information;
According to the configuration information of the described certification obtained, described data to be encrypted are encrypted, generate First encryption data;
Described first encryption data generated is transmitted.
Preferably, bind after described first terminal obtains data to be encrypted and with described first terminal Third party device certification configuration information step before also include:
Judge whether to obtain the configuration information with described third party device certification, if can not obtain, then tie up Fixed described third party device.
Preferably, also include before the described step that described first encryption data generated is transmitted:
Obtain the authentication information of the current third party device connected;
According to the described authentication information obtained, it is determined that whether the third party device of described current connection is described The third party device of binding, the most then show described first encryption data;If it is not, the most do not show described First encryption data.
Preferably, also include before the step of the authentication information of the third party device that described acquisition currently connects:
Judge whether the third party device of described first terminal and described binding connects, if be not connected with, then Described first terminal and described third party device are set up and are connected.
Preferably, described according to the described authentication information obtained, it is determined that the third party of described current connection sets The step of the standby third party device being whether described binding includes:
Judge configuration information and the institute of the third party device of described current connection described in described authentication information Whether the configuration information stating certification consistent, if inconsistent time, the third party device of the most described current connection is not It it is the third party device of described binding;If time consistent, the third party device of the most described current connection is described The third party device of binding.
Preferably, also include before the described step that described first encryption data is transmitted:
Using the device id of described first terminal as deciphering the first secret key of described first encryption data, And by described first encryption data and described first secret key binding;
According to described first encryption data of binding, generate communication instruction, wherein, in described communication instruction Carry the first secret key deciphering described first encryption data.
In order to solve above-mentioned technical problem, the present invention further provides a kind of encryption method, described encryption Method comprises the following steps:
Second terminal receives the first encryption data that first terminal sends;
The configuration information of the third party device certification of acquisition and described mobile terminal binding, according to the institute obtained Described first encryption data is encrypted by the configuration information stating certification, generates the second encryption data.
Preferably, the configuration information of the third party device certification of described acquisition and described mobile terminal binding, Described first encryption data is encrypted by the configuration information according to the described certification obtained, and generates second and adds Also include before the step of ciphertext data:
Described second terminal receives the communication with described first encryption data binding of first terminal transmission and refers to Order;
Resolve described communication instruction, obtain the first secret key deciphering described first encryption data;
According to described first secret key, described first encryption data is decrypted.
Preferably, the configuration information of the third party device certification of described acquisition and described mobile terminal binding, Described first encryption data is encrypted by the configuration information according to the described certification obtained, and generates second and adds Also include after the step of ciphertext data:
Using the device id of described second terminal as deciphering the second secret key of described second encryption data, And described second encryption data generated and the second secret key deciphering described second encryption data are tied up Fixed.
Preferably, the described device id using described second terminal is as deciphering described second encryption data The second secret key, and by generate described second encryption data with decipher described second encryption data second Secret key also includes after carrying out the step bound:
Set up with current described third party device and be connected, obtain the certification of the current third party device connected Information;
According to described authentication information, it is determined that whether the current third party device connected is the described 3rd of binding Method, apparatus, the most then show the second encryption data;If it is not, the most do not show described second encryption data.
Preferably, the described communication instruction of described parsing, the first of acquisition described first encryption data of deciphering is close Also include after the step of spoon:
The described communication instruction resolved is destroyed.
In order to solve above-mentioned technical problem, the present invention further provides a kind of decryption method, described deciphering Method comprises the following steps:
Receive encryption data, and the third party obtaining the transmission terminal binding with described encryption data ownership sets The configuration information of standby certification;
According to the configuration information of the described certification obtained, described encryption data is decrypted.
Preferably, the described configuration information according to the described certification obtained, described encryption data is solved Also include before close step:
Obtain the authentication information of the current third party device connected;
The authentication information of the third party device according to the described current connection obtained, it is determined that the current third party connected Whether equipment is the third party device bound, the most then show described encryption data;If it is not, do not show Show described encryption data.
Preferably, also include after the described step that described encryption data is decrypted:
Obtain the secret key deciphering described encryption data of binding in described encryption data, add described in display Ciphertext data is decrypted.
Preferably, the described configuration information according to the described certification obtained, described encryption data is solved Also include before close step:
Receive communication instruction, and the device id of the transmission terminal carried by described communication instruction is as solution First secret key of close described encryption data, is decrypted described encryption data.
In order to solve above-mentioned technical problem, the present invention further provides the mobile terminal of a kind of encryption, institute State mobile terminal to include:
Configuration information acquisition module, for obtain data to be encrypted and with described mobile terminal binding The configuration information of third party device certification;
First encryption data generation module, for the configuration information according to the described certification obtained, to described Data to be encrypted are encrypted, and generate the first encryption data;
Sending module, for being transmitted described first encryption data generated.
Preferably, described mobile terminal also includes:
Judge binding module, for judging whether to obtain the configuration information with described third party device certification, If can not obtain, then bind described third party device.
Preferably, described mobile terminal also includes:
First authentication information acquisition module, for obtaining the authentication information of the third party device of current connection;
First judges display module, for according to the described authentication information obtained, it is determined that described current connection Third party device be whether the third party device of described binding, the most then show described first encryption number According to;If it is not, the most do not show described first encryption data.
Preferably, described mobile terminal also includes:
Judge link block, for judging whether the third party device of described mobile terminal and described binding connects Connecing, if be not connected with, the most described mobile terminal and described third party device are set up and are connected.
Preferably, described mobile terminal also includes:
Judge consistent module, for judging the third party of the described current connection described in described authentication information The configuration information of equipment is the most consistent with the configuration information of described certification, if inconsistent time, the most described currently The third party device connected is not the third party device of described binding;If time consistent, the most described current connection Third party device be the third party device of described binding.
Preferably, described mobile terminal also includes:
First secret key binding module, for using the device id of described mobile terminal as deciphering described the First secret key of one encryption data, and by described first encryption data and described first secret key binding;
Directive generation module, for described first encryption data according to binding, generates communication instruction, its In, described communication instruction carries the first secret key deciphering described first encryption data.
In order to solve above-mentioned technical problem, the present invention further provides the mobile terminal of a kind of encryption, institute State mobile terminal to include:
Encrypted data reception module, for receiving the first encryption data that first terminal sends;
Second encryption data generation module, recognizes for obtaining the third party device with described mobile terminal binding The configuration information of card, adds described first encryption data according to the configuration information of the described certification obtained Close, generate the second encryption data.
Preferably, described mobile terminal also includes:
Command reception module, for receiving the logical with what described first encryption data was bound of first terminal transmission News instruction;
Parsing module, is used for resolving described communication instruction, obtains and deciphers the first of described first encryption data Secret key;
Deciphering module, for according to described first secret key, is decrypted described first encryption data.
Preferably, described mobile terminal also includes:
Second secret key binding module, for using the device id of described mobile terminal as deciphering described the Second secret key of two encryption datas, and described second encryption data second encryption described with deciphering that will generate Second secret key of data is bound.
Preferably, described mobile terminal also includes:
Second authentication information acquisition module, is connected for setting up with current described third party device, obtains The authentication information of the current third party device connected;
Second judges display module, for according to described authentication information, it is determined that the current third party connected sets Whether standby be the described third party device bound, the most then show the second encryption data;If it is not, the most not Show described second encryption data.
Preferably, described mobile terminal also includes:
Destroy module, for the described communication instruction resolved is destroyed.
In order to solve above-mentioned technical problem, the present invention further provides the mobile terminal of a kind of deciphering, institute State mobile terminal to include:
Configuration information receiver module, is used for receiving encryption data, and obtains and described encryption data ownership Send the configuration information of the third party device certification of terminal binding;
Encryption data deciphering module, for the configuration information according to the described certification obtained, to described encryption Data are decrypted.
Preferably, described mobile terminal also includes:
Second authentication information acquisition module, for obtaining the authentication information of the third party device of current connection;
Judge display module, for the authentication information of the third party device according to the described current connection obtained, Judge that the third party device of current connection whether as the third party device of binding, the most then adds described in display Ciphertext data;If it is not, the most do not show described encryption data.
Preferably, described mobile terminal also includes:
Secret key deciphering module, for obtaining the close of the described encryption data of deciphering of binding in described encryption data Spoon, is decrypted the described encryption data of display.
Preferably, described mobile terminal also includes:
Receiving and deciphering module, is used for receiving communication instruction, and the transmission terminal carried by described communication instruction Device id as decipher described encryption data the first secret key, described encryption data is decrypted.
The encryption method that the present invention provides, obtains data to be encrypted and with described the by first terminal The configuration information of the third party device certification of one terminal binding;According to the configuration information of the described certification obtained, Described data to be encrypted are encrypted, generate the first encryption data;Described first encryption that will generate Data are transmitted.The present invention participates in ciphering process by third party device so that decryption information only the machine Can solve, it is achieved data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication, to communication Encryption serves further consolidates and booster action.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of encryption method first embodiment of the present invention;
Fig. 2 is the schematic flow sheet of encryption method the second embodiment of the present invention;
Fig. 3 is the schematic flow sheet of encryption method the 3rd embodiment of the present invention;
Fig. 4 is the schematic flow sheet of encryption method the 4th embodiment of the present invention;
Fig. 5 is the schematic flow sheet of encryption method the 5th embodiment of the present invention;
Fig. 6 is the schematic flow sheet of encryption method sixth embodiment of the present invention;
Fig. 7 is the schematic flow sheet of encryption method the 7th embodiment of the present invention;
Fig. 8 is the schematic flow sheet of encryption method the 8th embodiment of the present invention;
Fig. 9 is the schematic flow sheet of encryption method the 9th embodiment of the present invention;
Figure 10 is the schematic flow sheet of encryption method the tenth embodiment of the present invention;
Figure 11 is the schematic flow sheet of encryption method the 11st embodiment of the present invention;
Figure 12 is the schematic flow sheet of decryption method first embodiment of the present invention;
Figure 13 is the schematic flow sheet of decryption method the second embodiment of the present invention;
Figure 14 is the schematic flow sheet of encryption method the 3rd embodiment of the present invention;
Figure 15 is the schematic flow sheet of encryption method the 4th embodiment of the present invention;
Figure 16 is the high-level schematic functional block diagram of the mobile terminal first embodiment that the present invention encrypts;
Figure 17 is the high-level schematic functional block diagram of mobile terminal the second embodiment that the present invention encrypts;
Figure 18 is the high-level schematic functional block diagram of mobile terminal the 3rd embodiment that the present invention encrypts;
Figure 19 is the high-level schematic functional block diagram of mobile terminal the 4th embodiment that the present invention encrypts;
Figure 20 is the high-level schematic functional block diagram of mobile terminal the 5th embodiment that the present invention encrypts;
Figure 21 is the high-level schematic functional block diagram of the mobile terminal sixth embodiment that the present invention encrypts;
Figure 22 is the high-level schematic functional block diagram of mobile terminal the 7th embodiment that the present invention encrypts;
Figure 23 is the high-level schematic functional block diagram of mobile terminal the 8th embodiment that the present invention encrypts;
Figure 24 is the high-level schematic functional block diagram of mobile terminal the 9th embodiment that the present invention encrypts;
Figure 25 is the high-level schematic functional block diagram of mobile terminal the tenth embodiment that the present invention encrypts;
Figure 26 is the high-level schematic functional block diagram of mobile terminal the 11st embodiment that the present invention encrypts;
Figure 27 is the high-level schematic functional block diagram of the mobile terminal first embodiment that the present invention deciphers;
Figure 28 is the high-level schematic functional block diagram of mobile terminal the second embodiment that the present invention deciphers;
Figure 29 is the high-level schematic functional block diagram of mobile terminal the 3rd embodiment that the present invention deciphers;
Figure 30 is the high-level schematic functional block diagram of mobile terminal the 4th embodiment that the present invention deciphers.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, do referring to the drawings further Explanation.
Detailed description of the invention
Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not used to limit Determine the present invention.
The present invention provides a kind of encryption method, is encryption method first embodiment of the present invention with reference to Fig. 1, Fig. 1 Schematic flow sheet, in one embodiment, described encryption method comprises the following steps:
Step S100, first terminal obtain data to be encrypted and with described first terminal bind the 3rd The configuration information of method, apparatus certification.
First terminal obtains data to be encrypted and binding through described first terminal of being stored in data base The configuration information of third party device certification, wherein, third party device can be wearable device, it is also possible to Being other-end, configuration information can be MAC (Media Access Control or Medium Access Control, media interviews control, or referred to as physical address, hardware address) address, it is also possible to it is sequence Number etc..Wearable device the most directly wears, or is incorporated into the one of the clothes of user or accessory just Portable device.Wearable device can be Intelligent bracelet, intelligent watch or intelligent glasses.That binds can The MAC Address of wearable device can be Bluetooth address or WI-FI (Wireless Fidelity, Wireless Fidelity) Address.Described data to be encrypted include that the Content of communciation that need to send, described configuration information are stored in number According in the safety zone in storehouse.
Step S200, according to the configuration information of described certification obtained, described data to be encrypted are carried out Encryption, generates the first encryption data.
First terminal, according to the configuration information of the described certification obtained, such as, MAC Address, is treated described The data of encryption are encrypted, and generate the first encryption data.
Step S300, by generate described first encryption data be transmitted.
Described first encryption data generated is transmitted by first terminal, is sent to the second terminal.
The encryption method that the present embodiment provides, participates in ciphering process by third party device so that solve secret letter Cease only the machine can solve, it is achieved data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication, Communication encryption is served and further consolidates and booster action.
As described in Figure 2, Fig. 2 is the schematic flow sheet of encryption method the second embodiment of the present invention, first On the basis of embodiment, also include after described step S100:
Step S400, judge whether to obtain and the configuration information of described third party device certification, if can not Obtain, then bind described third party device.
First terminal obtains data to be encrypted, it may be judged whether can obtain and described third party device certification Configuration information, if can not obtain, then binds described third party device;If can obtain, then according to acquisition Described data to be encrypted are encrypted, generate the first encryption data by the configuration information of described certification.
As described in Figure 3, Fig. 3 is the schematic flow sheet of encryption method the 3rd embodiment of the present invention, first On the basis of embodiment, also include before described step S300:
Step S500, the authentication information of the current third party device connected of acquisition.
Third party device is authenticated by first terminal, and obtains the certification of the current third party device connected Information.
Step S600, according to obtain described authentication information, it is determined that the third party device of described current connection It is whether the third party device of described binding, the most then shows described first encryption data;If it is not, then Do not show described first encryption data.
First terminal is according to the authentication information of the current third party device connected obtained, it is determined that connect before described Whether the third party device connect is the third party device of described binding, the most then show the first encryption data Show;If it is not, then described first encryption data is not shown.
The encryption method that the present embodiment provides, the certification of the current third party device connected by obtaining is believed Breath, according to the described authentication information obtained, it is determined that whether the third party device of described current connection is described The third party device of binding, the most then show the data of encryption, it is achieved data ciphering and deciphering is poor Alienation, thus the protection of individual privacy when strengthening communication, communication encryption is served further consolidate and Booster action.
As described in Figure 4, Fig. 4 is the schematic flow sheet of encryption method the 4th embodiment of the present invention, the 3rd On the basis of embodiment, also include before described step S500:
Step S700, judge whether the third party device of described first terminal and described binding connects, if not During connection, the most described first terminal and described third party device are set up and are connected.
First terminal judges whether that the third party device with described binding is set up and connects, if do not set up connection, Then set up with described third party device and connect.
As described in Figure 5, Fig. 5 is the schematic flow sheet of encryption method the 5th embodiment of the present invention, the 3rd On the basis of embodiment, described step S600 includes:
Step S610, judge the joining of third party device of described current connection described in described authentication information Confidence breath is the most consistent with the configuration information of described certification, if inconsistent time, the of the most described current connection Three method, apparatus are not the third party devices of described binding;If time consistent, the third party of the most described current connection Equipment is the third party device of described binding.
First terminal judge the third party device of current connection whether as the third party device of described binding, if The configuration information of the current third party device connected that first terminal obtains is described with what local data base prestored Certification accordant configuration information time, the third party device of the most described current connection is the 3rd of described binding Method, apparatus;If time inconsistent, the third party device of the most described current connection is not the third party of described binding Equipment.
As described in Figure 6, Fig. 6 is the schematic flow sheet of encryption method sixth embodiment of the present invention, first On the basis of embodiment, also include before described step S300:
Step S800, using the device id of described first terminal as deciphering described first encryption data First secret key, and by described first encryption data and described first secret key binding.
First terminal is using device id as deciphering the first secret key of described first encryption data, and by institute Stating the first encryption data and described first secret key binding, wherein, described device id is unique mark Number, can be IMEI (International Mobile Equipment Identity, mobile device international identity Code), (International Mobile Subscriber Identification Number international mobile uses IMSI Family identification code), ESN (Electronic Serial Number, Electronic Serial Number) or MEID (Mobile Equipment Identifier, mobile device identification code).
Step S900, according to binding described first encryption data, generate communication instruction, wherein, described Communication instruction carries the first secret key deciphering described first encryption data.
First terminal, according to described first encryption data of binding, generates communication instruction, and by described communication Instruction is sent to the second terminal, wherein, carries described first encryption data of deciphering in described communication instruction The first secret key, thus, communication instruction also passes through encryption, with guarantee send during safety.
The encryption method that the present embodiment provides, described as deciphering using the device id of described first terminal First secret key of the first encryption data, and by described first encryption data and described first secret key binding, root According to described first encryption data of binding, generate communication instruction, it is achieved data ciphering and deciphering differentiation, from And strengthen the protection of individual privacy during communication, communication encryption is served and further consolidates and booster action.
As described in Figure 7, Fig. 7 is the schematic flow sheet of encryption method the 7th embodiment of the present invention, in this reality Executing in example, described encryption method includes:
Step S1000, the second terminal receive the first encryption data that first terminal sends.
Second terminal receives the first encryption data that first terminal sends over.
The configuration information of the third party device certification of step S2000, acquisition and described mobile terminal binding, root According to the configuration information of the described certification obtained, described first encryption data is encrypted, generates the second encryption Data.
Second terminal obtains the third party device certification bound through described first terminal being stored in data base Configuration information, wherein, third party device can be wearable device, it is also possible to is other-end, joins Confidence breath can be MAC Address, it is also possible to be serial number etc..Wearable device the most directly wears, Or it is incorporated into the clothes of user or a kind of portable set of accessory.Wearable device can be intelligence hands Ring, intelligent watch or intelligent glasses.The MAC Address of the wearable device of binding can be Bluetooth address Or WI-FI address.
The encryption method that the present embodiment provides, participates in ciphering process by third party device so that solve secret letter Cease only the machine can solve, it is achieved data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication, Communication encryption is served and further consolidates and booster action.
As described in Figure 8, Fig. 8 is the schematic flow sheet of encryption method the 8th embodiment of the present invention, the 7th On the basis of embodiment, also include before described step S2000:
Step S3000, described second terminal receive binding with described first encryption data of first terminal transmission Communication instruction.
It is logical with what described first encryption data bound together that second terminal reception first terminal sends over News instruction.
Step S4000, resolve described communication instruction, obtain the first secret key deciphering described first encryption data.
The described communication instruction that second end-on is received carries out parsing to be had, and obtains and solve from described communication instruction First secret key of close described first encryption data.
Step S5000, according to described first secret key, described first encryption data is decrypted.
Second terminal is close according to obtain described first encryption data of deciphering from described communication instruction first Spoon, is decrypted described first encryption data.
As described in Figure 9, Fig. 9 is the schematic flow sheet of encryption method the 9th embodiment of the present invention, the 7th On the basis of embodiment, also include after described step S2000:
Step S6000, using the device id of described second terminal as deciphering described second encryption data Second secret key, and by close with decipher described second encryption data second for described second encryption data of generation Spoon is bound.
Second terminal is using device id as deciphering the second secret key of described second encryption data, and by institute Stating the second encryption data and described second secret key binding, wherein, described device id is unique mark Number, can be IMEI, IMSI, ESN or MEID.
The encryption method that the present embodiment provides, described as deciphering using the device id of described second terminal Second secret key of the second encryption data, and by described second encryption data and described second secret key binding, real Existing data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication, play communication encryption Further consolidation and booster action.
As described in Figure 10, Figure 10 is the schematic flow sheet of encryption method the tenth embodiment of the present invention, On the basis of nine embodiments, also include after described step S6000:
Step S7000 is set up with current described third party device and is connected, and obtains the current third party connected The authentication information of equipment.
Second terminal is set up with current described third party device and is connected, and obtains the current third party connected and sets Standby authentication information, described third party device can be wearable device.
Step S8000, according to described authentication information, it is determined that whether the current third party device connected is binding Described third party device, the most then show the second encryption data;If it is not, the most do not show described second Encryption data.
Second terminal is according to the authentication information of the current third party device connected obtained, it is determined that currently connect Third party device be whether the described third party device of binding, if the described third party device of binding, Then the second encryption data is shown;If not the described third party device of binding, then to described second Encryption data does not shows.
The encryption method that the present embodiment provides, the certification of the current third party device connected by obtaining is believed Breath, according to the described authentication information obtained, it is determined that whether the third party device of described current connection is described The third party device of binding, the most then show the data of encryption, thus individual when strengthening communication The protection of privacy, serves communication encryption and further consolidates and booster action.
As described in Figure 11, Figure 11 is the schematic flow sheet of encryption method the tenth embodiment of the present invention, On the basis of eight embodiments, also include after described step S4000:
Step S9000, to resolve described communication instruction destroy.
After the described communication instruction that the first terminal that second end-on is received sends over resolves, obtain Decipher the first secret key of described first encryption data.After obtaining the first secret key, the described communication to resolving refers to Order is destroyed, i.e. this parsing is used only once.
The encryption method that the present embodiment provides, by obtaining the first secret key deciphering described first encryption data After, the described communication instruction resolved is destroyed, thus the protection of individual privacy when strengthening communication, right Communication encryption serves further to be consolidated and booster action.
As described in Figure 12, Figure 12 is the schematic flow sheet of decryption method first embodiment of the present invention, In one embodiment, described decryption method comprises the following steps:
Step S10, reception encryption data, and the transmission terminal binding of acquisition and described encryption data ownership The configuration information of third party device certification.
Mobile terminal receives and sends the encryption data that terminal sends over, and acquisition is returned with described encryption data The configuration information of the third party device certification sending terminal binding belonged to.Wherein, third party device can be Wearable device, it is also possible to be other-end, configuration information can be MAC Address, it is also possible to be sequence Number etc..Wearable device the most directly wears, or is incorporated into the one of the clothes of user or accessory just Portable device.Wearable device can be Intelligent bracelet, intelligent watch or intelligent glasses.That binds can The MAC Address of wearable device can be Bluetooth address or WI-FI address.
Step S20, according to the configuration information of described certification obtained, described encryption data is decrypted.
Mobile terminal is according to sending in the encryption data that terminal sends over through sending out that described encryption data belongs to Send the configuration information of the third party device certification of terminal binding, described encryption data is decrypted.
The decryption method that the present embodiment provides, participates in ciphering process by third party device so that solve secret letter Cease only the machine can solve, it is achieved data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication, Communication encryption is served and further consolidates and booster action.
As described in Figure 13, Figure 13 is the schematic flow sheet of decryption method the second embodiment of the present invention, On the basis of one embodiment, also include before described step S20:
Step S30, the authentication information of the current third party device connected of acquisition.
The authentication information of the third party device that acquisition for mobile terminal currently connects.Wherein, third party device can To be wearable device, it is also possible to be other-end.
Step S40, the authentication information of third party device according to the described current connection obtained, it is determined that current Whether the third party device connected is the third party device bound, the most then show described encryption data; If it is not, the most do not show described encryption data.
Mobile terminal is according to the authentication information of the third party device of the described current connection obtained, it is determined that current Whether the third party device connected is the third party device bound, if the third party device of binding, the most right Described encryption data shows;If not the third party device of binding, then described encryption data is not entered Row display.
The decryption method that the present embodiment provides, the certification of the current third party device connected by obtaining is believed Breath, according to the described authentication information obtained, it is determined that whether the third party device of described current connection is described The third party device of binding, the most then show the data of encryption, thus individual when strengthening communication The protection of privacy, serves communication encryption and further consolidates and booster action.
As described in Figure 14, Figure 14 is the schematic flow sheet of decryption method the 3rd embodiment of the present invention, On the basis of one embodiment, also include after described step S20:
Step S50, obtain in described encryption data the secret key deciphering described encryption data of binding, to display Described encryption data be decrypted.
The secret key deciphering described encryption data of binding in encryption data described in acquisition for mobile terminal, according to institute State secret key, the described encryption data of display is decrypted.
As described in Figure 15, Figure 15 is the schematic flow sheet of decryption method the 4th embodiment of the present invention, On the basis of one embodiment, also include before described step S20:
Receive communication instruction, and the device id of the transmission terminal carried by described communication instruction is as solution First secret key of close described encryption data, is decrypted described encryption data.
Mobile terminal receives and sends the communication instruction that terminal sends over, and described communication instruction is carried Send the device id first secret key as the described encryption data of deciphering of terminal, to described encryption data It is decrypted.Wherein, the device id of described transmission terminal, for unique identification number, can be IMEI, IMSI, ESN or MEID.
The decryption method that the present embodiment provides, described as deciphering using the device id of described transmission terminal The secret key of encryption data, it is achieved data ciphering and deciphering differentiation, thus the guarantor of individual privacy when strengthening communication Protect, communication encryption is served and further consolidates and booster action.
As described in Figure 16, Figure 16 is that the functional module of the mobile terminal first embodiment that the present invention encrypts is shown Being intended to, in the first embodiment, described mobile terminal includes:
Configuration information acquisition module 10, for the configuration information according to the described certification obtained, treats described The data of encryption are encrypted, and generate the first encryption data;
First encryption data generation module 20, for the configuration information according to the described certification obtained, to institute State data to be encrypted to be encrypted, generate the first encryption data;
Sending module 30, for being transmitted described first encryption data generated.
The configuration information acquisition module 10 of first terminal obtains data to be encrypted and is stored in data base Through the configuration information of the third party device certification that described first terminal is bound, wherein, third party device is permissible Being wearable device, it is also possible to be other-end, configuration information can be MAC Address, it is also possible to be sequence Row number etc..Wearable device the most directly wears, or is incorporated into the clothes of user or the one of accessory Portable set.Wearable device can be Intelligent bracelet, intelligent watch or intelligent glasses.Binding The MAC Address of wearable device can be Bluetooth address or WI-FI address.Described data to be encrypted Including the Content of communciation that need to send, described configuration information is stored in the safety zone of data base.
First encryption data generation module 20 of first terminal according to the configuration information of described certification obtained, Such as, MAC Address, described data to be encrypted are encrypted, generate the first encryption data.
Described first encryption data generated is transmitted by the sending module 30 of first terminal, is sent to the Two terminals.
The mobile terminal that the present embodiment provides, participates in ciphering process by third party device so that solve secret letter Cease only the machine can solve, it is achieved data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication, Communication encryption is served and further consolidates and booster action.
As described in Figure 17, Figure 17 is that the functional module of mobile terminal the second embodiment that the present invention encrypts is shown Being intended to, on the basis of first embodiment, described mobile terminal also includes:
Judge binding module 40, for judging whether to obtain the configuration letter with described third party device certification Breath, if can not obtain, then binds described third party device.
The judgement binding module 40 of first terminal obtains data to be encrypted, it may be judged whether can obtain with described The configuration information of third party device certification, if can not obtain, then binds described third party device;If can obtain Take, then according to the configuration information of the described certification obtained, described data to be encrypted are encrypted, raw Become the first encryption data.
As described in Figure 18, Figure 18 is that the functional module of mobile terminal the 3rd embodiment that the present invention encrypts is shown Being intended to, on the basis of first embodiment, described mobile terminal also includes:
First authentication information acquisition module 50, for obtaining the authentication information of the third party device of current connection;
First judges display module 60, for according to the described authentication information obtained, it is determined that described currently connect Whether the third party device connect is the third party device of described binding, the most then show described first encryption Data;If it is not, the most do not show described first encryption data.
Third party device is authenticated by the first authentication information acquisition module 50 of first terminal, and acquisition is worked as The authentication information of the third party device of front connection.
First judgement display module 60 recognizing according to the current third party device connected obtained of first terminal Card information, it is determined that whether the third party device connected before described is the third party device of described binding, if so, Then the first encryption data is shown;If it is not, then described first encryption data is not shown.
The mobile terminal that the present embodiment provides, the certification of the current third party device connected by obtaining is believed Breath, according to the described authentication information obtained, it is determined that whether the third party device of described current connection is described The third party device of binding, the most then show the data of encryption, it is achieved data ciphering and deciphering is poor Alienation, thus the protection of individual privacy when strengthening communication, communication encryption is served further consolidate and Booster action.
As described in Figure 19, Figure 19 is that the functional module of mobile terminal the 4th embodiment that the present invention encrypts is shown Being intended to, on the basis of the 3rd embodiment, described mobile terminal also includes:
Judge link block 70, for whether judging the third party device of described mobile terminal and described binding Connecting, if be not connected with, the most described mobile terminal and described third party device are set up and are connected.
The judgement link block 70 of first terminal judges whether that the third party device with described binding is set up even Connect, if do not set up connection, then set up with described third party device and connect.
As described in Figure 20, Figure 20 is that the functional module of mobile terminal the 5th embodiment that the present invention encrypts is shown Being intended to, on the basis of the 3rd embodiment, described mobile terminal also includes:
Judge consistent module 61, for judging the 3rd of described current connection described in described authentication information The configuration information of method, apparatus is the most consistent with the configuration information of described certification, if inconsistent time, then described work as The third party device of front connection is not the third party device of described binding;If consistent time, the most described currently connect The third party device connect is the third party device of described binding.
First terminal judge that consistent module 61 judges that the third party device that currently connects is whether as described binding Third party device, if the configuration information of the current third party device connected that first terminal obtains is with local The described certification that data base prestores accordant configuration information time, the third party device of the most described current connection It it is the third party device of described binding;If time inconsistent, the third party device of the most described current connection is not The third party device of described binding.
As described in Figure 21, Figure 21 is that the functional module of the mobile terminal sixth embodiment that the present invention encrypts is shown Being intended to, on the basis of first embodiment, described mobile terminal also includes:
First secret key binding module 80, described as deciphering for the device id using described mobile terminal First secret key of the first encryption data, and by described first encryption data and described first secret key binding;
Directive generation module 90, for described first encryption data according to binding, generates communication instruction, Wherein, described communication instruction carries decipher the first secret key of described first encryption data.
First secret key binding module 80 of first terminal is using device id as the described first encryption number of deciphering According to the first secret key, and by described first encryption data with described first secret key binding, wherein, described in set Standby identification number is unique identification number, can be IMEI, IMSI, ESN or MEID.
The directive generation module 90 of first terminal, according to described first encryption data of binding, generates communication and refers to Order, and described communication instruction is sent to the second terminal, wherein, described communication instruction carries deciphering First secret key of described first encryption data, thus, communication instruction also passes through encryption, to guarantee to send out Safety during sending.
The mobile terminal that the present embodiment provides, described as deciphering using the device id of described first terminal First secret key of the first encryption data, and by described first encryption data and described first secret key binding, root According to described first encryption data of binding, generate communication instruction, it is achieved data ciphering and deciphering differentiation, from And strengthen the protection of individual privacy during communication, communication encryption is served and further consolidates and booster action.
As described in Figure 22, Figure 22 is that the functional module of mobile terminal the 7th embodiment that the present invention encrypts is shown Being intended to, in the present embodiment, described mobile terminal includes:
Encrypted data reception module 100, for receiving the first encryption data that first terminal sends;
Second encryption data generation module 200, for obtaining the third party device with described mobile terminal binding The configuration information of certification, is carried out described first encryption data according to the configuration information of the described certification obtained Encryption, generates the second encryption data.
The encrypted data reception module 100 of the second terminal receives the first encryption number that first terminal sends over According to.
Second encryption data generation module 200 of the second terminal obtain be stored in data base through described the The configuration information of the third party device certification of one terminal binding, wherein, third party device can be wearable Equipment, it is also possible to be other-end, configuration information can be MAC Address, it is also possible to be serial number etc.. Wearable device the most directly wears, or the one being incorporated into the clothes of user or accessory is portable to be set Standby.Wearable device can be Intelligent bracelet, intelligent watch or intelligent glasses.The wearable of binding sets Standby MAC Address can be Bluetooth address or WI-FI address.
The mobile terminal that the present embodiment provides, participates in ciphering process by third party device so that solve secret letter Cease only the machine can solve, it is achieved data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication, Communication encryption is served and further consolidates and booster action.
As described in Figure 23, Figure 23 is that the functional module of mobile terminal the 8th embodiment that the present invention encrypts is shown Being intended to, on the basis of the 7th embodiment, described mobile terminal also includes:
Command reception module 300, for receive first terminal send with described first encryption data binding Communication instruction;
Parsing module 400, is used for resolving described communication instruction, obtains and deciphers the of described first encryption data One secret key;
Deciphering module 500, for according to described first secret key, is decrypted described first encryption data.
The command reception module 300 of the second terminal receives that first terminal sends over described first encryption The communication instruction that data bind together.
The parsing module 400 of the second terminal carries out parsing to the described communication instruction received to be had, from described logical News instruction obtains the first secret key deciphering described first encryption data.
The deciphering module 500 of the second terminal is according to obtaining described first encryption of deciphering from described communication instruction First secret key of data, is decrypted described first encryption data.
As described in Figure 24, Figure 24 is that the functional module of mobile terminal the 9th embodiment that the present invention encrypts is shown Being intended to, on the basis of the 7th embodiment, described mobile terminal also includes:
Second secret key binding module 600, described as deciphering for the device id using described mobile terminal Second secret key of the second encryption data, and described second encryption data generated is added with deciphering described second Second secret key of ciphertext data is bound.
Second secret key binding module 600 of the second terminal is using device id as described second encryption of deciphering Second secret key of data, and by described second encryption data and described second secret key binding, wherein, described Device id is unique identification number, can be IMEI, IMSI, ESN or MEID.
The mobile terminal that the present embodiment provides, described as deciphering using the device id of described second terminal Second secret key of the second encryption data, and by described second encryption data and described second secret key binding, real Existing data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication, play communication encryption Further consolidation and booster action.
As described in Figure 25, Figure 25 is that the functional module of mobile terminal the tenth embodiment that the present invention encrypts is shown Being intended to, on the basis of the 9th embodiment, described mobile terminal also includes:
Second authentication information acquisition module 700, is connected for setting up with current described third party device, obtains Take the authentication information of the third party device of current connection;
Second judges display module 800, for according to described authentication information, it is determined that the current third party connected Whether equipment is the described third party device bound, the most then show the second encryption data;If it is not, then Do not show described second encryption data.
Second authentication information acquisition module 700 of the second terminal is set up even with current described third party device Connecing, obtain the authentication information of the current third party device connected, described third party device can be wearable Equipment.
Second judgement display module 800 of the second terminal is according to the current third party device connected obtained Authentication information, it is determined that whether the current third party device connected is the described third party device bound, if The described third party device of binding, then show the second encryption data;If not described the of binding Three method, apparatus, then do not show described second encryption data.
The mobile terminal that the present embodiment provides, the certification of the current third party device connected by obtaining is believed Breath, according to the described authentication information obtained, it is determined that whether the third party device of described current connection is described The third party device of binding, the most then show the data of encryption, thus individual when strengthening communication The protection of privacy, serves communication encryption and further consolidates and booster action.
As described in Figure 26, Figure 26 is the functional module of mobile terminal the 11st embodiment that the present invention encrypts Schematic diagram, on the basis of the 8th embodiment, described mobile terminal also includes:
Destroy module 900, for the described communication instruction resolved is destroyed.
The described communication instruction that the first terminal received is sended over by the destruction module 900 of the second terminal enters After row resolves, obtain the first secret key deciphering described first encryption data.After obtaining the first secret key, to solution The described communication instruction of analysis is destroyed, i.e. this parsing is used only once.
The mobile terminal that the present embodiment provides, by obtaining the first secret key deciphering described first encryption data After, the described communication instruction resolved is destroyed, thus the protection of individual privacy when strengthening communication, right Communication encryption serves further to be consolidated and booster action.
As described in Figure 27, Figure 27 is that the functional module of the mobile terminal first embodiment that the present invention deciphers is shown Being intended to, in the first embodiment, described mobile terminal includes:
Configuration information receiver module 1000, is used for receiving encryption data, and acquisition is returned with described encryption data The configuration information of the third party device certification sending terminal binding belonged to;
Encryption data deciphering module 2000, for the configuration information according to the described certification obtained, to described Encryption data is decrypted.
The configuration information receiver module 1000 of mobile terminal receives and sends the encryption data that terminal sends over, And obtain the configuration information of the third party device certification sending terminal binding belonged to described encryption data. Wherein, third party device can be wearable device, it is also possible to be other-end, and configuration information can be MAC Address, it is also possible to be serial number etc..Wearable device the most directly wears, or is incorporated into use The clothes at family or a kind of portable set of accessory.Wearable device can be Intelligent bracelet, intelligent watch Or intelligent glasses.The MAC Address of the wearable device of binding can be Bluetooth address or WI-FI Address.
The encryption data deciphering module 2000 of mobile terminal is according to sending in the encryption data that terminal sends over Through the configuration information of the third party device certification sending terminal binding that described encryption data belongs to, to described Encryption data is decrypted.
The mobile terminal that the present embodiment provides, participates in ciphering process by third party device so that solve secret letter Cease only the machine can solve, it is achieved data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication, Communication encryption is served and further consolidates and booster action.
As described in Figure 28, Figure 27 is that the functional module of mobile terminal the second embodiment that the present invention deciphers is shown Being intended to, on the basis of first embodiment, described mobile terminal also includes:
Second authentication information acquisition module 3000, for obtaining the certification letter of the third party device of current connection Breath;
Judge display module 4000, for the certification of the third party device according to the described current connection obtained Information, it is determined that whether the current third party device connected is the third party device bound, the most then show Described encryption data;If it is not, the most do not show described encryption data.
Second authentication information acquisition module 3000 of mobile terminal obtains recognizing of the third party device of current connection Card information.Wherein, third party device can be wearable device, it is also possible to be other-end.
Mobile terminal judge the display module 4000 third party device according to the described current connection obtained Authentication information, it is determined that whether the current third party device connected is the third party device bound, if binding Third party device, then described encryption data is shown;If not the third party device of binding, then Described encryption data is not shown.
The mobile terminal that the present embodiment provides, the certification of the current third party device connected by obtaining is believed Breath, according to the described authentication information obtained, it is determined that whether the third party device of described current connection is described The third party device of binding, the most then show the data of encryption, thus individual when strengthening communication The protection of privacy, serves communication encryption and further consolidates and booster action.
As described in Figure 29, Figure 29 is that the functional module of mobile terminal the 3rd embodiment that the present invention deciphers is shown Being intended to, on the basis of first embodiment, described mobile terminal also includes:
Secret key deciphering module 5000, for obtaining the described encryption data of deciphering of binding in described encryption data Secret key, to display described encryption data be decrypted.
The secret key deciphering module 5000 of mobile terminal obtains the described encryption of deciphering of binding in described encryption data The secret key of data, according to described secret key, is decrypted the described encryption data of display.
As described in Figure 30, Figure 30 is that the functional module of mobile terminal the 4th embodiment that the present invention deciphers is shown Being intended to, on the basis of first embodiment, described mobile terminal also includes:
Receiving and deciphering module 6000, is used for receiving communication instruction, and the transmission carried by described communication instruction Described encryption data, as the first secret key of the described encryption data of deciphering, is carried out by the device id of terminal Deciphering.
The receiving and deciphering module 6000 of mobile terminal receives and sends the communication instruction that terminal sends over, and will The device id of the transmission terminal that described communication instruction carries is close as decipher described encryption data first Spoon, is decrypted described encryption data.Wherein, the device id of described transmission terminal, for uniquely Identification number, can be IMEI, IMSI, ESN or MEID.
The mobile terminal that the present embodiment provides, described as deciphering using the device id of described transmission terminal The secret key of encryption data, it is achieved data ciphering and deciphering differentiation, thus the guarantor of individual privacy when strengthening communication Protect, communication encryption is served and further consolidates and booster action.
These are only the preferred embodiments of the present invention, not thereby limit the scope of the claims of the present invention, every Utilize equivalent structure or equivalence flow process conversion that description of the invention and accompanying drawing content made, or directly or Connect and be used in other relevant technical fields, be the most in like manner included in the scope of patent protection of the present invention.

Claims (30)

1. an encryption method, it is characterised in that described encryption method comprises the following steps:
First terminal obtains data to be encrypted and the third party device certification bound with described first terminal Configuration information;
According to the configuration information of the described certification obtained, described data to be encrypted are encrypted, generate First encryption data;
Described first encryption data generated is transmitted.
2. encryption method as claimed in claim 1, it is characterised in that described first terminal obtains to be added The step of the configuration information of the third party device certification bound after close data and with described first terminal The most also include:
Judge whether to obtain the configuration information with described third party device certification, if can not obtain, then tie up Fixed described third party device.
3. encryption method as claimed in claim 1, it is characterised in that described will generate described first Also include before the step that encryption data is transmitted:
Obtain the authentication information of the current third party device connected;
According to the described authentication information obtained, it is determined that whether the third party device of described current connection is described The third party device of binding, the most then show described first encryption data;If it is not, the most do not show described First encryption data.
4. encryption method as claimed in claim 3, recognizing of the third party device that described acquisition currently connects Also include before the step of card information:
Judge whether the third party device of described first terminal and described binding connects, if be not connected with, then Described first terminal and described third party device are set up and are connected.
5. encryption method as claimed in claim 3, it is characterised in that described recognize according to obtaining Card information, it is determined that whether the third party device of described current connection is the step of the third party device of described binding Suddenly include:
Judge configuration information and the institute of the third party device of described current connection described in described authentication information Whether the configuration information stating certification consistent, if inconsistent time, the third party device of the most described current connection is not It it is the third party device of described binding;If time consistent, the third party device of the most described current connection is described The third party device of binding.
6. the encryption method as described in any one of claim 1 to 5, it is characterised in that described by described Also include before the step that first encryption data is transmitted:
Using the device id of described first terminal as deciphering the first secret key of described first encryption data, And by described first encryption data and described first secret key binding;
According to described first encryption data of binding, generate communication instruction, wherein, in described communication instruction Carry the first secret key deciphering described first encryption data.
7. an encryption method, it is characterised in that described encryption method comprises the following steps:
Second terminal receives the first encryption data that first terminal sends;
The configuration information of the third party device certification of acquisition and described mobile terminal binding, according to the institute obtained Described first encryption data is encrypted by the configuration information stating certification, generates the second encryption data.
8. encryption method as claimed in claim 7, it is characterised in that described acquisition and described mobile terminal The configuration information of third party device certification of binding, according to the configuration information of the described certification obtained to described First encryption data is encrypted, and also includes before generating the step of the second encryption data:
Described second terminal receives the communication with described first encryption data binding of first terminal transmission and refers to Order;
Resolve described communication instruction, obtain the first secret key deciphering described first encryption data;
According to described first secret key, described first encryption data is decrypted.
9. encryption method as claimed in claim 7, it is characterised in that described acquisition and described mobile terminal The configuration information of third party device certification of binding, according to the configuration information of the described certification obtained to described First encryption data is encrypted, and also includes after generating the step of the second encryption data:
Using the device id of described second terminal as deciphering the second secret key of described second encryption data, And described second encryption data generated and the second secret key deciphering described second encryption data are tied up Fixed.
10. encryption method as claimed in claim 9, it is characterised in that described with described second terminal Device id as decipher described second encryption data the second secret key, and will generate described second Encryption data and the second secret key deciphering described second encryption data also include after carrying out the step bound:
Set up with current described third party device and be connected, obtain the certification of the current third party device connected Information;
According to described authentication information, it is determined that whether the current third party device connected is the described 3rd of binding Method, apparatus, the most then show the second encryption data;If it is not, the most do not show described second encryption data.
11. encryption methods as described in any one of claim 8 to 10, it is characterised in that described parsing Described communication instruction, also includes after obtaining the step of the first secret key deciphering described first encryption data:
The described communication instruction resolved is destroyed.
12. 1 kinds of decryption methods, it is characterised in that described decryption method comprises the following steps:
Receive encryption data, and the third party obtaining the transmission terminal binding with described encryption data ownership sets The configuration information of standby certification;
According to the configuration information of the described certification obtained, described encryption data is decrypted.
13. decryption methods as claimed in claim 12, it is characterised in that described according to described in acquisition The configuration information of certification, before the step be decrypted also included described encryption data:
Obtain the authentication information of the current third party device connected;
The authentication information of third party device according to the described current connection obtained, it is determined that current connect the Whether three method, apparatus are the third party device bound, the most then show described encryption data;If it is not, then Do not show described encryption data.
14. decryption methods as claimed in claim 12, it is characterised in that described according to described in acquisition The configuration information of certification, after the step be decrypted also included described encryption data:
Obtain the secret key deciphering described encryption data of binding in described encryption data, add described in display Ciphertext data is decrypted.
15. decryption methods as described in any one of claim 12 to 14, it is characterised in that described According to the configuration information of the described certification obtained, is also included before the step that described encryption data is decrypted:
Receive communication instruction, and the device id of the transmission terminal carried by described communication instruction is as solution First secret key of close described encryption data, is decrypted described encryption data.
The mobile terminal of 16. 1 kinds of encryptions, it is characterised in that described mobile terminal includes:
Configuration information acquisition module, for obtaining data to be encrypted and through described mobile terminal binding The configuration information of third party device certification;
First encryption data generation module, for the configuration information according to the described certification obtained, to described Data to be encrypted are encrypted, and generate the first encryption data;
Sending module, for being transmitted described first encryption data generated.
17. mobile terminals as claimed in claim 16, it is characterised in that described mobile terminal also includes:
Judge binding module, for judging whether to obtain the configuration information with described third party device certification, If can not obtain, then bind described third party device.
18. mobile terminals as claimed in claim 16, it is characterised in that described mobile terminal also includes:
First authentication information acquisition module, for obtaining the authentication information of the third party device of current connection;
First judges display module, for according to the described authentication information obtained, it is determined that described current connection Third party device be whether the third party device of described binding, the most then show described first encryption number According to;If it is not, the most do not show described first encryption data.
19. mobile terminals as claimed in claim 18, it is characterised in that described mobile terminal also includes:
Judge link block, for judging whether the third party device of described mobile terminal and described binding connects Connecing, if be not connected with, the most described mobile terminal and described third party device are set up and are connected.
20. mobile terminals as claimed in claim 18, it is characterised in that described mobile terminal also includes:
Judge consistent module, for judging the third party of the described current connection described in described authentication information The configuration information of equipment is the most consistent with the configuration information of described certification, if inconsistent time, the most described currently The third party device connected is not the third party device of described binding;If time consistent, the most described current connection Third party device be the third party device of described binding.
21. mobile terminals as described in any one of claim 16 to 20, it is characterised in that described shifting Dynamic terminal also includes:
First secret key binding module, for using the device id of described mobile terminal as deciphering described the First secret key of one encryption data, and by described first encryption data and described first secret key binding;
Directive generation module, for described first encryption data according to binding, generates communication instruction, its In, described communication instruction carries the first secret key deciphering described first encryption data.
The mobile terminal of 22. 1 kinds of encryptions, it is characterised in that described mobile terminal includes:
Encrypted data reception module, for receiving the first encryption data that first terminal sends;
Second encryption data generation module, the third party device certification of acquisition and described mobile terminal binding Configuration information, is encrypted described first encryption data according to the configuration information of the described certification obtained, Generate the second encryption data.
23. mobile terminals as claimed in claim 22, it is characterised in that described mobile terminal also includes:
Command reception module, for receiving the logical with what described first encryption data was bound of first terminal transmission News instruction;
Parsing module, is used for resolving described communication instruction, obtains and deciphers the first of described first encryption data Secret key;
Deciphering module, for according to described first secret key, is decrypted described first encryption data.
24. mobile terminals as claimed in claim 22, it is characterised in that described mobile terminal also includes:
Second secret key binding module, for using the device id of described mobile terminal as deciphering described the Second secret key of two encryption datas, and described second encryption data second encryption described with deciphering that will generate Second secret key of data is bound.
25. mobile terminals as claimed in claim 24, it is characterised in that described mobile terminal also includes:
Authentication information acquisition module, is connected for setting up with current described third party device, obtains current The authentication information of the third party device connected;
Second judges display module, for according to described authentication information, it is determined that the current third party connected sets Whether standby be the described third party device bound, the most then show the second encryption data;If it is not, the most not Show described second encryption data.
26. mobile terminals as described in any one of claim 23 to 25, it is characterised in that described shifting Dynamic terminal also includes:
Destroy module, for the described communication instruction resolved is destroyed.
The mobile terminal of 27. 1 kinds of deciphering, it is characterised in that described mobile terminal includes:
Configuration information receiver module, is used for receiving encryption data, and obtains and described encryption data ownership Send the configuration information of the third party device certification of terminal binding;
Encryption data deciphering module, for the configuration information according to the described certification obtained, to described encryption Data are decrypted.
28. mobile terminals as claimed in claim 27, it is characterised in that described mobile terminal also includes:
Second authentication information acquisition module, for obtaining the authentication information of the third party device of current connection;
Judge display module, for the authentication information of the third party device according to the described current connection obtained, Judge that the third party device of current connection whether as the third party device of binding, the most then adds described in display Ciphertext data;If it is not, the most do not show described encryption data.
29. mobile terminals as claimed in claim 27, it is characterised in that described mobile terminal also includes:
Secret key deciphering module, for obtaining the close of the described encryption data of deciphering of binding in described encryption data Spoon, is decrypted the described encryption data of display.
30. mobile terminals as described in any one of claim 26 to 29, it is characterised in that described shifting Dynamic terminal also includes:
Receiving and deciphering module, is used for receiving communication instruction, and the transmission terminal carried by described communication instruction Device id as decipher described encryption data the first secret key, described encryption data is decrypted.
CN201510145893.3A 2015-03-30 2015-03-30 communication encryption, decryption method and mobile terminal Withdrawn CN106162621A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510145893.3A CN106162621A (en) 2015-03-30 2015-03-30 communication encryption, decryption method and mobile terminal
PCT/CN2015/086510 WO2016155185A1 (en) 2015-03-30 2015-08-10 Communication encryption and decryption method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510145893.3A CN106162621A (en) 2015-03-30 2015-03-30 communication encryption, decryption method and mobile terminal

Publications (1)

Publication Number Publication Date
CN106162621A true CN106162621A (en) 2016-11-23

Family

ID=57003933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510145893.3A Withdrawn CN106162621A (en) 2015-03-30 2015-03-30 communication encryption, decryption method and mobile terminal

Country Status (2)

Country Link
CN (1) CN106162621A (en)
WO (1) WO2016155185A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159907A (en) * 2007-11-20 2008-04-09 青岛海信移动通信技术股份有限公司 Method and system of encrypting multimode mobile communication terminal
CN101567788A (en) * 2009-04-15 2009-10-28 长沙理工大学 Method for even exchange of signature data for resisting attack of ring enlargement
CN102932762A (en) * 2012-09-20 2013-02-13 无锡华御信息技术有限公司 Remote centralized management control encryption system and method for mobile storage equipment based on global system for mobile communication (GSM)
US20130080777A1 (en) * 2011-09-23 2013-03-28 CSC Holdings, LLC Delivering A Content Item From A Server To A Device
CN103856938A (en) * 2012-12-04 2014-06-11 中兴通讯股份有限公司 Encryption and decryption method, system and device
CN104244237A (en) * 2014-09-12 2014-12-24 宇龙计算机通信科技(深圳)有限公司 Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102110218A (en) * 2011-02-22 2011-06-29 康佳集团股份有限公司 Mobile-phone-information-encryption-based authentication method
CN103037366B (en) * 2011-09-30 2016-10-26 卓望数码技术(深圳)有限公司 Mobile phone users authentication method based on asymmetric cryptographic technique and mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159907A (en) * 2007-11-20 2008-04-09 青岛海信移动通信技术股份有限公司 Method and system of encrypting multimode mobile communication terminal
CN101567788A (en) * 2009-04-15 2009-10-28 长沙理工大学 Method for even exchange of signature data for resisting attack of ring enlargement
US20130080777A1 (en) * 2011-09-23 2013-03-28 CSC Holdings, LLC Delivering A Content Item From A Server To A Device
CN102932762A (en) * 2012-09-20 2013-02-13 无锡华御信息技术有限公司 Remote centralized management control encryption system and method for mobile storage equipment based on global system for mobile communication (GSM)
CN103856938A (en) * 2012-12-04 2014-06-11 中兴通讯股份有限公司 Encryption and decryption method, system and device
CN104244237A (en) * 2014-09-12 2014-12-24 宇龙计算机通信科技(深圳)有限公司 Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set

Also Published As

Publication number Publication date
WO2016155185A1 (en) 2016-10-06

Similar Documents

Publication Publication Date Title
CN101662765B (en) Encryption system and method of short message of mobile telephone
US5455863A (en) Method and apparatus for efficient real-time authentication and encryption in a communication system
CN110365484B (en) Data processing method, device and system for equipment authentication
JP4263384B2 (en) Improved method for authentication of user subscription identification module
US10003965B2 (en) Subscriber profile transfer method, subscriber profile transfer system, and user equipment
CN106161359B (en) It authenticates the method and device of user, register the method and device of wearable device
CN108471610B (en) Bluetooth connection control system
CN105959189A (en) Home appliance equipment, communication system and method of cloud server and terminal, and terminal
CN107006049A (en) A kind of smart machine and its set up the method for equipment room bluetooth connection, device
CN105871920A (en) Communication system and method of terminal and cloud server as well as terminal and cloud server
CN105553932A (en) Method, device and system of remote control safety binding of intelligent home appliance
CN105814859B (en) A kind of network collocating method, relevant apparatus and system
CN102318386A (en) Service-based authentication to a network
CN105516103A (en) Method, device and system for binding intelligent household electrical appliances
CN104484596A (en) Method and terminal for creating password in multi-operation system
CN106792700A (en) The method for building up and system of a kind of secure communication environment of wearable device
CN105451298A (en) Network-sharing method and system, network access method and system, and electronic device
CN105376059A (en) Method and system for performing application signature based on electronic key
JP2017509197A (en) WIRELESS COMMUNICATION METHOD, WIRELESS COMMUNICATION DEVICE AND ITS APPLICATION SYSTEM AND DEVICE
CN108306793B (en) Intelligent device, intelligent home gateway, and method and system for establishing connection
CN104796262B (en) Data ciphering method and terminal system
CN104754496A (en) Smart household device connecting method and smart terminal
CN105873059A (en) Joint identity authentication method and system for power distribution communication wireless private network
US11076282B2 (en) Telecommunications apparatus with a radio-linked smart card
CN106162621A (en) communication encryption, decryption method and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20161123

WW01 Invention patent application withdrawn after publication