CN106162621A - communication encryption, decryption method and mobile terminal - Google Patents
communication encryption, decryption method and mobile terminal Download PDFInfo
- Publication number
- CN106162621A CN106162621A CN201510145893.3A CN201510145893A CN106162621A CN 106162621 A CN106162621 A CN 106162621A CN 201510145893 A CN201510145893 A CN 201510145893A CN 106162621 A CN106162621 A CN 106162621A
- Authority
- CN
- China
- Prior art keywords
- encryption data
- party device
- encryption
- binding
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of encryption method, obtain data to be encrypted and the configuration information of third party device certification bound with described first terminal by first terminal;According to the configuration information of the described certification obtained, described data to be encrypted are encrypted, generate the first encryption data;Described first encryption data generated is transmitted.The invention also discloses a kind of decryption method and mobile terminal.The present invention participates in ciphering process by third party device so that decryption information only the machine can solve, it is achieved data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication, communication encryption is served and further consolidates and booster action.
Description
Technical field
The present invention relates to communication field, particularly relate to communication encryption, decryption method and mobile terminal.
Background technology
In recent years, user increasingly focuses on individual privacy safety, particularly Privacy Protection during communication,
But, again and again expose, along with domestic, the event that the privacy of user such as privacy are compromised of stealing such as iPhone,
The communication privacy worrying oneself making user unprecedented can be compromised, and information security has been put on schedule.Therefore,
How to protect individual privacy when communication, be a problem demanding prompt solution.
Summary of the invention
A kind of communication encryption of offer, decryption method and mobile terminal are provided, it is intended to
Solve individual privacy protection problem during communication.
For achieving the above object, a kind of encryption method that the present invention provides, described encryption method includes following
Step:
First terminal obtains data to be encrypted and the third party device certification bound with described first terminal
Configuration information;
According to the configuration information of the described certification obtained, described data to be encrypted are encrypted, generate
First encryption data;
Described first encryption data generated is transmitted.
Preferably, bind after described first terminal obtains data to be encrypted and with described first terminal
Third party device certification configuration information step before also include:
Judge whether to obtain the configuration information with described third party device certification, if can not obtain, then tie up
Fixed described third party device.
Preferably, also include before the described step that described first encryption data generated is transmitted:
Obtain the authentication information of the current third party device connected;
According to the described authentication information obtained, it is determined that whether the third party device of described current connection is described
The third party device of binding, the most then show described first encryption data;If it is not, the most do not show described
First encryption data.
Preferably, also include before the step of the authentication information of the third party device that described acquisition currently connects:
Judge whether the third party device of described first terminal and described binding connects, if be not connected with, then
Described first terminal and described third party device are set up and are connected.
Preferably, described according to the described authentication information obtained, it is determined that the third party of described current connection sets
The step of the standby third party device being whether described binding includes:
Judge configuration information and the institute of the third party device of described current connection described in described authentication information
Whether the configuration information stating certification consistent, if inconsistent time, the third party device of the most described current connection is not
It it is the third party device of described binding;If time consistent, the third party device of the most described current connection is described
The third party device of binding.
Preferably, also include before the described step that described first encryption data is transmitted:
Using the device id of described first terminal as deciphering the first secret key of described first encryption data,
And by described first encryption data and described first secret key binding;
According to described first encryption data of binding, generate communication instruction, wherein, in described communication instruction
Carry the first secret key deciphering described first encryption data.
In order to solve above-mentioned technical problem, the present invention further provides a kind of encryption method, described encryption
Method comprises the following steps:
Second terminal receives the first encryption data that first terminal sends;
The configuration information of the third party device certification of acquisition and described mobile terminal binding, according to the institute obtained
Described first encryption data is encrypted by the configuration information stating certification, generates the second encryption data.
Preferably, the configuration information of the third party device certification of described acquisition and described mobile terminal binding,
Described first encryption data is encrypted by the configuration information according to the described certification obtained, and generates second and adds
Also include before the step of ciphertext data:
Described second terminal receives the communication with described first encryption data binding of first terminal transmission and refers to
Order;
Resolve described communication instruction, obtain the first secret key deciphering described first encryption data;
According to described first secret key, described first encryption data is decrypted.
Preferably, the configuration information of the third party device certification of described acquisition and described mobile terminal binding,
Described first encryption data is encrypted by the configuration information according to the described certification obtained, and generates second and adds
Also include after the step of ciphertext data:
Using the device id of described second terminal as deciphering the second secret key of described second encryption data,
And described second encryption data generated and the second secret key deciphering described second encryption data are tied up
Fixed.
Preferably, the described device id using described second terminal is as deciphering described second encryption data
The second secret key, and by generate described second encryption data with decipher described second encryption data second
Secret key also includes after carrying out the step bound:
Set up with current described third party device and be connected, obtain the certification of the current third party device connected
Information;
According to described authentication information, it is determined that whether the current third party device connected is the described 3rd of binding
Method, apparatus, the most then show the second encryption data;If it is not, the most do not show described second encryption data.
Preferably, the described communication instruction of described parsing, the first of acquisition described first encryption data of deciphering is close
Also include after the step of spoon:
The described communication instruction resolved is destroyed.
In order to solve above-mentioned technical problem, the present invention further provides a kind of decryption method, described deciphering
Method comprises the following steps:
Receive encryption data, and the third party obtaining the transmission terminal binding with described encryption data ownership sets
The configuration information of standby certification;
According to the configuration information of the described certification obtained, described encryption data is decrypted.
Preferably, the described configuration information according to the described certification obtained, described encryption data is solved
Also include before close step:
Obtain the authentication information of the current third party device connected;
The authentication information of the third party device according to the described current connection obtained, it is determined that the current third party connected
Whether equipment is the third party device bound, the most then show described encryption data;If it is not, do not show
Show described encryption data.
Preferably, also include after the described step that described encryption data is decrypted:
Obtain the secret key deciphering described encryption data of binding in described encryption data, add described in display
Ciphertext data is decrypted.
Preferably, the described configuration information according to the described certification obtained, described encryption data is solved
Also include before close step:
Receive communication instruction, and the device id of the transmission terminal carried by described communication instruction is as solution
First secret key of close described encryption data, is decrypted described encryption data.
In order to solve above-mentioned technical problem, the present invention further provides the mobile terminal of a kind of encryption, institute
State mobile terminal to include:
Configuration information acquisition module, for obtain data to be encrypted and with described mobile terminal binding
The configuration information of third party device certification;
First encryption data generation module, for the configuration information according to the described certification obtained, to described
Data to be encrypted are encrypted, and generate the first encryption data;
Sending module, for being transmitted described first encryption data generated.
Preferably, described mobile terminal also includes:
Judge binding module, for judging whether to obtain the configuration information with described third party device certification,
If can not obtain, then bind described third party device.
Preferably, described mobile terminal also includes:
First authentication information acquisition module, for obtaining the authentication information of the third party device of current connection;
First judges display module, for according to the described authentication information obtained, it is determined that described current connection
Third party device be whether the third party device of described binding, the most then show described first encryption number
According to;If it is not, the most do not show described first encryption data.
Preferably, described mobile terminal also includes:
Judge link block, for judging whether the third party device of described mobile terminal and described binding connects
Connecing, if be not connected with, the most described mobile terminal and described third party device are set up and are connected.
Preferably, described mobile terminal also includes:
Judge consistent module, for judging the third party of the described current connection described in described authentication information
The configuration information of equipment is the most consistent with the configuration information of described certification, if inconsistent time, the most described currently
The third party device connected is not the third party device of described binding;If time consistent, the most described current connection
Third party device be the third party device of described binding.
Preferably, described mobile terminal also includes:
First secret key binding module, for using the device id of described mobile terminal as deciphering described the
First secret key of one encryption data, and by described first encryption data and described first secret key binding;
Directive generation module, for described first encryption data according to binding, generates communication instruction, its
In, described communication instruction carries the first secret key deciphering described first encryption data.
In order to solve above-mentioned technical problem, the present invention further provides the mobile terminal of a kind of encryption, institute
State mobile terminal to include:
Encrypted data reception module, for receiving the first encryption data that first terminal sends;
Second encryption data generation module, recognizes for obtaining the third party device with described mobile terminal binding
The configuration information of card, adds described first encryption data according to the configuration information of the described certification obtained
Close, generate the second encryption data.
Preferably, described mobile terminal also includes:
Command reception module, for receiving the logical with what described first encryption data was bound of first terminal transmission
News instruction;
Parsing module, is used for resolving described communication instruction, obtains and deciphers the first of described first encryption data
Secret key;
Deciphering module, for according to described first secret key, is decrypted described first encryption data.
Preferably, described mobile terminal also includes:
Second secret key binding module, for using the device id of described mobile terminal as deciphering described the
Second secret key of two encryption datas, and described second encryption data second encryption described with deciphering that will generate
Second secret key of data is bound.
Preferably, described mobile terminal also includes:
Second authentication information acquisition module, is connected for setting up with current described third party device, obtains
The authentication information of the current third party device connected;
Second judges display module, for according to described authentication information, it is determined that the current third party connected sets
Whether standby be the described third party device bound, the most then show the second encryption data;If it is not, the most not
Show described second encryption data.
Preferably, described mobile terminal also includes:
Destroy module, for the described communication instruction resolved is destroyed.
In order to solve above-mentioned technical problem, the present invention further provides the mobile terminal of a kind of deciphering, institute
State mobile terminal to include:
Configuration information receiver module, is used for receiving encryption data, and obtains and described encryption data ownership
Send the configuration information of the third party device certification of terminal binding;
Encryption data deciphering module, for the configuration information according to the described certification obtained, to described encryption
Data are decrypted.
Preferably, described mobile terminal also includes:
Second authentication information acquisition module, for obtaining the authentication information of the third party device of current connection;
Judge display module, for the authentication information of the third party device according to the described current connection obtained,
Judge that the third party device of current connection whether as the third party device of binding, the most then adds described in display
Ciphertext data;If it is not, the most do not show described encryption data.
Preferably, described mobile terminal also includes:
Secret key deciphering module, for obtaining the close of the described encryption data of deciphering of binding in described encryption data
Spoon, is decrypted the described encryption data of display.
Preferably, described mobile terminal also includes:
Receiving and deciphering module, is used for receiving communication instruction, and the transmission terminal carried by described communication instruction
Device id as decipher described encryption data the first secret key, described encryption data is decrypted.
The encryption method that the present invention provides, obtains data to be encrypted and with described the by first terminal
The configuration information of the third party device certification of one terminal binding;According to the configuration information of the described certification obtained,
Described data to be encrypted are encrypted, generate the first encryption data;Described first encryption that will generate
Data are transmitted.The present invention participates in ciphering process by third party device so that decryption information only the machine
Can solve, it is achieved data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication, to communication
Encryption serves further consolidates and booster action.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of encryption method first embodiment of the present invention;
Fig. 2 is the schematic flow sheet of encryption method the second embodiment of the present invention;
Fig. 3 is the schematic flow sheet of encryption method the 3rd embodiment of the present invention;
Fig. 4 is the schematic flow sheet of encryption method the 4th embodiment of the present invention;
Fig. 5 is the schematic flow sheet of encryption method the 5th embodiment of the present invention;
Fig. 6 is the schematic flow sheet of encryption method sixth embodiment of the present invention;
Fig. 7 is the schematic flow sheet of encryption method the 7th embodiment of the present invention;
Fig. 8 is the schematic flow sheet of encryption method the 8th embodiment of the present invention;
Fig. 9 is the schematic flow sheet of encryption method the 9th embodiment of the present invention;
Figure 10 is the schematic flow sheet of encryption method the tenth embodiment of the present invention;
Figure 11 is the schematic flow sheet of encryption method the 11st embodiment of the present invention;
Figure 12 is the schematic flow sheet of decryption method first embodiment of the present invention;
Figure 13 is the schematic flow sheet of decryption method the second embodiment of the present invention;
Figure 14 is the schematic flow sheet of encryption method the 3rd embodiment of the present invention;
Figure 15 is the schematic flow sheet of encryption method the 4th embodiment of the present invention;
Figure 16 is the high-level schematic functional block diagram of the mobile terminal first embodiment that the present invention encrypts;
Figure 17 is the high-level schematic functional block diagram of mobile terminal the second embodiment that the present invention encrypts;
Figure 18 is the high-level schematic functional block diagram of mobile terminal the 3rd embodiment that the present invention encrypts;
Figure 19 is the high-level schematic functional block diagram of mobile terminal the 4th embodiment that the present invention encrypts;
Figure 20 is the high-level schematic functional block diagram of mobile terminal the 5th embodiment that the present invention encrypts;
Figure 21 is the high-level schematic functional block diagram of the mobile terminal sixth embodiment that the present invention encrypts;
Figure 22 is the high-level schematic functional block diagram of mobile terminal the 7th embodiment that the present invention encrypts;
Figure 23 is the high-level schematic functional block diagram of mobile terminal the 8th embodiment that the present invention encrypts;
Figure 24 is the high-level schematic functional block diagram of mobile terminal the 9th embodiment that the present invention encrypts;
Figure 25 is the high-level schematic functional block diagram of mobile terminal the tenth embodiment that the present invention encrypts;
Figure 26 is the high-level schematic functional block diagram of mobile terminal the 11st embodiment that the present invention encrypts;
Figure 27 is the high-level schematic functional block diagram of the mobile terminal first embodiment that the present invention deciphers;
Figure 28 is the high-level schematic functional block diagram of mobile terminal the second embodiment that the present invention deciphers;
Figure 29 is the high-level schematic functional block diagram of mobile terminal the 3rd embodiment that the present invention deciphers;
Figure 30 is the high-level schematic functional block diagram of mobile terminal the 4th embodiment that the present invention deciphers.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, do referring to the drawings further
Explanation.
Detailed description of the invention
Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not used to limit
Determine the present invention.
The present invention provides a kind of encryption method, is encryption method first embodiment of the present invention with reference to Fig. 1, Fig. 1
Schematic flow sheet, in one embodiment, described encryption method comprises the following steps:
Step S100, first terminal obtain data to be encrypted and with described first terminal bind the 3rd
The configuration information of method, apparatus certification.
First terminal obtains data to be encrypted and binding through described first terminal of being stored in data base
The configuration information of third party device certification, wherein, third party device can be wearable device, it is also possible to
Being other-end, configuration information can be MAC (Media Access Control or Medium Access
Control, media interviews control, or referred to as physical address, hardware address) address, it is also possible to it is sequence
Number etc..Wearable device the most directly wears, or is incorporated into the one of the clothes of user or accessory just
Portable device.Wearable device can be Intelligent bracelet, intelligent watch or intelligent glasses.That binds can
The MAC Address of wearable device can be Bluetooth address or WI-FI (Wireless Fidelity, Wireless Fidelity)
Address.Described data to be encrypted include that the Content of communciation that need to send, described configuration information are stored in number
According in the safety zone in storehouse.
Step S200, according to the configuration information of described certification obtained, described data to be encrypted are carried out
Encryption, generates the first encryption data.
First terminal, according to the configuration information of the described certification obtained, such as, MAC Address, is treated described
The data of encryption are encrypted, and generate the first encryption data.
Step S300, by generate described first encryption data be transmitted.
Described first encryption data generated is transmitted by first terminal, is sent to the second terminal.
The encryption method that the present embodiment provides, participates in ciphering process by third party device so that solve secret letter
Cease only the machine can solve, it is achieved data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication,
Communication encryption is served and further consolidates and booster action.
As described in Figure 2, Fig. 2 is the schematic flow sheet of encryption method the second embodiment of the present invention, first
On the basis of embodiment, also include after described step S100:
Step S400, judge whether to obtain and the configuration information of described third party device certification, if can not
Obtain, then bind described third party device.
First terminal obtains data to be encrypted, it may be judged whether can obtain and described third party device certification
Configuration information, if can not obtain, then binds described third party device;If can obtain, then according to acquisition
Described data to be encrypted are encrypted, generate the first encryption data by the configuration information of described certification.
As described in Figure 3, Fig. 3 is the schematic flow sheet of encryption method the 3rd embodiment of the present invention, first
On the basis of embodiment, also include before described step S300:
Step S500, the authentication information of the current third party device connected of acquisition.
Third party device is authenticated by first terminal, and obtains the certification of the current third party device connected
Information.
Step S600, according to obtain described authentication information, it is determined that the third party device of described current connection
It is whether the third party device of described binding, the most then shows described first encryption data;If it is not, then
Do not show described first encryption data.
First terminal is according to the authentication information of the current third party device connected obtained, it is determined that connect before described
Whether the third party device connect is the third party device of described binding, the most then show the first encryption data
Show;If it is not, then described first encryption data is not shown.
The encryption method that the present embodiment provides, the certification of the current third party device connected by obtaining is believed
Breath, according to the described authentication information obtained, it is determined that whether the third party device of described current connection is described
The third party device of binding, the most then show the data of encryption, it is achieved data ciphering and deciphering is poor
Alienation, thus the protection of individual privacy when strengthening communication, communication encryption is served further consolidate and
Booster action.
As described in Figure 4, Fig. 4 is the schematic flow sheet of encryption method the 4th embodiment of the present invention, the 3rd
On the basis of embodiment, also include before described step S500:
Step S700, judge whether the third party device of described first terminal and described binding connects, if not
During connection, the most described first terminal and described third party device are set up and are connected.
First terminal judges whether that the third party device with described binding is set up and connects, if do not set up connection,
Then set up with described third party device and connect.
As described in Figure 5, Fig. 5 is the schematic flow sheet of encryption method the 5th embodiment of the present invention, the 3rd
On the basis of embodiment, described step S600 includes:
Step S610, judge the joining of third party device of described current connection described in described authentication information
Confidence breath is the most consistent with the configuration information of described certification, if inconsistent time, the of the most described current connection
Three method, apparatus are not the third party devices of described binding;If time consistent, the third party of the most described current connection
Equipment is the third party device of described binding.
First terminal judge the third party device of current connection whether as the third party device of described binding, if
The configuration information of the current third party device connected that first terminal obtains is described with what local data base prestored
Certification accordant configuration information time, the third party device of the most described current connection is the 3rd of described binding
Method, apparatus;If time inconsistent, the third party device of the most described current connection is not the third party of described binding
Equipment.
As described in Figure 6, Fig. 6 is the schematic flow sheet of encryption method sixth embodiment of the present invention, first
On the basis of embodiment, also include before described step S300:
Step S800, using the device id of described first terminal as deciphering described first encryption data
First secret key, and by described first encryption data and described first secret key binding.
First terminal is using device id as deciphering the first secret key of described first encryption data, and by institute
Stating the first encryption data and described first secret key binding, wherein, described device id is unique mark
Number, can be IMEI (International Mobile Equipment Identity, mobile device international identity
Code), (International Mobile Subscriber Identification Number international mobile uses IMSI
Family identification code), ESN (Electronic Serial Number, Electronic Serial Number) or MEID (Mobile
Equipment Identifier, mobile device identification code).
Step S900, according to binding described first encryption data, generate communication instruction, wherein, described
Communication instruction carries the first secret key deciphering described first encryption data.
First terminal, according to described first encryption data of binding, generates communication instruction, and by described communication
Instruction is sent to the second terminal, wherein, carries described first encryption data of deciphering in described communication instruction
The first secret key, thus, communication instruction also passes through encryption, with guarantee send during safety.
The encryption method that the present embodiment provides, described as deciphering using the device id of described first terminal
First secret key of the first encryption data, and by described first encryption data and described first secret key binding, root
According to described first encryption data of binding, generate communication instruction, it is achieved data ciphering and deciphering differentiation, from
And strengthen the protection of individual privacy during communication, communication encryption is served and further consolidates and booster action.
As described in Figure 7, Fig. 7 is the schematic flow sheet of encryption method the 7th embodiment of the present invention, in this reality
Executing in example, described encryption method includes:
Step S1000, the second terminal receive the first encryption data that first terminal sends.
Second terminal receives the first encryption data that first terminal sends over.
The configuration information of the third party device certification of step S2000, acquisition and described mobile terminal binding, root
According to the configuration information of the described certification obtained, described first encryption data is encrypted, generates the second encryption
Data.
Second terminal obtains the third party device certification bound through described first terminal being stored in data base
Configuration information, wherein, third party device can be wearable device, it is also possible to is other-end, joins
Confidence breath can be MAC Address, it is also possible to be serial number etc..Wearable device the most directly wears,
Or it is incorporated into the clothes of user or a kind of portable set of accessory.Wearable device can be intelligence hands
Ring, intelligent watch or intelligent glasses.The MAC Address of the wearable device of binding can be Bluetooth address
Or WI-FI address.
The encryption method that the present embodiment provides, participates in ciphering process by third party device so that solve secret letter
Cease only the machine can solve, it is achieved data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication,
Communication encryption is served and further consolidates and booster action.
As described in Figure 8, Fig. 8 is the schematic flow sheet of encryption method the 8th embodiment of the present invention, the 7th
On the basis of embodiment, also include before described step S2000:
Step S3000, described second terminal receive binding with described first encryption data of first terminal transmission
Communication instruction.
It is logical with what described first encryption data bound together that second terminal reception first terminal sends over
News instruction.
Step S4000, resolve described communication instruction, obtain the first secret key deciphering described first encryption data.
The described communication instruction that second end-on is received carries out parsing to be had, and obtains and solve from described communication instruction
First secret key of close described first encryption data.
Step S5000, according to described first secret key, described first encryption data is decrypted.
Second terminal is close according to obtain described first encryption data of deciphering from described communication instruction first
Spoon, is decrypted described first encryption data.
As described in Figure 9, Fig. 9 is the schematic flow sheet of encryption method the 9th embodiment of the present invention, the 7th
On the basis of embodiment, also include after described step S2000:
Step S6000, using the device id of described second terminal as deciphering described second encryption data
Second secret key, and by close with decipher described second encryption data second for described second encryption data of generation
Spoon is bound.
Second terminal is using device id as deciphering the second secret key of described second encryption data, and by institute
Stating the second encryption data and described second secret key binding, wherein, described device id is unique mark
Number, can be IMEI, IMSI, ESN or MEID.
The encryption method that the present embodiment provides, described as deciphering using the device id of described second terminal
Second secret key of the second encryption data, and by described second encryption data and described second secret key binding, real
Existing data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication, play communication encryption
Further consolidation and booster action.
As described in Figure 10, Figure 10 is the schematic flow sheet of encryption method the tenth embodiment of the present invention,
On the basis of nine embodiments, also include after described step S6000:
Step S7000 is set up with current described third party device and is connected, and obtains the current third party connected
The authentication information of equipment.
Second terminal is set up with current described third party device and is connected, and obtains the current third party connected and sets
Standby authentication information, described third party device can be wearable device.
Step S8000, according to described authentication information, it is determined that whether the current third party device connected is binding
Described third party device, the most then show the second encryption data;If it is not, the most do not show described second
Encryption data.
Second terminal is according to the authentication information of the current third party device connected obtained, it is determined that currently connect
Third party device be whether the described third party device of binding, if the described third party device of binding,
Then the second encryption data is shown;If not the described third party device of binding, then to described second
Encryption data does not shows.
The encryption method that the present embodiment provides, the certification of the current third party device connected by obtaining is believed
Breath, according to the described authentication information obtained, it is determined that whether the third party device of described current connection is described
The third party device of binding, the most then show the data of encryption, thus individual when strengthening communication
The protection of privacy, serves communication encryption and further consolidates and booster action.
As described in Figure 11, Figure 11 is the schematic flow sheet of encryption method the tenth embodiment of the present invention,
On the basis of eight embodiments, also include after described step S4000:
Step S9000, to resolve described communication instruction destroy.
After the described communication instruction that the first terminal that second end-on is received sends over resolves, obtain
Decipher the first secret key of described first encryption data.After obtaining the first secret key, the described communication to resolving refers to
Order is destroyed, i.e. this parsing is used only once.
The encryption method that the present embodiment provides, by obtaining the first secret key deciphering described first encryption data
After, the described communication instruction resolved is destroyed, thus the protection of individual privacy when strengthening communication, right
Communication encryption serves further to be consolidated and booster action.
As described in Figure 12, Figure 12 is the schematic flow sheet of decryption method first embodiment of the present invention,
In one embodiment, described decryption method comprises the following steps:
Step S10, reception encryption data, and the transmission terminal binding of acquisition and described encryption data ownership
The configuration information of third party device certification.
Mobile terminal receives and sends the encryption data that terminal sends over, and acquisition is returned with described encryption data
The configuration information of the third party device certification sending terminal binding belonged to.Wherein, third party device can be
Wearable device, it is also possible to be other-end, configuration information can be MAC Address, it is also possible to be sequence
Number etc..Wearable device the most directly wears, or is incorporated into the one of the clothes of user or accessory just
Portable device.Wearable device can be Intelligent bracelet, intelligent watch or intelligent glasses.That binds can
The MAC Address of wearable device can be Bluetooth address or WI-FI address.
Step S20, according to the configuration information of described certification obtained, described encryption data is decrypted.
Mobile terminal is according to sending in the encryption data that terminal sends over through sending out that described encryption data belongs to
Send the configuration information of the third party device certification of terminal binding, described encryption data is decrypted.
The decryption method that the present embodiment provides, participates in ciphering process by third party device so that solve secret letter
Cease only the machine can solve, it is achieved data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication,
Communication encryption is served and further consolidates and booster action.
As described in Figure 13, Figure 13 is the schematic flow sheet of decryption method the second embodiment of the present invention,
On the basis of one embodiment, also include before described step S20:
Step S30, the authentication information of the current third party device connected of acquisition.
The authentication information of the third party device that acquisition for mobile terminal currently connects.Wherein, third party device can
To be wearable device, it is also possible to be other-end.
Step S40, the authentication information of third party device according to the described current connection obtained, it is determined that current
Whether the third party device connected is the third party device bound, the most then show described encryption data;
If it is not, the most do not show described encryption data.
Mobile terminal is according to the authentication information of the third party device of the described current connection obtained, it is determined that current
Whether the third party device connected is the third party device bound, if the third party device of binding, the most right
Described encryption data shows;If not the third party device of binding, then described encryption data is not entered
Row display.
The decryption method that the present embodiment provides, the certification of the current third party device connected by obtaining is believed
Breath, according to the described authentication information obtained, it is determined that whether the third party device of described current connection is described
The third party device of binding, the most then show the data of encryption, thus individual when strengthening communication
The protection of privacy, serves communication encryption and further consolidates and booster action.
As described in Figure 14, Figure 14 is the schematic flow sheet of decryption method the 3rd embodiment of the present invention,
On the basis of one embodiment, also include after described step S20:
Step S50, obtain in described encryption data the secret key deciphering described encryption data of binding, to display
Described encryption data be decrypted.
The secret key deciphering described encryption data of binding in encryption data described in acquisition for mobile terminal, according to institute
State secret key, the described encryption data of display is decrypted.
As described in Figure 15, Figure 15 is the schematic flow sheet of decryption method the 4th embodiment of the present invention,
On the basis of one embodiment, also include before described step S20:
Receive communication instruction, and the device id of the transmission terminal carried by described communication instruction is as solution
First secret key of close described encryption data, is decrypted described encryption data.
Mobile terminal receives and sends the communication instruction that terminal sends over, and described communication instruction is carried
Send the device id first secret key as the described encryption data of deciphering of terminal, to described encryption data
It is decrypted.Wherein, the device id of described transmission terminal, for unique identification number, can be IMEI,
IMSI, ESN or MEID.
The decryption method that the present embodiment provides, described as deciphering using the device id of described transmission terminal
The secret key of encryption data, it is achieved data ciphering and deciphering differentiation, thus the guarantor of individual privacy when strengthening communication
Protect, communication encryption is served and further consolidates and booster action.
As described in Figure 16, Figure 16 is that the functional module of the mobile terminal first embodiment that the present invention encrypts is shown
Being intended to, in the first embodiment, described mobile terminal includes:
Configuration information acquisition module 10, for the configuration information according to the described certification obtained, treats described
The data of encryption are encrypted, and generate the first encryption data;
First encryption data generation module 20, for the configuration information according to the described certification obtained, to institute
State data to be encrypted to be encrypted, generate the first encryption data;
Sending module 30, for being transmitted described first encryption data generated.
The configuration information acquisition module 10 of first terminal obtains data to be encrypted and is stored in data base
Through the configuration information of the third party device certification that described first terminal is bound, wherein, third party device is permissible
Being wearable device, it is also possible to be other-end, configuration information can be MAC Address, it is also possible to be sequence
Row number etc..Wearable device the most directly wears, or is incorporated into the clothes of user or the one of accessory
Portable set.Wearable device can be Intelligent bracelet, intelligent watch or intelligent glasses.Binding
The MAC Address of wearable device can be Bluetooth address or WI-FI address.Described data to be encrypted
Including the Content of communciation that need to send, described configuration information is stored in the safety zone of data base.
First encryption data generation module 20 of first terminal according to the configuration information of described certification obtained,
Such as, MAC Address, described data to be encrypted are encrypted, generate the first encryption data.
Described first encryption data generated is transmitted by the sending module 30 of first terminal, is sent to the
Two terminals.
The mobile terminal that the present embodiment provides, participates in ciphering process by third party device so that solve secret letter
Cease only the machine can solve, it is achieved data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication,
Communication encryption is served and further consolidates and booster action.
As described in Figure 17, Figure 17 is that the functional module of mobile terminal the second embodiment that the present invention encrypts is shown
Being intended to, on the basis of first embodiment, described mobile terminal also includes:
Judge binding module 40, for judging whether to obtain the configuration letter with described third party device certification
Breath, if can not obtain, then binds described third party device.
The judgement binding module 40 of first terminal obtains data to be encrypted, it may be judged whether can obtain with described
The configuration information of third party device certification, if can not obtain, then binds described third party device;If can obtain
Take, then according to the configuration information of the described certification obtained, described data to be encrypted are encrypted, raw
Become the first encryption data.
As described in Figure 18, Figure 18 is that the functional module of mobile terminal the 3rd embodiment that the present invention encrypts is shown
Being intended to, on the basis of first embodiment, described mobile terminal also includes:
First authentication information acquisition module 50, for obtaining the authentication information of the third party device of current connection;
First judges display module 60, for according to the described authentication information obtained, it is determined that described currently connect
Whether the third party device connect is the third party device of described binding, the most then show described first encryption
Data;If it is not, the most do not show described first encryption data.
Third party device is authenticated by the first authentication information acquisition module 50 of first terminal, and acquisition is worked as
The authentication information of the third party device of front connection.
First judgement display module 60 recognizing according to the current third party device connected obtained of first terminal
Card information, it is determined that whether the third party device connected before described is the third party device of described binding, if so,
Then the first encryption data is shown;If it is not, then described first encryption data is not shown.
The mobile terminal that the present embodiment provides, the certification of the current third party device connected by obtaining is believed
Breath, according to the described authentication information obtained, it is determined that whether the third party device of described current connection is described
The third party device of binding, the most then show the data of encryption, it is achieved data ciphering and deciphering is poor
Alienation, thus the protection of individual privacy when strengthening communication, communication encryption is served further consolidate and
Booster action.
As described in Figure 19, Figure 19 is that the functional module of mobile terminal the 4th embodiment that the present invention encrypts is shown
Being intended to, on the basis of the 3rd embodiment, described mobile terminal also includes:
Judge link block 70, for whether judging the third party device of described mobile terminal and described binding
Connecting, if be not connected with, the most described mobile terminal and described third party device are set up and are connected.
The judgement link block 70 of first terminal judges whether that the third party device with described binding is set up even
Connect, if do not set up connection, then set up with described third party device and connect.
As described in Figure 20, Figure 20 is that the functional module of mobile terminal the 5th embodiment that the present invention encrypts is shown
Being intended to, on the basis of the 3rd embodiment, described mobile terminal also includes:
Judge consistent module 61, for judging the 3rd of described current connection described in described authentication information
The configuration information of method, apparatus is the most consistent with the configuration information of described certification, if inconsistent time, then described work as
The third party device of front connection is not the third party device of described binding;If consistent time, the most described currently connect
The third party device connect is the third party device of described binding.
First terminal judge that consistent module 61 judges that the third party device that currently connects is whether as described binding
Third party device, if the configuration information of the current third party device connected that first terminal obtains is with local
The described certification that data base prestores accordant configuration information time, the third party device of the most described current connection
It it is the third party device of described binding;If time inconsistent, the third party device of the most described current connection is not
The third party device of described binding.
As described in Figure 21, Figure 21 is that the functional module of the mobile terminal sixth embodiment that the present invention encrypts is shown
Being intended to, on the basis of first embodiment, described mobile terminal also includes:
First secret key binding module 80, described as deciphering for the device id using described mobile terminal
First secret key of the first encryption data, and by described first encryption data and described first secret key binding;
Directive generation module 90, for described first encryption data according to binding, generates communication instruction,
Wherein, described communication instruction carries decipher the first secret key of described first encryption data.
First secret key binding module 80 of first terminal is using device id as the described first encryption number of deciphering
According to the first secret key, and by described first encryption data with described first secret key binding, wherein, described in set
Standby identification number is unique identification number, can be IMEI, IMSI, ESN or MEID.
The directive generation module 90 of first terminal, according to described first encryption data of binding, generates communication and refers to
Order, and described communication instruction is sent to the second terminal, wherein, described communication instruction carries deciphering
First secret key of described first encryption data, thus, communication instruction also passes through encryption, to guarantee to send out
Safety during sending.
The mobile terminal that the present embodiment provides, described as deciphering using the device id of described first terminal
First secret key of the first encryption data, and by described first encryption data and described first secret key binding, root
According to described first encryption data of binding, generate communication instruction, it is achieved data ciphering and deciphering differentiation, from
And strengthen the protection of individual privacy during communication, communication encryption is served and further consolidates and booster action.
As described in Figure 22, Figure 22 is that the functional module of mobile terminal the 7th embodiment that the present invention encrypts is shown
Being intended to, in the present embodiment, described mobile terminal includes:
Encrypted data reception module 100, for receiving the first encryption data that first terminal sends;
Second encryption data generation module 200, for obtaining the third party device with described mobile terminal binding
The configuration information of certification, is carried out described first encryption data according to the configuration information of the described certification obtained
Encryption, generates the second encryption data.
The encrypted data reception module 100 of the second terminal receives the first encryption number that first terminal sends over
According to.
Second encryption data generation module 200 of the second terminal obtain be stored in data base through described the
The configuration information of the third party device certification of one terminal binding, wherein, third party device can be wearable
Equipment, it is also possible to be other-end, configuration information can be MAC Address, it is also possible to be serial number etc..
Wearable device the most directly wears, or the one being incorporated into the clothes of user or accessory is portable to be set
Standby.Wearable device can be Intelligent bracelet, intelligent watch or intelligent glasses.The wearable of binding sets
Standby MAC Address can be Bluetooth address or WI-FI address.
The mobile terminal that the present embodiment provides, participates in ciphering process by third party device so that solve secret letter
Cease only the machine can solve, it is achieved data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication,
Communication encryption is served and further consolidates and booster action.
As described in Figure 23, Figure 23 is that the functional module of mobile terminal the 8th embodiment that the present invention encrypts is shown
Being intended to, on the basis of the 7th embodiment, described mobile terminal also includes:
Command reception module 300, for receive first terminal send with described first encryption data binding
Communication instruction;
Parsing module 400, is used for resolving described communication instruction, obtains and deciphers the of described first encryption data
One secret key;
Deciphering module 500, for according to described first secret key, is decrypted described first encryption data.
The command reception module 300 of the second terminal receives that first terminal sends over described first encryption
The communication instruction that data bind together.
The parsing module 400 of the second terminal carries out parsing to the described communication instruction received to be had, from described logical
News instruction obtains the first secret key deciphering described first encryption data.
The deciphering module 500 of the second terminal is according to obtaining described first encryption of deciphering from described communication instruction
First secret key of data, is decrypted described first encryption data.
As described in Figure 24, Figure 24 is that the functional module of mobile terminal the 9th embodiment that the present invention encrypts is shown
Being intended to, on the basis of the 7th embodiment, described mobile terminal also includes:
Second secret key binding module 600, described as deciphering for the device id using described mobile terminal
Second secret key of the second encryption data, and described second encryption data generated is added with deciphering described second
Second secret key of ciphertext data is bound.
Second secret key binding module 600 of the second terminal is using device id as described second encryption of deciphering
Second secret key of data, and by described second encryption data and described second secret key binding, wherein, described
Device id is unique identification number, can be IMEI, IMSI, ESN or MEID.
The mobile terminal that the present embodiment provides, described as deciphering using the device id of described second terminal
Second secret key of the second encryption data, and by described second encryption data and described second secret key binding, real
Existing data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication, play communication encryption
Further consolidation and booster action.
As described in Figure 25, Figure 25 is that the functional module of mobile terminal the tenth embodiment that the present invention encrypts is shown
Being intended to, on the basis of the 9th embodiment, described mobile terminal also includes:
Second authentication information acquisition module 700, is connected for setting up with current described third party device, obtains
Take the authentication information of the third party device of current connection;
Second judges display module 800, for according to described authentication information, it is determined that the current third party connected
Whether equipment is the described third party device bound, the most then show the second encryption data;If it is not, then
Do not show described second encryption data.
Second authentication information acquisition module 700 of the second terminal is set up even with current described third party device
Connecing, obtain the authentication information of the current third party device connected, described third party device can be wearable
Equipment.
Second judgement display module 800 of the second terminal is according to the current third party device connected obtained
Authentication information, it is determined that whether the current third party device connected is the described third party device bound, if
The described third party device of binding, then show the second encryption data;If not described the of binding
Three method, apparatus, then do not show described second encryption data.
The mobile terminal that the present embodiment provides, the certification of the current third party device connected by obtaining is believed
Breath, according to the described authentication information obtained, it is determined that whether the third party device of described current connection is described
The third party device of binding, the most then show the data of encryption, thus individual when strengthening communication
The protection of privacy, serves communication encryption and further consolidates and booster action.
As described in Figure 26, Figure 26 is the functional module of mobile terminal the 11st embodiment that the present invention encrypts
Schematic diagram, on the basis of the 8th embodiment, described mobile terminal also includes:
Destroy module 900, for the described communication instruction resolved is destroyed.
The described communication instruction that the first terminal received is sended over by the destruction module 900 of the second terminal enters
After row resolves, obtain the first secret key deciphering described first encryption data.After obtaining the first secret key, to solution
The described communication instruction of analysis is destroyed, i.e. this parsing is used only once.
The mobile terminal that the present embodiment provides, by obtaining the first secret key deciphering described first encryption data
After, the described communication instruction resolved is destroyed, thus the protection of individual privacy when strengthening communication, right
Communication encryption serves further to be consolidated and booster action.
As described in Figure 27, Figure 27 is that the functional module of the mobile terminal first embodiment that the present invention deciphers is shown
Being intended to, in the first embodiment, described mobile terminal includes:
Configuration information receiver module 1000, is used for receiving encryption data, and acquisition is returned with described encryption data
The configuration information of the third party device certification sending terminal binding belonged to;
Encryption data deciphering module 2000, for the configuration information according to the described certification obtained, to described
Encryption data is decrypted.
The configuration information receiver module 1000 of mobile terminal receives and sends the encryption data that terminal sends over,
And obtain the configuration information of the third party device certification sending terminal binding belonged to described encryption data.
Wherein, third party device can be wearable device, it is also possible to be other-end, and configuration information can be
MAC Address, it is also possible to be serial number etc..Wearable device the most directly wears, or is incorporated into use
The clothes at family or a kind of portable set of accessory.Wearable device can be Intelligent bracelet, intelligent watch
Or intelligent glasses.The MAC Address of the wearable device of binding can be Bluetooth address or WI-FI
Address.
The encryption data deciphering module 2000 of mobile terminal is according to sending in the encryption data that terminal sends over
Through the configuration information of the third party device certification sending terminal binding that described encryption data belongs to, to described
Encryption data is decrypted.
The mobile terminal that the present embodiment provides, participates in ciphering process by third party device so that solve secret letter
Cease only the machine can solve, it is achieved data ciphering and deciphering differentiation, thus the protection of individual privacy when strengthening communication,
Communication encryption is served and further consolidates and booster action.
As described in Figure 28, Figure 27 is that the functional module of mobile terminal the second embodiment that the present invention deciphers is shown
Being intended to, on the basis of first embodiment, described mobile terminal also includes:
Second authentication information acquisition module 3000, for obtaining the certification letter of the third party device of current connection
Breath;
Judge display module 4000, for the certification of the third party device according to the described current connection obtained
Information, it is determined that whether the current third party device connected is the third party device bound, the most then show
Described encryption data;If it is not, the most do not show described encryption data.
Second authentication information acquisition module 3000 of mobile terminal obtains recognizing of the third party device of current connection
Card information.Wherein, third party device can be wearable device, it is also possible to be other-end.
Mobile terminal judge the display module 4000 third party device according to the described current connection obtained
Authentication information, it is determined that whether the current third party device connected is the third party device bound, if binding
Third party device, then described encryption data is shown;If not the third party device of binding, then
Described encryption data is not shown.
The mobile terminal that the present embodiment provides, the certification of the current third party device connected by obtaining is believed
Breath, according to the described authentication information obtained, it is determined that whether the third party device of described current connection is described
The third party device of binding, the most then show the data of encryption, thus individual when strengthening communication
The protection of privacy, serves communication encryption and further consolidates and booster action.
As described in Figure 29, Figure 29 is that the functional module of mobile terminal the 3rd embodiment that the present invention deciphers is shown
Being intended to, on the basis of first embodiment, described mobile terminal also includes:
Secret key deciphering module 5000, for obtaining the described encryption data of deciphering of binding in described encryption data
Secret key, to display described encryption data be decrypted.
The secret key deciphering module 5000 of mobile terminal obtains the described encryption of deciphering of binding in described encryption data
The secret key of data, according to described secret key, is decrypted the described encryption data of display.
As described in Figure 30, Figure 30 is that the functional module of mobile terminal the 4th embodiment that the present invention deciphers is shown
Being intended to, on the basis of first embodiment, described mobile terminal also includes:
Receiving and deciphering module 6000, is used for receiving communication instruction, and the transmission carried by described communication instruction
Described encryption data, as the first secret key of the described encryption data of deciphering, is carried out by the device id of terminal
Deciphering.
The receiving and deciphering module 6000 of mobile terminal receives and sends the communication instruction that terminal sends over, and will
The device id of the transmission terminal that described communication instruction carries is close as decipher described encryption data first
Spoon, is decrypted described encryption data.Wherein, the device id of described transmission terminal, for uniquely
Identification number, can be IMEI, IMSI, ESN or MEID.
The mobile terminal that the present embodiment provides, described as deciphering using the device id of described transmission terminal
The secret key of encryption data, it is achieved data ciphering and deciphering differentiation, thus the guarantor of individual privacy when strengthening communication
Protect, communication encryption is served and further consolidates and booster action.
These are only the preferred embodiments of the present invention, not thereby limit the scope of the claims of the present invention, every
Utilize equivalent structure or equivalence flow process conversion that description of the invention and accompanying drawing content made, or directly or
Connect and be used in other relevant technical fields, be the most in like manner included in the scope of patent protection of the present invention.
Claims (30)
1. an encryption method, it is characterised in that described encryption method comprises the following steps:
First terminal obtains data to be encrypted and the third party device certification bound with described first terminal
Configuration information;
According to the configuration information of the described certification obtained, described data to be encrypted are encrypted, generate
First encryption data;
Described first encryption data generated is transmitted.
2. encryption method as claimed in claim 1, it is characterised in that described first terminal obtains to be added
The step of the configuration information of the third party device certification bound after close data and with described first terminal
The most also include:
Judge whether to obtain the configuration information with described third party device certification, if can not obtain, then tie up
Fixed described third party device.
3. encryption method as claimed in claim 1, it is characterised in that described will generate described first
Also include before the step that encryption data is transmitted:
Obtain the authentication information of the current third party device connected;
According to the described authentication information obtained, it is determined that whether the third party device of described current connection is described
The third party device of binding, the most then show described first encryption data;If it is not, the most do not show described
First encryption data.
4. encryption method as claimed in claim 3, recognizing of the third party device that described acquisition currently connects
Also include before the step of card information:
Judge whether the third party device of described first terminal and described binding connects, if be not connected with, then
Described first terminal and described third party device are set up and are connected.
5. encryption method as claimed in claim 3, it is characterised in that described recognize according to obtaining
Card information, it is determined that whether the third party device of described current connection is the step of the third party device of described binding
Suddenly include:
Judge configuration information and the institute of the third party device of described current connection described in described authentication information
Whether the configuration information stating certification consistent, if inconsistent time, the third party device of the most described current connection is not
It it is the third party device of described binding;If time consistent, the third party device of the most described current connection is described
The third party device of binding.
6. the encryption method as described in any one of claim 1 to 5, it is characterised in that described by described
Also include before the step that first encryption data is transmitted:
Using the device id of described first terminal as deciphering the first secret key of described first encryption data,
And by described first encryption data and described first secret key binding;
According to described first encryption data of binding, generate communication instruction, wherein, in described communication instruction
Carry the first secret key deciphering described first encryption data.
7. an encryption method, it is characterised in that described encryption method comprises the following steps:
Second terminal receives the first encryption data that first terminal sends;
The configuration information of the third party device certification of acquisition and described mobile terminal binding, according to the institute obtained
Described first encryption data is encrypted by the configuration information stating certification, generates the second encryption data.
8. encryption method as claimed in claim 7, it is characterised in that described acquisition and described mobile terminal
The configuration information of third party device certification of binding, according to the configuration information of the described certification obtained to described
First encryption data is encrypted, and also includes before generating the step of the second encryption data:
Described second terminal receives the communication with described first encryption data binding of first terminal transmission and refers to
Order;
Resolve described communication instruction, obtain the first secret key deciphering described first encryption data;
According to described first secret key, described first encryption data is decrypted.
9. encryption method as claimed in claim 7, it is characterised in that described acquisition and described mobile terminal
The configuration information of third party device certification of binding, according to the configuration information of the described certification obtained to described
First encryption data is encrypted, and also includes after generating the step of the second encryption data:
Using the device id of described second terminal as deciphering the second secret key of described second encryption data,
And described second encryption data generated and the second secret key deciphering described second encryption data are tied up
Fixed.
10. encryption method as claimed in claim 9, it is characterised in that described with described second terminal
Device id as decipher described second encryption data the second secret key, and will generate described second
Encryption data and the second secret key deciphering described second encryption data also include after carrying out the step bound:
Set up with current described third party device and be connected, obtain the certification of the current third party device connected
Information;
According to described authentication information, it is determined that whether the current third party device connected is the described 3rd of binding
Method, apparatus, the most then show the second encryption data;If it is not, the most do not show described second encryption data.
11. encryption methods as described in any one of claim 8 to 10, it is characterised in that described parsing
Described communication instruction, also includes after obtaining the step of the first secret key deciphering described first encryption data:
The described communication instruction resolved is destroyed.
12. 1 kinds of decryption methods, it is characterised in that described decryption method comprises the following steps:
Receive encryption data, and the third party obtaining the transmission terminal binding with described encryption data ownership sets
The configuration information of standby certification;
According to the configuration information of the described certification obtained, described encryption data is decrypted.
13. decryption methods as claimed in claim 12, it is characterised in that described according to described in acquisition
The configuration information of certification, before the step be decrypted also included described encryption data:
Obtain the authentication information of the current third party device connected;
The authentication information of third party device according to the described current connection obtained, it is determined that current connect the
Whether three method, apparatus are the third party device bound, the most then show described encryption data;If it is not, then
Do not show described encryption data.
14. decryption methods as claimed in claim 12, it is characterised in that described according to described in acquisition
The configuration information of certification, after the step be decrypted also included described encryption data:
Obtain the secret key deciphering described encryption data of binding in described encryption data, add described in display
Ciphertext data is decrypted.
15. decryption methods as described in any one of claim 12 to 14, it is characterised in that described
According to the configuration information of the described certification obtained, is also included before the step that described encryption data is decrypted:
Receive communication instruction, and the device id of the transmission terminal carried by described communication instruction is as solution
First secret key of close described encryption data, is decrypted described encryption data.
The mobile terminal of 16. 1 kinds of encryptions, it is characterised in that described mobile terminal includes:
Configuration information acquisition module, for obtaining data to be encrypted and through described mobile terminal binding
The configuration information of third party device certification;
First encryption data generation module, for the configuration information according to the described certification obtained, to described
Data to be encrypted are encrypted, and generate the first encryption data;
Sending module, for being transmitted described first encryption data generated.
17. mobile terminals as claimed in claim 16, it is characterised in that described mobile terminal also includes:
Judge binding module, for judging whether to obtain the configuration information with described third party device certification,
If can not obtain, then bind described third party device.
18. mobile terminals as claimed in claim 16, it is characterised in that described mobile terminal also includes:
First authentication information acquisition module, for obtaining the authentication information of the third party device of current connection;
First judges display module, for according to the described authentication information obtained, it is determined that described current connection
Third party device be whether the third party device of described binding, the most then show described first encryption number
According to;If it is not, the most do not show described first encryption data.
19. mobile terminals as claimed in claim 18, it is characterised in that described mobile terminal also includes:
Judge link block, for judging whether the third party device of described mobile terminal and described binding connects
Connecing, if be not connected with, the most described mobile terminal and described third party device are set up and are connected.
20. mobile terminals as claimed in claim 18, it is characterised in that described mobile terminal also includes:
Judge consistent module, for judging the third party of the described current connection described in described authentication information
The configuration information of equipment is the most consistent with the configuration information of described certification, if inconsistent time, the most described currently
The third party device connected is not the third party device of described binding;If time consistent, the most described current connection
Third party device be the third party device of described binding.
21. mobile terminals as described in any one of claim 16 to 20, it is characterised in that described shifting
Dynamic terminal also includes:
First secret key binding module, for using the device id of described mobile terminal as deciphering described the
First secret key of one encryption data, and by described first encryption data and described first secret key binding;
Directive generation module, for described first encryption data according to binding, generates communication instruction, its
In, described communication instruction carries the first secret key deciphering described first encryption data.
The mobile terminal of 22. 1 kinds of encryptions, it is characterised in that described mobile terminal includes:
Encrypted data reception module, for receiving the first encryption data that first terminal sends;
Second encryption data generation module, the third party device certification of acquisition and described mobile terminal binding
Configuration information, is encrypted described first encryption data according to the configuration information of the described certification obtained,
Generate the second encryption data.
23. mobile terminals as claimed in claim 22, it is characterised in that described mobile terminal also includes:
Command reception module, for receiving the logical with what described first encryption data was bound of first terminal transmission
News instruction;
Parsing module, is used for resolving described communication instruction, obtains and deciphers the first of described first encryption data
Secret key;
Deciphering module, for according to described first secret key, is decrypted described first encryption data.
24. mobile terminals as claimed in claim 22, it is characterised in that described mobile terminal also includes:
Second secret key binding module, for using the device id of described mobile terminal as deciphering described the
Second secret key of two encryption datas, and described second encryption data second encryption described with deciphering that will generate
Second secret key of data is bound.
25. mobile terminals as claimed in claim 24, it is characterised in that described mobile terminal also includes:
Authentication information acquisition module, is connected for setting up with current described third party device, obtains current
The authentication information of the third party device connected;
Second judges display module, for according to described authentication information, it is determined that the current third party connected sets
Whether standby be the described third party device bound, the most then show the second encryption data;If it is not, the most not
Show described second encryption data.
26. mobile terminals as described in any one of claim 23 to 25, it is characterised in that described shifting
Dynamic terminal also includes:
Destroy module, for the described communication instruction resolved is destroyed.
The mobile terminal of 27. 1 kinds of deciphering, it is characterised in that described mobile terminal includes:
Configuration information receiver module, is used for receiving encryption data, and obtains and described encryption data ownership
Send the configuration information of the third party device certification of terminal binding;
Encryption data deciphering module, for the configuration information according to the described certification obtained, to described encryption
Data are decrypted.
28. mobile terminals as claimed in claim 27, it is characterised in that described mobile terminal also includes:
Second authentication information acquisition module, for obtaining the authentication information of the third party device of current connection;
Judge display module, for the authentication information of the third party device according to the described current connection obtained,
Judge that the third party device of current connection whether as the third party device of binding, the most then adds described in display
Ciphertext data;If it is not, the most do not show described encryption data.
29. mobile terminals as claimed in claim 27, it is characterised in that described mobile terminal also includes:
Secret key deciphering module, for obtaining the close of the described encryption data of deciphering of binding in described encryption data
Spoon, is decrypted the described encryption data of display.
30. mobile terminals as described in any one of claim 26 to 29, it is characterised in that described shifting
Dynamic terminal also includes:
Receiving and deciphering module, is used for receiving communication instruction, and the transmission terminal carried by described communication instruction
Device id as decipher described encryption data the first secret key, described encryption data is decrypted.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510145893.3A CN106162621A (en) | 2015-03-30 | 2015-03-30 | communication encryption, decryption method and mobile terminal |
PCT/CN2015/086510 WO2016155185A1 (en) | 2015-03-30 | 2015-08-10 | Communication encryption and decryption method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510145893.3A CN106162621A (en) | 2015-03-30 | 2015-03-30 | communication encryption, decryption method and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106162621A true CN106162621A (en) | 2016-11-23 |
Family
ID=57003933
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510145893.3A Withdrawn CN106162621A (en) | 2015-03-30 | 2015-03-30 | communication encryption, decryption method and mobile terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106162621A (en) |
WO (1) | WO2016155185A1 (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159907A (en) * | 2007-11-20 | 2008-04-09 | 青岛海信移动通信技术股份有限公司 | Method and system of encrypting multimode mobile communication terminal |
CN101567788A (en) * | 2009-04-15 | 2009-10-28 | 长沙理工大学 | Method for even exchange of signature data for resisting attack of ring enlargement |
CN102932762A (en) * | 2012-09-20 | 2013-02-13 | 无锡华御信息技术有限公司 | Remote centralized management control encryption system and method for mobile storage equipment based on global system for mobile communication (GSM) |
US20130080777A1 (en) * | 2011-09-23 | 2013-03-28 | CSC Holdings, LLC | Delivering A Content Item From A Server To A Device |
CN103856938A (en) * | 2012-12-04 | 2014-06-11 | 中兴通讯股份有限公司 | Encryption and decryption method, system and device |
CN104244237A (en) * | 2014-09-12 | 2014-12-24 | 宇龙计算机通信科技(深圳)有限公司 | Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102110218A (en) * | 2011-02-22 | 2011-06-29 | 康佳集团股份有限公司 | Mobile-phone-information-encryption-based authentication method |
CN103037366B (en) * | 2011-09-30 | 2016-10-26 | 卓望数码技术(深圳)有限公司 | Mobile phone users authentication method based on asymmetric cryptographic technique and mobile terminal |
-
2015
- 2015-03-30 CN CN201510145893.3A patent/CN106162621A/en not_active Withdrawn
- 2015-08-10 WO PCT/CN2015/086510 patent/WO2016155185A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159907A (en) * | 2007-11-20 | 2008-04-09 | 青岛海信移动通信技术股份有限公司 | Method and system of encrypting multimode mobile communication terminal |
CN101567788A (en) * | 2009-04-15 | 2009-10-28 | 长沙理工大学 | Method for even exchange of signature data for resisting attack of ring enlargement |
US20130080777A1 (en) * | 2011-09-23 | 2013-03-28 | CSC Holdings, LLC | Delivering A Content Item From A Server To A Device |
CN102932762A (en) * | 2012-09-20 | 2013-02-13 | 无锡华御信息技术有限公司 | Remote centralized management control encryption system and method for mobile storage equipment based on global system for mobile communication (GSM) |
CN103856938A (en) * | 2012-12-04 | 2014-06-11 | 中兴通讯股份有限公司 | Encryption and decryption method, system and device |
CN104244237A (en) * | 2014-09-12 | 2014-12-24 | 宇龙计算机通信科技(深圳)有限公司 | Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set |
Also Published As
Publication number | Publication date |
---|---|
WO2016155185A1 (en) | 2016-10-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101662765B (en) | Encryption system and method of short message of mobile telephone | |
US5455863A (en) | Method and apparatus for efficient real-time authentication and encryption in a communication system | |
CN110365484B (en) | Data processing method, device and system for equipment authentication | |
JP4263384B2 (en) | Improved method for authentication of user subscription identification module | |
US10003965B2 (en) | Subscriber profile transfer method, subscriber profile transfer system, and user equipment | |
CN106161359B (en) | It authenticates the method and device of user, register the method and device of wearable device | |
CN108471610B (en) | Bluetooth connection control system | |
CN105959189A (en) | Home appliance equipment, communication system and method of cloud server and terminal, and terminal | |
CN107006049A (en) | A kind of smart machine and its set up the method for equipment room bluetooth connection, device | |
CN105871920A (en) | Communication system and method of terminal and cloud server as well as terminal and cloud server | |
CN105553932A (en) | Method, device and system of remote control safety binding of intelligent home appliance | |
CN105814859B (en) | A kind of network collocating method, relevant apparatus and system | |
CN102318386A (en) | Service-based authentication to a network | |
CN105516103A (en) | Method, device and system for binding intelligent household electrical appliances | |
CN104484596A (en) | Method and terminal for creating password in multi-operation system | |
CN106792700A (en) | The method for building up and system of a kind of secure communication environment of wearable device | |
CN105451298A (en) | Network-sharing method and system, network access method and system, and electronic device | |
CN105376059A (en) | Method and system for performing application signature based on electronic key | |
JP2017509197A (en) | WIRELESS COMMUNICATION METHOD, WIRELESS COMMUNICATION DEVICE AND ITS APPLICATION SYSTEM AND DEVICE | |
CN108306793B (en) | Intelligent device, intelligent home gateway, and method and system for establishing connection | |
CN104796262B (en) | Data ciphering method and terminal system | |
CN104754496A (en) | Smart household device connecting method and smart terminal | |
CN105873059A (en) | Joint identity authentication method and system for power distribution communication wireless private network | |
US11076282B2 (en) | Telecommunications apparatus with a radio-linked smart card | |
CN106162621A (en) | communication encryption, decryption method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20161123 |
|
WW01 | Invention patent application withdrawn after publication |