[go: up one dir, main page]

CN106162622A - A kind of method realizing data process and terminal - Google Patents

A kind of method realizing data process and terminal Download PDF

Info

Publication number
CN106162622A
CN106162622A CN201510165713.8A CN201510165713A CN106162622A CN 106162622 A CN106162622 A CN 106162622A CN 201510165713 A CN201510165713 A CN 201510165713A CN 106162622 A CN106162622 A CN 106162622A
Authority
CN
China
Prior art keywords
differential
terminal
encryption
decryption
communication information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201510165713.8A
Other languages
Chinese (zh)
Inventor
魏明业
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510165713.8A priority Critical patent/CN106162622A/en
Priority to PCT/CN2015/084834 priority patent/WO2016161717A1/en
Publication of CN106162622A publication Critical patent/CN106162622A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a kind of method realizing data process and terminal, including: terminal carries out differentiation encryption by differentiation mark to the communication information obtained;During display communication information, carry out differentiation deciphering.The inventive method uses differentiation mark to carry out differentiation encryption by terminal, is only just shown by differentiation deciphering, it is achieved that the personal secrets protection of the communication information;It addition, the communication information that differentiation is encrypted to be saved in the secure memory space of terminal, further increase the safety of the communication information.

Description

Method and terminal for realizing data processing
Technical Field
The present invention relates to data communication technologies, and in particular, to a method, a terminal, and a system for implementing data processing.
Background
With the continuous development of wireless communication application technology, the requirement of a user on the protection of personal privacy is higher and higher, and in order to protect the personal privacy of the user, data processing is generally performed on information related to the privacy; privacy is of particular concern for communication applications that are used for user communication, such as communication information related to personal privacy in instant messaging applications.
Taking instant messaging as an example, the communication information is encrypted universally by adopting the existing encryption method, and after the universally encrypted communication information is stored at a sending end, the communication information is obtained by universal decryption; and after receiving the communication information of the general encryption, the receiving end adopts general decryption to realize decryption. The communication information is encrypted by adopting a general encryption mode, and the decryption of the communication information can be realized when the general encrypted communication information is copied to any terminal capable of general decryption. Although the encryption meets the requirement of privacy protection to a certain extent, any decryptable terminal can decrypt the encryption, and the security protection of the privacy is seriously influenced. Therefore, a method is needed to handle user privacy more securely.
Disclosure of Invention
In order to solve the above technical problems, the present invention provides a method and a terminal for implementing data processing, which can reliably meet the requirement of the terminal on security protection of privacy.
In order to achieve the object of the present invention, the present invention provides a method for implementing data processing, comprising:
the terminal carries out differential encryption on the obtained communication information through the differential identification;
and when the communication information is displayed, differential decryption is performed.
Further, performing differential encryption by using the differential identifier of the terminal as an encryption parameter;
the differentiation identification is the unique identification of the terminal or the unique identification of a subscriber identity module SIM card loaded by the terminal.
Further, when the differentiated identifier is a unique identifier of a terminal, the unique identifier of the terminal is: the international identity code IMEI or the physical address MAC of the mobile equipment;
when the differentiated identifier is the unique identifier of the subscriber identity module SIM card loaded by the terminal, the unique identifier of the terminal is as follows: the international mobile subscriber identity IMSI number of the SIM card.
Further, the method further comprises: and storing the communication information which is subjected to differential encryption in a safe storage space of the terminal.
Further, the secure storage is controlled not to mount a storage space that is readable and writable.
Further, when the terminal is a transmitting end,
the differential encryption specifically includes:
and after the transmitting end carries out general encryption on the input communication information, carrying out differentiated encryption on the transmitting end.
Further, when the terminal is a receiving end, the performing differential encryption specifically includes:
and the receiving end carries out receiving end differential encryption on the received general encrypted encryption information.
Further, when the terminal is a receiving end, the performing differential encryption specifically includes:
and after the receiving end decrypts the communication information differentially encrypted by the sending end, the receiving end differentially encrypts the decrypted communication information.
Further, before the receiving end decrypts the differentially encrypted communication information of the sending end, the method further includes:
and the receiving end receives decryption information for decrypting the differential encryption of the sending end when receiving the communication information differentially encrypted by the sending end, so that the communication information differentially encrypted by the sending end is decrypted according to the decryption information differentially encrypted by the decryption sending end.
Further, the method further comprises: deleting the universally encrypted communication information after completing the differentiated encryption of the universally encrypted communication information.
Further, the method further comprises: and after the receiving end decrypts the communication information differentially encrypted by the sending end, deleting the decryption information for decrypting the differential encryption of the sending end.
Further, before differential decryption, the method further comprises:
presetting a differential decryption matching instruction, and when the input differential decryption matching instruction is the same as the preset differential decryption matching instruction, allowing the communication information to be displayed for differential decryption; and when the input differentiation decryption matching instruction is different from the preset differentiation decryption matching instruction, carrying out differentiation decryption when the communication information is refused to be displayed.
On the other hand, the application also provides a terminal for realizing data processing, which comprises a differentiation encryption unit and a decryption display unit; wherein,
the differential encryption unit is used for carrying out differential encryption on the obtained communication information through the differential identification;
and the decryption display unit is used for carrying out differential decryption when the communication information is displayed.
Further, the differentiated encryption unit is specifically configured to encrypt the obtained communication information with the differentiated identifier of the terminal as an encryption parameter;
the differentiation identification is the unique identification of the terminal or the unique identification of a subscriber identity module SIM card loaded by the terminal.
Further, the differential encryption unit is specifically configured to encrypt the obtained communication information with an IMEI or a MAC address of the terminal or an IMSI number of an SIM card loaded by the terminal as the differential identifier and with the differential identifier as the encryption parameter.
Further, the terminal also comprises an information storage unit, which is used for storing the differentially encrypted communication information finished by the differential decryption unit in a safe storage space.
Further, when the terminal is a sending end, the differentiated encryption unit is specifically configured to,
and after the input communication information is subjected to general encryption, the differential encryption of the sending end is carried out.
Further, when the terminal is a receiving end, the differentiated encryption unit is specifically configured to,
and carrying out receiving end differential encryption on the received general encrypted encryption information.
Further, when the terminal is a receiving end, the differentiated encryption unit is specifically configured to,
and after the communication information differentially encrypted by the sending end is decrypted, the decrypted communication information is differentially encrypted by the receiving end.
Further, when the terminal is a receiving end, the terminal further comprises a receiving unit,
the differential encryption unit is used for receiving the communication information sent by the sending end and receiving the decryption information used for decrypting the differential encryption of the sending end at the same time, so that the differential encryption unit decrypts the communication information sent by the differential encryption according to the decryption information differentially encrypted by the decryption sending end.
Further, when the terminal further includes a first deleting unit, configured to delete the universally encrypted communication information after completing the differential encryption of the universally encrypted communication information.
Further, when the terminal is a receiving terminal, the terminal further includes a second deleting unit, configured to delete the decryption information for decrypting the differential encryption of the sending terminal after the differential encryption unit decrypts the communication information differentially encrypted by the sending terminal.
The terminal further comprises a setting unit, a processing unit and a display unit, wherein the setting unit is used for presetting a differential decryption matching instruction, and before differential decryption is carried out, when the input differential decryption matching instruction is the same as the preset differential decryption matching instruction, differential decryption is carried out when communication information is allowed to be displayed; and when the input differentiation decryption matching instruction is different from the preset differentiation decryption matching instruction, carrying out differentiation decryption when the communication information is refused to be displayed.
Compared with the prior art, the technical scheme of the application comprises the following steps: the terminal carries out differential encryption on the obtained communication information through the differential identification; and when the communication information is displayed, differential decryption is performed. The method of the invention adopts the differentiated identification to carry out differentiated encryption through the terminal, and only the differentiated decryption is used for displaying, thereby realizing the privacy safety protection of the communication information; in addition, the differentially encrypted communication information is stored in the safe storage space of the terminal, so that the safety of the communication information is further improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a flow chart of a method of implementing data processing in accordance with the present invention;
FIG. 2 is a block diagram of a terminal for implementing data processing according to the present invention;
FIG. 3 is a flowchart of a method according to a first embodiment of the present invention;
FIG. 4 is a flowchart of a method according to a second embodiment of the present invention;
FIG. 5 is a block diagram of a system according to a second embodiment of the present invention;
FIG. 6 is a flowchart of a method according to a third embodiment of the present invention;
FIG. 7 is a flowchart of a method according to a fourth embodiment of the present invention;
fig. 8 is a block diagram showing a system according to a fourth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted that the embodiments and features of the embodiments in the present application may be arbitrarily combined with each other without conflict.
Fig. 1 is a flowchart of a method for implementing data processing according to the present invention, as shown in fig. 1, including:
step 100, the terminal carries out differential encryption on the obtained communication information through differential identification;
in the step, the differential encryption is carried out by taking the differential identifier of the terminal as an encryption parameter;
the differentiated identification is a unique identification of the terminal or a unique identification of a Subscriber Identity Module (SIM) card loaded by the terminal.
Preferably, when the differentiation identifier is a unique identifier of the terminal, the unique identifier of the terminal is: a mobile equipment international identity (IMEI) or physical address (MAC) address;
when the differentiation identifier is the unique identifier of the subscriber identity module SIM card loaded by the terminal, the unique identifier of the terminal is as follows: the International Mobile Subscriber Identity (IMSI) number of the SIM card.
The method of the invention also comprises the following steps: and storing the communication information which is subjected to differential encryption in a safe storage space of the terminal. In particular, the method comprises the following steps of,
the secure storage space is a storage space which cannot be mounted to be readable and writable. For example, a high-pass chip itself has a Secure File System (SFS) area, which is a portion of the inaccessible memory partitioned from an Embedded File System (EFS) area. If the terminal is the system terminal, a small section of area is divided from a memory area of the terminal to serve as an un-suspended file system (umount) area, and the small section of area serves as a security domain of the terminal, and the security domain of the terminal cannot perform mount operation, namely cannot be mounted to be readable and writable. The dual-system terminal has two independent memory spaces, and one of the two memory spaces is selected as a safe storage space. The safe storage space is used for storing the communication information for differential encryption, and the safety of the communication information for differential encryption is ensured.
The step 100 of differentially encrypting the obtained communication information specifically includes:
according to the scheme 1, when the terminal is a sending end, the sending end carries out general encryption on input communication information and then carries out differentiated encryption on the sending end.
When the terminal is a receiving end, the differential encryption specifically comprises the following steps:
and the receiving end carries out receiving end differential encryption on the received general encrypted encryption information.
It should be noted that the sending end and the receiving end in scheme 1 may be compatible with a terminal that performs general encryption on communication information in the prior art, and the terminal may be used as both the sending end and the receiving end to perform differential encryption on communication information, or may be used as only the sending end or the receiving end to perform differential encryption.
When the scheme 1 is adopted, the method further comprises the following steps: and deleting the universally encrypted communication information after completing the differential encryption of the universally encrypted communication information.
It should be noted that, in the actual application terminal, the transmitting end performs differential encryption, and the receiving end still performs encryption only in the general encryption manner, and at this time, the receiving end is a terminal in the prior art, and can be used with the transmitting end in the scheme of the present invention, and there is no conflict.
And 2, when the terminal is a sending end, the sending end directly carries out sending end differential encryption on the input communication information.
When the terminal is a receiving end, the receiving end decrypts the communication information differentially encrypted by the transmitting end, and then performs receiving end differential encryption on the decrypted communication information.
Further, in the scheme 2, before the receiving end decrypts the differentially encrypted communication information of the sending end, the method further includes:
when receiving the communication information differentially encrypted by the sending end, the receiving end receives decryption information for decrypting the differential encryption of the sending end so as to decrypt the communication information differentially encrypted by the sending end according to the decryption information differentially encrypted by the decryption sending end.
After the receiving end decrypts the differentially encrypted communication information of the sending end, the method further comprises the following steps: and deleting decryption information used for decrypting the differential encryption of the sending end.
It should be noted that, after deleting the general encrypted communication information or the decryption information for decrypting the differential encryption of the sending end in the schemes 1 and 2, only the differential encryption information encrypted with the unique identifier of the terminal or the unique identifier of the SIM card of the subscriber identity module loaded on the terminal as the encryption parameter is finally stored in both the sending end and the receiving end, that is, after the differential encryption of the communication information, the decryption information with the unique identifier as the encryption parameter can only be used by the terminal conforming to the unique identifier to realize the decryption of the communication information. Therefore, the privacy and safety of the communication information are ensured.
And 101, carrying out differential decryption when the communication information is displayed.
Before differential decryption, the method of the present invention further comprises:
presetting a differential decryption matching instruction, and when the input differential decryption matching instruction is the same as the preset differential decryption matching instruction, allowing the communication information to be displayed for differential decryption; and when the input differentiation decryption matching instruction is different from the preset differentiation decryption matching instruction, carrying out differentiation decryption when the communication information is refused to be displayed.
It should be noted that the differentiated decryption matching instruction is preset to be similar to the unlocking instruction of the terminal, and the privacy and safety of the terminal communication information are further ensured by performing the matching authentication on the differentiated decryption matching instruction on the terminal.
Fig. 2 is a block diagram of a terminal for implementing data processing according to the present invention, as shown in fig. 2, including: a differentiation encryption unit and a decryption display unit; wherein,
the differential encryption unit is used for carrying out differential encryption on the obtained communication information through the differential identification;
and the decryption display unit is used for carrying out differential decryption when the communication information is displayed.
The differentiation encryption unit is specifically used for encrypting the obtained communication information by taking the differentiation identifier of the terminal as an encryption parameter;
the differentiated identification is the unique identification of the terminal or the unique identification of a Subscriber Identity Module (SIM) card loaded by the terminal.
Preferably, the differential encryption unit is specifically configured to encrypt the obtained communication information with an IMEI or a MAC address of the terminal or an IMSI number of an SIM card loaded by the terminal as the differential identifier and with the differential identifier as the encryption parameter.
The terminal also comprises an information storage unit which is used for storing the communication information which is encrypted in a differentiation way and is completed by the differentiation decryption unit in a safe storage space.
When the terminal is the sending end, the differentiated encryption unit is specifically used for,
and after the input communication information is subjected to general encryption, the differential encryption of the sending end is carried out.
When the terminal is a receiving end, the differentiated encryption unit is specifically configured to,
and carrying out receiving end differential encryption on the received general encrypted encryption information.
Further, the terminal further comprises a first deleting unit, configured to delete the universally encrypted communication information after completing the differential encryption of the universally encrypted communication information.
When the terminal is the receiving end, the differentiated encryption unit is specifically used for,
and after the communication information differentially encrypted by the sending end is decrypted, the decrypted communication information is differentially encrypted by the receiving end.
When the terminal is a receiving end, the terminal further includes a receiving unit,
the differential encryption unit is used for receiving the communication information sent by the sending end and receiving the decryption information used for decrypting the differential encryption of the sending end at the same time, so that the differential encryption unit decrypts the communication information sent by the differential encryption according to the decryption information differentially encrypted by the decryption sending end.
When the terminal is the receiving terminal, the terminal further comprises a second deleting unit, which is used for deleting the decryption information used for decrypting the differential encryption of the sending terminal after the differential encryption unit decrypts the communication information differentially encrypted by the sending terminal.
The terminal also comprises a setting unit, a processing unit and a display unit, wherein the setting unit is used for presetting a differential decryption matching instruction, and before differential decryption is carried out, when the input differential decryption matching instruction is the same as the preset differential decryption matching instruction, differential decryption is carried out when communication information is allowed to be displayed; and when the input differentiation decryption matching instruction is different from the preset differentiation decryption matching instruction, carrying out differentiation decryption when the communication information is refused to be displayed.
For example, before viewing the communication information and performing differentiation, if the terminal sets a differentiation decryption matching instruction in advance, when the terminal views the signal of the communication information, the terminal first verifies the differentiation decryption matching instruction (for example, a password), and when the input differentiation decryption matching instruction is the same as the preset differentiation decryption matching instruction, differentiation decryption is performed when the communication information is allowed to be displayed; and when the input differentiation decryption matching instruction is different from the preset differentiation decryption matching instruction, carrying out differentiation decryption when the communication information is refused to be displayed.
It should be noted that the unit of the sending end and the unit of the receiving end of the present invention may be integrated in the same terminal, so as to form a terminal that performs differential encryption on both the sent communication information and the received communication information.
The process of the present invention is illustrated in clear detail below by means of specific examples, which are only intended to illustrate the invention and are not intended to limit the scope of the process of the invention.
Example 1
Fig. 3 is a flowchart of a method according to a first embodiment of the present invention, as shown in fig. 3, including:
and step 300, the terminal acquires the communication information input by the user, and performs universal encryption on the communication information to acquire the universal encrypted communication information.
Here, the general encryption scheme is a conventional technique known to those skilled in the art, and the general encrypted communication information can be decrypted by all terminals having a general decryption function.
301, carrying out differential encryption on the general encrypted communication information; specifically, the unique identifier of the terminal or the unique identifier of the SIM card loaded by the terminal is used as an encryption parameter for encryption, that is, only the terminal with the same unique identifier is configured to perform the decryption process.
It should be noted that, in practical applications, the unique identification information is generally encoded and decoded accordingly, i.e., no plaintext is used for display.
Step 302, after completing the differential encryption, the terminal deletes the communication information of the universal encryption; that is, only the differentially encrypted communication information is stored in the terminal, and the other terminals cannot obtain the unique identifier for decryption, so that decryption cannot be performed, and the security of the communication information is ensured.
Step 303, storing the differentially encrypted communication information in a safe storage space of the terminal; specifically, the secure storage space is a storage space that cannot be mounted as readable and writable storage space. For example, a high-pass chip has its own SFS area, which is a portion of inaccessible memory partitioned from an Encrypted File System (EFS) area. The mobile phone with the security domain divides a small section of area on the memory area as an un-mounted file system (umount) area, and the area cannot carry out mount operation, namely cannot be mounted as readable and writable. In a dual system, there are two independent memory spaces, and the secure storage space occupies a dedicated memory.
304, when the communication information is displayed, the terminal carries out differential decryption and display through decryption information corresponding to the differential encryption; namely, the differential decryption information containing the same unique identifier as the differential decryption is used for decryption.
And the terminal of the step 300-304 is used as a sending end to carry out privacy and safety protection on the communication information.
Example 2
The differential encryption and decryption process of the communication information is explained from the receiving end in this embodiment.
Fig. 4 is a flowchart of a method according to a second embodiment of the present invention, as shown in fig. 4, including:
in step 400, the receiving end receives the communication information which is sent from the sending end and adopts the universal encryption.
It should be noted that, if the receiving end is a terminal that does not process the communication information by using differential encryption, the communication information is decrypted and displayed according to the general encryption processing procedure.
Step 401, the receiving end performs receiving end differentiation encryption on the received general encrypted communication information.
Step 402, after completing the differential encryption, deleting the received general encrypted communication information.
And step 403, storing the differentially encrypted communication information in a secure storage space of the terminal.
And step 404, when the communication information is displayed, the terminal performs differential decryption and display through decryption information corresponding to the differential encryption.
Fig. 5 is a block diagram of a system according to a second embodiment of the present invention, and as shown in fig. 5, after a sending end performs communication encryption on input communication information, the sending end performs differential encryption processing on the sending end itself, and the differential encryption processing flow at the sending end refers to the description of embodiment 1; and the receiving terminal performs receiving terminal differential encryption according to the steps 400-404, so that the privacy and the safety of the communication information are ensured.
Example 3
Fig. 6 is a flowchart of a method according to a third embodiment of the present invention, as shown in fig. 6, including:
and step 600, acquiring the communication information, and adding a random number to the head or the tail of the communication information to carry out universal encryption. Here, different random numbers may be used each time to secure the communication information during transmission. In addition, when the general encrypted communication information is sent to the receiving end, according to the processing method in the prior art, the decryption public key of the general encryption is carried in the sending process.
601, a sending end carries out differential encryption on the general encrypted communication information, and encryption is carried out by taking the sent unique identifier as a parameter in an encryption algorithm in the encryption process; for example, an IMEI number or an MEID number is used as a parameter for encryption, and decryption information is added to a message file after encryption and is used for identification in a decryption process. It should be noted that, for the decryption process, which completely corresponds to the encryption process, the encryption parameter is encrypted by the unique identifier, and the decryption information decrypted by the unique identifier is inevitably provided in the decryption information for the terminal that allows decryption, so as to perform differential decryption.
And step 602, after differential decryption is performed on the decryption information, obtaining and displaying the communication information.
Example 4
Fig. 7 is a flowchart of a method according to a fourth embodiment of the present invention, as shown in fig. 7, including:
step 700, the receiving end receives the differentially encrypted communication information from the transmitting end and the decryption information for decrypting the differentially encrypted communication information of the transmitting end;
step 701, decrypting the differentially encrypted communication information according to the decryption information; the decryption information is generated by the unique identifier of the differential encryption of the sending end when the sending end carries out differential encryption, so that the decryption can be realized. For the decryption information of other terminals, the transmitted unique identifier cannot be obtained, and the decryption information capable of decrypting the differentially encrypted communication information cannot be generated.
Step 702, after completing the decryption of the communication information differentially encrypted by the sending terminal, deleting the analysis information, and performing receiving terminal differential encryption on the decrypted communication information; namely, the IMEI number or MAC address of the receiving terminal and the IMSI number of the SIM card are used as encryption parameters to carry out differential encryption of the receiving terminal.
And 703, when the communication information is displayed, the receiving end carries out differential decryption and display through the decryption information corresponding to the differential encryption.
Fig. 8 is a block diagram of a system according to a fourth embodiment of the present invention, and as shown in fig. 8, a sending end directly performs differential encryption on input communication information, and performs related processing of differential encryption; the receiving end carries out differential decryption on the communication information sent by the sending end and differentially encrypted according to the decryption information sent by the sending end, deletes the decryption information after completing the differential decryption of the sending end, receives the communication information after the differential decryption of the sending end and carries out differential encryption on the receiving end, and privacy safety of the communication information is guaranteed.
Although the embodiments of the present invention have been described above, the above description is only for the convenience of understanding the present invention, and is not intended to limit the present invention. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (23)

1. A method for implementing data processing, comprising:
the terminal carries out differential encryption on the obtained communication information through the differential identification;
and when the communication information is displayed, differential decryption is performed.
2. The method according to claim 1, wherein the differential encryption is performed by using a differential identifier of the terminal as an encryption parameter;
the differentiation identification is the unique identification of the terminal or the unique identification of a subscriber identity module SIM card loaded by the terminal.
3. The method of claim 2,
when the differentiation identifier is the unique identifier of the terminal, the unique identifier of the terminal is as follows: the international identity code IMEI or the physical address MAC of the mobile equipment;
when the differentiated identifier is the unique identifier of the subscriber identity module SIM card loaded by the terminal, the unique identifier of the terminal is as follows: the international mobile subscriber identity IMSI number of the SIM card.
4. The method of claim 1, further comprising: and storing the communication information which is subjected to differential encryption in a safe storage space of the terminal.
5. The method of claim 4, wherein the secure storage is controlled to not mount storage space that is readable and writable.
6. The method of claim 1, wherein when the terminal is a transmitting end,
the differential encryption specifically includes:
and after the transmitting end carries out general encryption on the input communication information, carrying out differentiated encryption on the transmitting end.
7. The method according to claim 1, wherein when the terminal is a receiving end, the performing differential encryption specifically includes:
and the receiving end carries out receiving end differential encryption on the received general encrypted encryption information.
8. The method according to claim 1, wherein when the terminal is a receiving end, the performing differential encryption specifically includes:
and after the receiving end decrypts the communication information differentially encrypted by the sending end, the receiving end differentially encrypts the decrypted communication information.
9. The method of claim 8, wherein before the receiving end decrypts the differentially encrypted communication at the sending end, the method further comprises:
and the receiving end receives decryption information for decrypting the differential encryption of the sending end when receiving the communication information differentially encrypted by the sending end, so that the communication information differentially encrypted by the sending end is decrypted according to the decryption information differentially encrypted by the decryption sending end.
10. The method of claim 6 or 7, further comprising: deleting the universally encrypted communication information after completing the differentiated encryption of the universally encrypted communication information.
11. The method of claim 9, further comprising: and after the receiving end decrypts the communication information differentially encrypted by the sending end, deleting the decryption information for decrypting the differential encryption of the sending end.
12. The method according to any one of claims 1 to 5, wherein before performing differential decryption, the method further comprises:
presetting a differential decryption matching instruction, and when the input differential decryption matching instruction is the same as the preset differential decryption matching instruction, allowing the communication information to be displayed for differential decryption; and when the input differentiation decryption matching instruction is different from the preset differentiation decryption matching instruction, carrying out differentiation decryption when the communication information is refused to be displayed.
13. A terminal for realizing data processing is characterized by comprising a differentiation encryption unit and a decryption display unit; wherein,
the differential encryption unit is used for carrying out differential encryption on the obtained communication information through the differential identification;
and the decryption display unit is used for carrying out differential decryption when the communication information is displayed.
14. The terminal according to claim 13, wherein the differentiated encryption unit is specifically configured to encrypt the obtained communication information with a differentiated identifier of the terminal as an encryption parameter;
the differentiation identification is the unique identification of the terminal or the unique identification of a subscriber identity module SIM card loaded by the terminal.
15. The terminal according to claim 14, wherein the differential encryption unit is specifically configured to encrypt the obtained communication information with an IMEI or a MAC address of the terminal or an IMSI number of a SIM card loaded on the terminal as the differential identifier and with the differential identifier as an encryption parameter.
16. The terminal according to claim 13, further comprising an information storage unit for storing the differentially encrypted communication information performed by the differential decryption unit in a secure storage space.
17. The terminal according to claim 13, wherein the differentiated encryption unit is specifically configured to, when the terminal is a transmitting end,
and after the input communication information is subjected to general encryption, the differential encryption of the sending end is carried out.
18. The terminal according to claim 13, wherein the differentiated encryption unit is specifically configured to,
and carrying out receiving end differential encryption on the received general encrypted encryption information.
19. The terminal according to claim 13, wherein the differentiated encryption unit is specifically configured to,
and after the communication information differentially encrypted by the sending end is decrypted, the decrypted communication information is differentially encrypted by the receiving end.
20. The terminal according to claim 19, wherein when the terminal is a receiving end, the terminal further comprises a receiving unit,
the differential encryption unit is used for receiving the communication information sent by the sending end and receiving the decryption information used for decrypting the differential encryption of the sending end at the same time, so that the differential encryption unit decrypts the communication information sent by the differential encryption according to the decryption information differentially encrypted by the decryption sending end.
21. The terminal according to claim 17 or 18, wherein the terminal further comprises a first deleting unit configured to delete the commonly encrypted communication information after completing the differential encryption of the commonly encrypted communication information.
22. The terminal according to claim 20, wherein when the terminal is a receiving terminal, the terminal further comprises a second deleting unit, configured to delete the decryption information for decrypting the differential encryption of the transmitting terminal after the differential encryption unit decrypts the communication information differentially encrypted by the transmitting terminal.
23. The terminal according to any one of claims 13 to 16, further comprising a setting unit configured to preset a differential decryption matching instruction, and before performing differential decryption, when the input differential decryption matching instruction is the same as the preset differential decryption matching instruction, allow the communication information to be displayed for differential decryption; and when the input differentiation decryption matching instruction is different from the preset differentiation decryption matching instruction, carrying out differentiation decryption when the communication information is refused to be displayed.
CN201510165713.8A 2015-04-09 2015-04-09 A kind of method realizing data process and terminal Withdrawn CN106162622A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510165713.8A CN106162622A (en) 2015-04-09 2015-04-09 A kind of method realizing data process and terminal
PCT/CN2015/084834 WO2016161717A1 (en) 2015-04-09 2015-07-22 Data processing method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510165713.8A CN106162622A (en) 2015-04-09 2015-04-09 A kind of method realizing data process and terminal

Publications (1)

Publication Number Publication Date
CN106162622A true CN106162622A (en) 2016-11-23

Family

ID=57071783

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510165713.8A Withdrawn CN106162622A (en) 2015-04-09 2015-04-09 A kind of method realizing data process and terminal

Country Status (2)

Country Link
CN (1) CN106162622A (en)
WO (1) WO2016161717A1 (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040030906A1 (en) * 2002-06-20 2004-02-12 International Business Machines Corporation System and method for SMS authentication
CN1543234A (en) * 2003-11-05 2004-11-03 大唐微电子技术有限公司 Short message security method and SIM card for implementing short message security
CN101115020A (en) * 2006-07-25 2008-01-30 腾讯科技(深圳)有限公司 Secret mail protecting method and mail system
CN101394280A (en) * 2008-10-30 2009-03-25 深圳华为通信技术有限公司 Mobile terminal and data service message protecting method
CN102036194A (en) * 2010-12-09 2011-04-27 中兴通讯股份有限公司 Method and system for encrypting MMS
CN102045343A (en) * 2010-10-29 2011-05-04 深圳市爱贝信息技术有限公司 DC (Digital Certificate) based communication encrypting safety method, server and system
CN102075615A (en) * 2009-11-19 2011-05-25 中国移动通信集团北京有限公司 Method for sending and receiving short messages and subscriber identity module (SIM)
CN102158871A (en) * 2010-02-12 2011-08-17 中兴通讯股份有限公司 Communication method capable of adapting to terminal differentiation, system, control station and terminal
CN103916834A (en) * 2014-04-25 2014-07-09 长沙市梦马软件有限公司 Short message encryption method and system allowing user to have exclusive secret key
CN104244237A (en) * 2014-09-12 2014-12-24 宇龙计算机通信科技(深圳)有限公司 Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040030906A1 (en) * 2002-06-20 2004-02-12 International Business Machines Corporation System and method for SMS authentication
CN1543234A (en) * 2003-11-05 2004-11-03 大唐微电子技术有限公司 Short message security method and SIM card for implementing short message security
CN101115020A (en) * 2006-07-25 2008-01-30 腾讯科技(深圳)有限公司 Secret mail protecting method and mail system
CN101394280A (en) * 2008-10-30 2009-03-25 深圳华为通信技术有限公司 Mobile terminal and data service message protecting method
CN102075615A (en) * 2009-11-19 2011-05-25 中国移动通信集团北京有限公司 Method for sending and receiving short messages and subscriber identity module (SIM)
CN102158871A (en) * 2010-02-12 2011-08-17 中兴通讯股份有限公司 Communication method capable of adapting to terminal differentiation, system, control station and terminal
CN102045343A (en) * 2010-10-29 2011-05-04 深圳市爱贝信息技术有限公司 DC (Digital Certificate) based communication encrypting safety method, server and system
CN102036194A (en) * 2010-12-09 2011-04-27 中兴通讯股份有限公司 Method and system for encrypting MMS
CN103916834A (en) * 2014-04-25 2014-07-09 长沙市梦马软件有限公司 Short message encryption method and system allowing user to have exclusive secret key
CN104244237A (en) * 2014-09-12 2014-12-24 宇龙计算机通信科技(深圳)有限公司 Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set

Also Published As

Publication number Publication date
WO2016161717A1 (en) 2016-10-13

Similar Documents

Publication Publication Date Title
CN110192381B (en) Key transmission method and device
CN110169102B (en) Privacy protection method and device
CN104244237B (en) Data sending, receiving method and reception send terminal and data transmitter-receiver set
EP4254861A1 (en) Secure access method and device
CN105764058B (en) Method, device and system for accessing a network
US20150296251A1 (en) Method, terminal, and system for communication pairing of a digital television terminal and a mobile terminal
EP4164175B1 (en) Method for securely controlling smart home appliance and terminal device
WO2016161583A1 (en) Gprs system key enhancement method, sgsn device, ue, hlr/hss and gprs system
CN104244245A (en) Wireless access authentication method, wireless router device and wireless terminal
JP6583728B2 (en) Communications system
CN106465108A (en) Cellular network authentication control
CN113545115B (en) Communication method and device
CN100566337C (en) Strengthen the method for wireless LAN safety
EP3892022B1 (en) Method and apparatuses for ensuring secure attachment in size constrained authentication protocols
CN105142134A (en) Parameter obtaining and transmission methods/devices
CN102264068B (en) Shared key consultation method, system, network platform and terminal
CN106465109A (en) Cellular Authentication
EP3281431B1 (en) Uicc key provisioning
JP7404540B2 (en) Privacy information transmission methods, devices, computer equipment and computer readable media
KR20160111244A (en) Electronic apparatus and communication method thereof
CN109618313B (en) Vehicle-mounted Bluetooth device and connection method and system thereof
CN102056156B (en) Computer Data Security is downloaded to the method and system of mobile terminal
CN112640506B (en) Bluetooth node pairing method and related device
CN107508814A (en) Data ciphering method, decryption method, apparatus and system
KR101311310B1 (en) Encryption system and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20161123

WW01 Invention patent application withdrawn after publication