[go: up one dir, main page]

CN108200093B - Encryption and decryption method and encryption and decryption device for transmission files - Google Patents

Encryption and decryption method and encryption and decryption device for transmission files Download PDF

Info

Publication number
CN108200093B
CN108200093B CN201810130388.5A CN201810130388A CN108200093B CN 108200093 B CN108200093 B CN 108200093B CN 201810130388 A CN201810130388 A CN 201810130388A CN 108200093 B CN108200093 B CN 108200093B
Authority
CN
China
Prior art keywords
file
mobile terminal
transmitted
encrypted
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810130388.5A
Other languages
Chinese (zh)
Other versions
CN108200093A (en
Inventor
张海平
周意保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810130388.5A priority Critical patent/CN108200093B/en
Publication of CN108200093A publication Critical patent/CN108200093A/en
Application granted granted Critical
Publication of CN108200093B publication Critical patent/CN108200093B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

本发明提供一种传输文件的加密方法包括以下步骤:接收待传输的文件以及文件传输指令,所述文件传输指令中携带有密钥目标用户标识;根据所述密钥目标用户标识,获取对所述待传输的文件进行加密的密钥;采用所述密钥对所述待传输的文件进行加密;根据所述文件传输指令,将加密后的所述待传输的文件传输至接收方移动终端。本发明能确保网络传输文件的安全性,既方便又快捷,极大的提高用户的使用体验。

Figure 201810130388

The present invention provides an encryption method for transmitting files, which includes the following steps: receiving a file to be transmitted and a file transmission instruction, wherein the file transmission instruction carries a key target user identifier; The key for encrypting the file to be transmitted is encrypted; the key is used to encrypt the file to be transmitted; and the encrypted file to be transmitted is transmitted to the recipient mobile terminal according to the file transmission instruction. The invention can ensure the security of network transmission files, is convenient and fast, and greatly improves the use experience of users.

Figure 201810130388

Description

Encryption and decryption method and encryption and decryption device for transmission file
This application is a divisional application filed on 28/10/2015 by the chinese patent office under the name of 201510719602.7 entitled "method and apparatus for encrypting and decrypting transmission file," the entire contents of which are incorporated herein by reference.
Technical Field
The invention relates to the technical field of encryption and decryption, in particular to an encryption and decryption method and an encryption and decryption device for a transmission file.
Background
With the development of society, the internet and the mobile internet have become an inseparable part of people's lives, and the disclosure of the personal privacy of users has also become a focus of attention while the internet brings various convenience and quickness. In the prior art, the content of a file is not encrypted by instant chat software or even a communication tool during file transmission, that is, any other person can normally open and view the file to obtain the content of the file as long as the other person obtains the file. Thus, if confidential documents need to be transferred through instant chat software or a computer is invaded by others, valuable privacy or confidential documents can be easily leaked.
Therefore, there is a great security problem in applying the private file of the internet user in the related art.
Disclosure of Invention
In view of the above, the present invention provides an encryption and decryption method and an encryption and decryption apparatus for a transmission file, and aims to solve the problem of the prior art that a private file of an internet user has a relatively high security.
In order to solve the above technical problems, embodiments of the present invention provide the following technical solutions:
the invention provides an encryption method of a transmission file, which comprises the following steps:
a sender mobile terminal receives a file to be transmitted and a file transmission instruction, wherein the file transmission instruction carries a key target user identifier;
the sender mobile terminal opens a video window of the sender mobile terminal according to the key target user identification; eye information of a receiver mobile terminal user is collected through the video window;
the sender mobile terminal encrypts the file to be transmitted by adopting the collected eyeball information of the receiver mobile terminal user;
the sender mobile terminal transmits the encrypted file to be transmitted to the receiver mobile terminal according to the file transmission instruction;
the receiving party mobile terminal receives the encrypted file and the decrypted appointed user identification sent by the sending party mobile terminal;
according to the decrypted appointed user identification, the receiver mobile terminal starts an eyeball acquisition module to acquire eyeball information of the receiver mobile terminal user;
the receiver mobile terminal decrypts the encrypted file by adopting the collected eyeball information of the receiver mobile terminal user;
and if the decryption is successful, the mobile terminal of the receiving party opens the file.
The invention also provides an encryption method of the transmission file, which comprises the following steps:
receiving a file to be transmitted and a file transmission instruction, wherein the file transmission instruction carries a key target user identifier;
acquiring a secret key for encrypting the file to be transmitted according to the secret key target user identification;
encrypting the file to be transmitted by adopting the secret key;
and transmitting the encrypted file to be transmitted to a receiver mobile terminal according to the file transmission instruction.
The invention also provides a decryption method of the transmission file, which comprises the following steps:
receiving an encrypted file and a decrypted appointed user identification sent by a sender mobile terminal;
acquiring a key for decrypting the encrypted file according to the decrypted appointed user identifier;
decrypting the encrypted file by adopting the decrypted key;
and if the decryption is successful, opening the file.
The invention also provides an encryption device for the transmission file, which comprises:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a file to be transmitted and a file transmission instruction, and the file transmission instruction carries a key target user identifier;
the key acquisition module is used for acquiring a key for encrypting the file to be transmitted according to the key target user identifier;
the encryption module is used for encrypting the file to be transmitted by adopting the secret key;
and the transmission module is used for transmitting the encrypted file to be transmitted to the mobile terminal of the receiver according to the file transmission instruction.
The invention also provides a decryption device of the transmission file, which comprises:
the receiving module is used for receiving the encrypted file and the appointed decrypted user identification sent by the mobile terminal of the sender;
the key acquisition module is used for acquiring a key for decrypting the encrypted file according to the decrypted appointed user identifier;
the decryption module is used for decrypting the encrypted file by adopting the decrypted key;
and the file opening module is used for opening the file if the decryption is successful.
Compared with the prior art, the encryption and decryption method and the encryption and decryption device for the transmission file, disclosed by the invention, have the advantages that when the file is transmitted, the file is encrypted according to the appointed eyeball information and then sent to the mobile terminal of the receiving party after being encrypted, the mobile terminal of the receiving party acquires the appointed eyeball information to decrypt the received encrypted file, and the file can be opened for viewing only if the decryption is successful. Therefore, the invention can ensure the security of network transmission files, is convenient and quick, and greatly improves the use experience of users.
Drawings
Fig. 1 is a schematic flow chart illustrating an implementation of an encryption method for a transmission file according to an embodiment of the present invention;
fig. 2 is a schematic flow chart illustrating an implementation of an encryption method for a transmission file according to a second embodiment of the present invention;
fig. 3 is a schematic flow chart illustrating an implementation of an encryption method for a transmission file according to a third embodiment of the present invention;
fig. 4 is a schematic flow chart illustrating an implementation of a decryption method for a transmission file according to a fourth embodiment of the present invention;
fig. 5 is a schematic flow chart illustrating an implementation of a decryption method for a transmission file according to a fifth embodiment of the present invention;
fig. 6 is a schematic flow chart illustrating an implementation of a decryption method for a transmission file according to a sixth embodiment of the present invention;
fig. 7 is a schematic structural diagram of an encryption apparatus for transmitting a file according to a seventh embodiment of the present invention;
fig. 8 is a schematic structural diagram of an encryption apparatus for transmitting a file according to an eighth embodiment of the present invention;
fig. 9 is a schematic structural diagram of an encryption apparatus for transmitting a file according to a ninth embodiment of the present invention;
fig. 10 is a schematic structural diagram of a decryption apparatus for transmitting a file according to a tenth embodiment of the present invention;
fig. 11 is a schematic structural diagram of a file transmission decryption apparatus according to an eleventh embodiment of the present invention;
fig. 12 is a schematic structural diagram of a decryption apparatus for transmitting a file according to a twelfth embodiment of the present invention.
Detailed Description
Referring to the drawings, wherein like reference numbers refer to like elements throughout, the principles of the present invention are illustrated in a suitable computing environment. The following description is based on illustrated embodiments of the invention and should not be taken as limiting the invention with regard to other embodiments that are not detailed herein.
While the principles of the invention have been described in the foregoing context, which is not intended to be limiting, those of ordinary skill in the art will appreciate that various of the steps and operations described below may also be implemented in hardware. The principles of the present invention are operational with numerous other general purpose or special purpose computing, communication environments or configurations.
The invention provides an encryption and decryption method and an encryption and decryption device for a transmission file, which are mainly applied to terminal equipment, such as: mobile phones, computers, Personal Digital Assistants (PDAs), and the like.
The details will be described below separately.
Example one
Referring to fig. 1, a method for encrypting a transmission file according to an embodiment of the present invention is shown.
The encryption method of the transmission file is applied to mobile terminal equipment and specifically comprises the following steps:
in step S101, a file to be transmitted and a file transmission instruction are received, where the file transmission instruction carries a key target user identifier;
in the embodiment of the present invention, after the step of receiving the file to be transmitted, the method further includes: judging whether the file to be transmitted comprises preset keywords or not; and if the file to be transmitted is judged to comprise the preset keywords, determining that the file to be transmitted is the file needing to be encrypted, and executing the step S102.
However, it is understood that the keywords may be "contract", "agreement", "important", etc., and may be set by the user.
For example, after receiving a file to be transmitted, whether the content of the file contains two words of "contract" is judged, and if the content of the file contains "contract", the file to be transmitted is determined to be a file needing to be encrypted. At this time, according to the information of the appointed user, the eyeball information of the appointed user is obtained and used as a key for encrypting the file to be transmitted.
However, it is understood that if the content of the file is determined to contain no two words of "contract", the file is transmitted directly to the receiving mobile terminal without encryption.
In step S102, a key for encrypting the file to be transmitted is acquired according to the key target user identifier;
in the embodiment of the invention, according to the information of the appointed user, the eyeball information of the appointed user is obtained and used as a key for encrypting the file to be transmitted. For example, eye information includes, but is not limited to; iris information, sclera information, and the like.
In step S103, encrypting the file to be transmitted by using the key;
in the embodiment of the invention, the eyeball information of the appointed user is adopted to encrypt the file to be transmitted.
In step S104, the encrypted file to be transmitted is transmitted to the mobile terminal of the receiving party according to the file transmission instruction.
As can be seen from the above, in the present embodiment, when a file is transmitted, the file is encrypted according to the specified eyeball information, and then the encrypted file is sent to the receiving mobile terminal. Therefore, the invention can ensure the security of network transmission files, is convenient and quick, and greatly improves the use experience of users.
Example two
Referring to fig. 2, a method for encrypting a transmission file according to an embodiment of the present invention is shown.
The encryption method of the transmission file is applied to mobile terminal equipment and specifically comprises the following steps:
in step S201, a file to be transmitted and a file transmission instruction are received, where the file transmission instruction carries a key target user identifier;
in the embodiment of the present invention, after the step of receiving the file to be transmitted, the method further includes: judging whether the file to be transmitted comprises preset keywords or not; if the file to be transmitted is judged to include the preset keywords, the file to be transmitted is determined to be the file needing to be encrypted, and step S202 is executed.
However, it is understood that if the file to be transmitted is determined not to include the preset keyword, the file is directly transmitted to the receiving mobile terminal without encryption.
In step S202, an eyeball collection module of the sender mobile terminal is started according to the key target user identification;
in the embodiment of the invention, according to the designated user information, if the designated user is the user of the home terminal mobile phone, the eyeball collection module of the home terminal mobile phone (the mobile terminal of the sender) is started.
In step S203, the eyeball information of the sender mobile terminal user is collected through the eyeball collection module;
in step S204, the collected eyeball information of the sender mobile terminal user is used to encrypt the file to be transmitted.
In the embodiment of the invention, the eyeball information of the home terminal mobile phone user is adopted to encrypt the file to be transmitted.
In step S205, the encrypted file to be transmitted is transmitted to the mobile terminal of the receiving party according to the file transmission instruction.
However, it is understood that if the specified user information is stored in the mobile terminal in advance, according to the key target user identifier (i.e. the specified user information), eyeball information of the specified user is directly read from the mobile terminal as a key for encrypting the file to be transmitted, and the file to be transmitted is encrypted by using the eyeball information of the specified user.
As can be seen from the above, in the embodiment, when a file is transmitted, the local eyeball acquisition module is started to acquire eyeball information of the mobile terminal user; and encrypting the file according to the eyeball information, and sending the encrypted file to the mobile terminal of the receiving party. Therefore, the invention can ensure the security of network transmission files, is convenient and quick, and greatly improves the use experience of users.
EXAMPLE III
Referring to fig. 3, a method for encrypting a transmission file according to an embodiment of the invention is shown.
The encryption method of the transmission file is applied to mobile terminal equipment and specifically comprises the following steps:
in step S301, a file to be transmitted and a file transmission instruction are received, where the file transmission instruction carries a key target user identifier;
in the embodiment of the present invention, after the step of receiving the file to be transmitted, the method further includes: judging whether the file to be transmitted comprises preset keywords or not; if the file to be transmitted is judged to include the preset keyword, and the file to be transmitted is determined to be the file needing to be encrypted, the step S302 is executed.
However, it is understood that if the file to be transmitted is determined not to include the preset keyword, the file is directly transmitted to the receiving mobile terminal without encryption.
In step S302, according to the key target user identification, a video window of the sender mobile terminal is opened;
in the embodiment of the invention, when the key target user is the receiver mobile terminal user, the eyeball information of the receiver mobile terminal user is collected through the video window of the sender mobile terminal.
In step S303, eyeball information of the recipient mobile terminal user is collected through the video window;
in embodiments of the present invention, for example, eye information includes, but is not limited to; iris information, sclera information, and the like.
In step S304, the collected eyeball information of the receiving-side mobile terminal user is used to encrypt the file to be transmitted.
In step S305, the encrypted file to be transmitted is transmitted to the receiving mobile terminal according to the file transmission instruction.
As can be seen from the above, in the embodiment, when a file is transmitted, a video window is opened, and eyeball information of a receiver mobile terminal user is collected as an encryption key; and encrypting the file according to the eyeball information, and sending the encrypted file to the mobile terminal of the receiving party. Therefore, the invention can ensure the security of network transmission files, is convenient and quick, and greatly improves the use experience of users.
Example four
Referring to fig. 4, a decryption method for a transmission file according to an embodiment of the invention is shown.
The method for decrypting the transmission file is applied to mobile terminal equipment and specifically comprises the following steps:
in step S401, receiving an encrypted file and a decrypted specified user identifier sent by a sender mobile terminal;
in the embodiment of the present invention, the received encrypted file is a file obtained by encrypting the received encrypted file by using the encryption method for the transmission file.
In step S402, a key for decrypting the encrypted file is obtained according to the decryption-specified user identifier;
in step S403, decrypting the encrypted file by using the decrypted key;
in this embodiment of the present invention, after the step of decrypting the encrypted file by using the decrypted key, the method further includes: judging whether the number of decryption failure times exceeds a preset threshold value within a preset time; and if the times of decryption failure exceed a preset threshold value, deleting the encrypted file.
In step S404, if the decryption is successful, the file is opened.
In the embodiment of the invention, after the decryption is successful, the file is opened for the receiving party user to check; and when receiving the modification instruction, not executing the modification operation corresponding to the modification instruction.
However, it will be appreciated that if decryption fails, the file cannot be opened.
Further, if decryption fails, the file cannot be opened and the encrypted file is deleted.
As can be seen from the above, the mobile terminal of the receiving party in this embodiment decrypts the received encrypted file according to the specified eyeball information, and only if the decryption is successful, the file can be opened for viewing; if decryption fails, the file cannot be opened and the encrypted file is deleted. Therefore, the invention can ensure the security of network transmission files, is convenient and quick, and greatly improves the use experience of users.
EXAMPLE five
Referring to fig. 5, a decryption method for a transmission file according to an embodiment of the invention is shown.
The method for decrypting the transmission file is applied to mobile terminal equipment and specifically comprises the following steps:
in step S501, an encrypted file and a decrypted specified user identifier sent by a sender mobile terminal are received;
in the embodiment of the present invention, the received encrypted file is a file obtained by encrypting the received encrypted file by using the encryption method for the transmission file.
In step S502, an eyeball collection module of the receiver mobile terminal is started according to the decrypted designated user identifier;
in the embodiment of the invention, when the appointed user identifier for decryption is the user information of the mobile terminal of the receiving party, the eyeball collection module of the mobile terminal of the receiving party is started according to the user information, and the eyeball information of the mobile terminal user of the receiving party is collected to be used as the decryption key.
In step S503, the eyeball information of the receiver mobile terminal user is collected through the eyeball collection module;
in step S504, the encrypted file is decrypted by using the collected eyeball information of the receiving-side mobile terminal user.
In this embodiment of the present invention, after the step of decrypting the encrypted file, the method further includes: judging whether the number of decryption failure times exceeds a preset threshold value within a preset time; and if the times of decryption failure exceed a preset threshold value, deleting the encrypted file.
In step S505, if the decryption is successful, the file is opened.
In the embodiment of the invention, after the decryption is successful, the file is opened for the receiving party user to check; and when receiving the modification instruction, not executing the modification operation corresponding to the modification instruction.
However, it will be appreciated that if decryption fails, the file cannot be opened.
Further, if decryption fails, the file cannot be opened and the encrypted file is deleted.
As can be seen from the above, the mobile terminal of the receiving party in this embodiment decrypts the received encrypted file according to the specified eyeball information, and only if the decryption is successful, the file can be opened for viewing; if decryption fails, the file cannot be opened and the encrypted file is deleted. Therefore, the invention can ensure the security of network transmission files, is convenient and quick, and greatly improves the use experience of users.
EXAMPLE six
Referring to fig. 6, a decryption method for a transmission file according to an embodiment of the invention is shown.
The method for decrypting the transmission file is applied to mobile terminal equipment and specifically comprises the following steps:
in step S601, receiving an encrypted file and a decrypted specified user identifier sent by a sender mobile terminal;
in the embodiment of the present invention, the received encrypted file is a file obtained by encrypting the received encrypted file by using the encryption method for the transmission file.
In step S602, eyeball information sent by the sender mobile terminal is received, and the eyeball information is obtained according to the decrypted specified user identifier, where the eyeball information is eyeball information of the sender mobile terminal user;
in the embodiment of the invention, when the user information of which the appointed user identifier is the sender mobile terminal is decrypted, eyeball information of the sender mobile terminal user is obtained to be used as a decryption key.
In step S603, the encrypted file is decrypted by using the obtained eyeball information of the sender mobile terminal user.
In this embodiment of the present invention, after the step of decrypting the encrypted file, the method further includes: judging whether the number of decryption failure times exceeds a preset threshold value within a preset time; and if the times of decryption failure exceed a preset threshold value, deleting the encrypted file.
In step S604, if the decryption is successful, the file is opened.
In the embodiment of the invention, after the decryption is successful, the file is opened for the receiving party user to check; and when receiving the modification instruction, not executing the modification operation corresponding to the modification instruction.
However, it will be appreciated that if decryption fails, the file cannot be opened.
Further, if decryption fails, the file cannot be opened and the encrypted file is deleted.
As can be seen from the above, the mobile terminal of the receiving party in this embodiment decrypts the received encrypted file according to the specified eyeball information, and only if the decryption is successful, the file can be opened for viewing; if decryption fails, the file cannot be opened and the encrypted file is deleted. Therefore, the invention can ensure the security of network transmission files, is convenient and quick, and greatly improves the use experience of users.
EXAMPLE seven
Fig. 7 is a schematic structural diagram of an encryption apparatus for transmitting a file according to a seventh embodiment of the present invention; for convenience of explanation, only portions related to the embodiments of the present invention are shown. The encryption device for the transmission file comprises: a receiving module 101, a key obtaining module 102, an encryption module 103, and a transmission module 104. The encryption device for the transmission file can be a software unit, a hardware unit or a combination of software and hardware unit built in the mobile terminal.
A receiving module 101, configured to receive a file to be transmitted and a file transmission instruction, where the file transmission instruction carries a key target user identifier;
a key obtaining module 102, configured to obtain, according to the key target user identifier, a key for encrypting the file to be transmitted;
the encryption module 103 is configured to encrypt the file to be transmitted by using the key;
and the transmission module 104 is configured to transmit the encrypted file to be transmitted to the receiver mobile terminal according to the file transmission instruction.
In this embodiment of the present invention, the encryption apparatus for transmitting a file further includes: and a judging module.
After a receiving module 101 receives a file to be transmitted and a file transmission instruction, wherein the file transmission instruction carries a key target user identifier, a judging module is used for judging whether the file to be transmitted comprises a preset keyword or not; and the key acquisition module is specifically used for determining that the file to be transmitted is a file to be encrypted if the judgment module judges that the file to be transmitted comprises the preset keywords, and executing to acquire the key for encrypting the file to be transmitted.
Example eight
Fig. 8 is a schematic structural diagram of an encryption apparatus for transmitting a file according to an eighth embodiment of the present invention; for convenience of explanation, only portions related to the embodiments of the present invention are shown. The encryption device for the transmission file comprises: the system comprises a receiving module 201, an opening module 202, an eyeball collecting module 203, an encryption module 204 and a transmission module 205. The encryption device for the transmission file can be a software unit, a hardware unit or a combination of software and hardware unit built in the mobile terminal.
A receiving module 201, configured to receive a file to be transmitted and a file transmission instruction, where the file transmission instruction carries a key target user identifier;
the starting module 202 is used for starting an eyeball acquisition module of the sender mobile terminal according to the key target user identifier;
the eyeball collection module 203 is used for collecting eyeball information of a sender mobile terminal user;
the encryption module 204 is specifically configured to encrypt the file to be transmitted by using the collected eyeball information of the sender mobile terminal user.
And the transmission module 205 is configured to transmit the encrypted file to be transmitted to the mobile terminal of the receiving party according to the file transmission instruction.
Example nine
Please refer to fig. 9, which is a schematic structural diagram of an encryption apparatus for transmitting a file according to a ninth embodiment of the present invention; for convenience of explanation, only portions related to the embodiments of the present invention are shown. The encryption device for the transmission file comprises: a receiving module 301, a video window opening module 302, a video capture module 303, an encryption module 304, and a transmission module 305. The encryption device for the transmission file can be a software unit, a hardware unit or a combination of software and hardware unit built in the mobile terminal.
A receiving module 301, configured to receive a file to be transmitted and a file transmission instruction, where the file transmission instruction carries a key target user identifier;
a video window opening module 302, configured to open a video window of the sender mobile terminal according to the key target user identifier;
the video acquisition module 303 is configured to acquire eyeball information of a receiver mobile terminal user through the video window;
the encryption module 304 is specifically configured to encrypt the file to be transmitted by using the collected eyeball information of the mobile terminal user of the receiving party.
The transmission module 305 is configured to transmit the encrypted file to be transmitted to the receiver mobile terminal according to the file transmission instruction.
Example ten
Please refer to fig. 10, which is a schematic structural diagram of an encryption apparatus for transmitting a file according to a tenth embodiment of the present invention; for convenience of explanation, only portions related to the embodiments of the present invention are shown. The encryption device for the transmission file comprises: a receiving module 401, a key obtaining module 402, a decryption module 403, and a file opening module 404. The encryption device for the transmission file can be a software unit, a hardware unit or a combination of software and hardware unit built in the mobile terminal.
A receiving module 401, configured to receive an encrypted file and a decrypted specified user identifier sent by a sender mobile terminal;
a key obtaining module 402, configured to obtain, according to the decryption-specified user identifier, a key for decrypting the encrypted file;
a decryption module 403, configured to decrypt the encrypted file using the decrypted key;
and a file opening module 404, configured to open the file if the decryption is successful.
In this embodiment of the present invention, the apparatus for decrypting the transmission file further includes: and a frequency judging module.
Namely, when the decryption module 403 decrypts the encrypted file by using the decrypted key; the frequency judging module is used for judging whether the frequency of decryption failure exceeds a preset threshold value within preset time; and the file deleting module is used for deleting the encrypted file if the times of decryption failure judged by the times judging module exceed a preset threshold value.
In this embodiment of the present invention, the apparatus for decrypting the transmission file further includes: a control module;
the file opening module is specifically used for opening the file for the receiving party user to check after the decryption is successful;
and the control module is used for controlling not to execute the modification operation corresponding to the modification instruction when the modification instruction is received.
EXAMPLE eleven
Please refer to fig. 11, which is a schematic structural diagram of an encryption apparatus for transmitting a file according to an eleventh embodiment of the present invention; for convenience of explanation, only portions related to the embodiments of the present invention are shown. The encryption device for the transmission file comprises: a receiving module 501, an opening module 502, an eyeball collecting module 503, a decrypting module 504, and a file opening module 505. The encryption device for the transmission file can be a software unit, a hardware unit or a combination of software and hardware unit built in the mobile terminal.
A receiving module 501, configured to receive an encrypted file and a decrypted specified user identifier sent by a sender mobile terminal;
an opening module 502, configured to open an eyeball collection module of the receiver mobile terminal according to the decrypted specified user identifier;
an eyeball collection module 503, configured to collect eyeball information of a recipient mobile terminal user;
the decryption module 504 is specifically configured to decrypt the encrypted file by using the collected eyeball information of the mobile terminal user of the receiving party.
And a file opening module 505, configured to open the file if the decryption is successful.
In this embodiment of the present invention, the apparatus for decrypting the transmission file further includes: and a frequency judging module.
Namely, when the decryption module decrypts the encrypted file by adopting the decrypted key; the frequency judging module is used for judging whether the frequency of decryption failure exceeds a preset threshold value within preset time; and the file deleting module is used for deleting the encrypted file if the times of decryption failure judged by the times judging module exceed a preset threshold value.
In this embodiment of the present invention, the apparatus for decrypting the transmission file further includes: a control module;
the file opening module is specifically used for opening the file for the receiving party user to check after the decryption is successful;
and the control module is used for controlling not to execute the modification operation corresponding to the modification instruction when the modification instruction is received.
Example twelve
Please refer to fig. 12, which is a schematic structural diagram of an encryption apparatus for transmitting a file according to a twelfth embodiment of the present invention; for convenience of explanation, only portions related to the embodiments of the present invention are shown. The encryption device for the transmission file comprises: a receiving module 601, a key obtaining module 602, a decryption module 603, and a file opening module 604. The encryption device for the transmission file can be a software unit, a hardware unit or a combination of software and hardware unit built in the mobile terminal.
A receiving module 601, configured to receive an encrypted file and a decrypted specified user identifier sent by a sender mobile terminal;
a key obtaining module 602, configured to specifically receive and obtain eyeball information sent by a sender mobile terminal according to the decrypted specified user identifier, where the eyeball information is eyeball information of a sender mobile terminal user;
the decryption module 603 is specifically configured to decrypt the encrypted file by using the obtained eyeball information of the sender mobile terminal user.
And a file opening module 604, configured to open the file if the decryption is successful.
In this embodiment of the present invention, the apparatus for decrypting the transmission file further includes: and a frequency judging module.
Namely, when the decryption module decrypts the encrypted file by adopting the decrypted key; the frequency judging module is used for judging whether the frequency of decryption failure exceeds a preset threshold value within preset time; and the file deleting module is used for deleting the encrypted file if the times of decryption failure judged by the times judging module exceed a preset threshold value.
In this embodiment of the present invention, the apparatus for decrypting the transmission file further includes: a control module;
the file opening module is specifically used for opening the file for the receiving party user to check after the decryption is successful;
and the control module is used for controlling not to execute the modification operation corresponding to the modification instruction when the modification instruction is received.
According to the encryption and decryption method and the encryption and decryption device for the transmission file, when the file is transmitted, the file is encrypted according to the appointed eyeball information and then sent to the mobile terminal of the receiving party after encryption, the mobile terminal of the receiving party acquires the appointed eyeball information to decrypt the received encrypted file, and the file can be opened for viewing only if decryption is successful. Therefore, the invention can ensure the security of network transmission files, is convenient and quick, and greatly improves the use experience of users.
The encryption and decryption methods and the encryption and decryption devices for the transmission file provided by the embodiment of the invention belong to the same concept, and the specific implementation process is detailed in the whole specification and is not repeated herein.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable storage medium, and the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
In summary, although the present invention has been described with reference to the preferred embodiments, the above-described preferred embodiments are not intended to limit the present invention, and those skilled in the art can make various changes and modifications without departing from the spirit and scope of the present invention, therefore, the scope of the present invention shall be determined by the appended claims.

Claims (6)

1.一种传输文件的加密方法,其特征在于,所述传输文件的加密方法包括以下步骤:1. an encryption method of transmission file, is characterized in that, the encryption method of described transmission file comprises the following steps: 发送方移动终端接收待传输的文件以及文件传输指令,所述文件传输指令中携带有密钥目标用户标识;The sender's mobile terminal receives the file to be transferred and the file transfer instruction, where the file transfer instruction carries the key target user identifier; 发送方移动终端判断所述待传输的文件是否包括预设的关键字;The sender's mobile terminal determines whether the file to be transmitted includes a preset keyword; 发送方移动终端如果判断出所述待传输的文件包括预设的关键字,确定所述待传输的文件为需要加密的文件,则发送方移动终端根据所述密钥目标用户标识,开启发送方移动终端的视频窗口;通过所述视频窗口采集接收方移动终端用户的眼球信息;If the mobile terminal of the sender determines that the file to be transmitted includes a preset keyword, and determines that the file to be transmitted is a file that needs to be encrypted, the mobile terminal of the sender opens the sender's mobile terminal according to the target user identifier of the key. A video window of the mobile terminal; collecting eyeball information of the recipient's mobile terminal user through the video window; 发送方移动终端采用采集到的接收方移动终端用户的眼球信息,对所述待传输的文件进行加密;The sender's mobile terminal encrypts the file to be transmitted by using the collected eyeball information of the receiver's mobile terminal user; 发送方移动终端根据所述文件传输指令,将加密后的所述待传输的文件传输至接收方移动终端;The sender's mobile terminal transmits the encrypted file to be transmitted to the receiver's mobile terminal according to the file transmission instruction; 接收方移动终端接收发送方移动终端发送的加密文件及解密指定用户标识;The receiver's mobile terminal receives the encrypted file sent by the sender's mobile terminal and decrypts the specified user identifier; 根据所述解密指定用户标识,接收方移动终端开启眼球采集模块采集接收方移动终端用户的眼球信息;According to the decrypted designated user identifier, the receiver's mobile terminal starts the eyeball collection module to collect the eyeball information of the receiver's mobile terminal user; 接收方移动终端采用采集到的接收方移动终端用户的眼球信息,对所述加密文件进行解密;The receiver's mobile terminal uses the collected eyeball information of the receiver's mobile terminal user to decrypt the encrypted file; 解密成功,则接收方移动终端打开所述文件;If the decryption is successful, the recipient's mobile terminal opens the file; 如果解密失败,则删除所述加密文件。If decryption fails, the encrypted file is deleted. 2.一种传输文件的加密方法,其特征在于,所述传输文件的加密方法包括以下步骤:2. an encryption method of transmission file, is characterized in that, the encryption method of described transmission file comprises the following steps: 接收待传输的文件以及文件传输指令,所述文件传输指令中携带有密钥目标用户标识;Receive the file to be transmitted and the file transmission instruction, where the file transmission instruction carries the key target user identifier; 判断所述待传输的文件是否包括预设的关键字;judging whether the file to be transmitted includes a preset keyword; 如果判断出所述待传输的文件包括预设的关键字,确定所述待传输的文件为需要加密的文件,则根据所述密钥目标用户标识,开启发送方移动终端的视频窗口;通过所述视频窗口采集接收方移动终端用户的眼球信息;If it is determined that the file to be transmitted includes a preset keyword, and it is determined that the file to be transmitted is a file that needs to be encrypted, then according to the key target user identifier, the video window of the sender's mobile terminal is opened; The video window collects eyeball information of the receiver's mobile terminal user; 采用采集到的接收方移动终端用户的眼球信息,对所述待传输的文件进行加密;Encrypting the to-be-transmitted file by using the collected eyeball information of the recipient's mobile terminal user; 根据所述文件传输指令,将加密后的所述待传输的文件传输至接收方移动终端,以使接收方移动终端开启接收方移动终端的眼球采集模块;通过所述眼球采集模块,采集接收方移动终端用户的眼球信息;采用采集到的接收方移动终端用户的眼球信息,对所述加密文件进行解密,解密成功时打开所述文件;如果解密失败,则删除所述加密文件。According to the file transmission instruction, the encrypted file to be transmitted is transmitted to the receiver's mobile terminal, so that the receiver's mobile terminal enables the eyeball collection module of the receiver's mobile terminal; The eyeball information of the mobile terminal user; using the collected eyeball information of the recipient mobile terminal user, decrypt the encrypted file, and open the file when the decryption succeeds; if the decryption fails, delete the encrypted file. 3.一种传输文件的解密方法,其特征在于,所述传输文件的解密方法包括以下步骤:3. a deciphering method of transmission file, is characterized in that, the deciphering method of described transmission file comprises the following steps: 接收发送方移动终端发送的加密文件及解密指定用户标识;其中,所述加密文件是利用权利要求1所述的传输文件的加密方法进行加密得到的;Receive the encrypted file sent by the mobile terminal of the sender and decrypt the designated user identifier; wherein, the encrypted file is obtained by encrypting the encrypted file using the encryption method of the transmission file described in claim 1; 根据所述解密指定用户标识,开启接收方移动终端的眼球采集模块;According to the decrypted designated user identifier, the eyeball collection module of the receiver's mobile terminal is turned on; 通过所述眼球采集模块,采集接收方移动终端用户的眼球信息;Collect the eyeball information of the receiver's mobile terminal user through the eyeball collection module; 采用采集到的接收方移动终端用户的眼球信息,对所述加密文件进行解密;Decrypt the encrypted file by using the collected eyeball information of the recipient's mobile terminal user; 解密成功,则打开所述文件;If decryption is successful, open the file; 如果解密失败,则删除所述加密文件。If decryption fails, the encrypted file is deleted. 4.一种传输文件的加密装置,其特征在于,所述传输文件的加密装置包括:4. An encryption device for transmitting a file, wherein the encryption device for transmitting a file comprises: 接收模块,用于接收待传输的文件以及文件传输指令,所述文件传输指令中携带有密钥目标用户标识;a receiving module, configured to receive a file to be transmitted and a file transmission instruction, wherein the file transmission instruction carries a key target user identifier; 判断模块,用于判断所述待传输的文件是否包括预设的关键字;a judging module for judging whether the file to be transmitted includes a preset keyword; 视频窗口开启模块,用于如果判断出所述待传输的文件包括预设的关键字,确定所述待传输的文件为需要加密的文件,则根据所述密钥目标用户标识,开启发送方移动终端的视频窗口;The video window opening module is used for, if it is judged that the file to be transmitted includes a preset keyword, and it is determined that the file to be transmitted is a file that needs to be encrypted, then according to the key target user identifier, enable the sender to move The video window of the terminal; 视频采集模块,用于通过所述视频窗口采集接收方移动终端用户的眼球信息;a video collection module, configured to collect eyeball information of the receiver's mobile terminal user through the video window; 加密模块,用于采用采集到的接收方移动终端用户的眼球信息,对所述待传输的文件进行加密;an encryption module, configured to encrypt the file to be transmitted by using the collected eyeball information of the recipient mobile terminal user; 传输模块,用于根据所述文件传输指令,将加密后的所述待传输的文件传输至接收方移动终端,以使接收方移动终端开启接收方移动终端的眼球采集模块;通过所述眼球采集模块,采集接收方移动终端用户的眼球信息;采用采集到的接收方移动终端用户的眼球信息,对所述加密文件进行解密,解密成功时打开所述文件;如果解密失败,则删除所述加密文件。a transmission module, configured to transmit the encrypted file to be transmitted to the recipient's mobile terminal according to the file transmission instruction, so that the recipient's mobile terminal enables the eyeball collection module of the recipient's mobile terminal; module to collect the eyeball information of the recipient mobile terminal user; use the collected eyeball information of the recipient mobile terminal user to decrypt the encrypted file, and open the file when the decryption succeeds; if the decryption fails, delete the encrypted file document. 5.一种传输文件的解密装置,其特征在于,所述传输文件的解密装置包括:5. A decryption device for transmission files, wherein the decryption device for transmission files comprises: 接收模块,用于接收发送方移动终端发送的加密文件及解密指定用户标识;其中,所述加密文件是利用权利要求4所述的传输文件的加密装置进行加密得到的;A receiving module, for receiving the encrypted file sent by the sender's mobile terminal and decrypting the designated user identifier; wherein, the encrypted file is obtained by encrypting the encrypted device for transmitting a file according to claim 4; 开启模块,用于根据所述解密指定用户标识,开启接收方移动终端的眼球采集模块;an opening module, used for opening the eyeball collecting module of the receiver's mobile terminal according to the decrypted designated user identifier; 眼球采集模块,用于采集接收方移动终端用户的眼球信息;The eyeball collection module is used to collect the eyeball information of the receiver's mobile terminal user; 解密模块,用于采用采集到的接收方移动终端用户的眼球信息,对所述加密文件进行解密;a decryption module, configured to decrypt the encrypted file by using the collected eyeball information of the recipient mobile terminal user; 文件打开模块,用于解密成功,则打开所述文件;The file opening module is used to open the file if the decryption is successful; 删除模块,用于如果解密失败,则删除所述加密文件。A delete module for deleting the encrypted file if decryption fails. 6.一种存储介质,其存储有计算机程序,其中,所述计算机程序使得计算机执行如权利要求2所述的方法,或者是执行如权利要求3所述的方法。6 . A storage medium storing a computer program, wherein the computer program causes a computer to execute the method of claim 2 or execute the method of claim 3 . 7 .
CN201810130388.5A 2015-10-28 2015-10-28 Encryption and decryption method and encryption and decryption device for transmission files Expired - Fee Related CN108200093B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810130388.5A CN108200093B (en) 2015-10-28 2015-10-28 Encryption and decryption method and encryption and decryption device for transmission files

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510719602.7A CN105227578B (en) 2015-10-28 2015-10-28 Transmit the encryption and decryption approaches of file
CN201810130388.5A CN108200093B (en) 2015-10-28 2015-10-28 Encryption and decryption method and encryption and decryption device for transmission files

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201510719602.7A Division CN105227578B (en) 2015-10-28 2015-10-28 Transmit the encryption and decryption approaches of file

Publications (2)

Publication Number Publication Date
CN108200093A CN108200093A (en) 2018-06-22
CN108200093B true CN108200093B (en) 2021-08-24

Family

ID=54996257

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201810130388.5A Expired - Fee Related CN108200093B (en) 2015-10-28 2015-10-28 Encryption and decryption method and encryption and decryption device for transmission files
CN201510719602.7A Expired - Fee Related CN105227578B (en) 2015-10-28 2015-10-28 Transmit the encryption and decryption approaches of file

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201510719602.7A Expired - Fee Related CN105227578B (en) 2015-10-28 2015-10-28 Transmit the encryption and decryption approaches of file

Country Status (2)

Country Link
CN (2) CN108200093B (en)
WO (1) WO2017071324A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108200093B (en) * 2015-10-28 2021-08-24 Oppo广东移动通信有限公司 Encryption and decryption method and encryption and decryption device for transmission files
CN106170006A (en) * 2016-09-29 2016-11-30 广州鹤互联网科技有限公司 A kind of electronic endorsement method for managing security and system
CN108377319B (en) * 2018-03-15 2020-04-17 北京顶象技术有限公司 Picture transmission method and device
CN109218451A (en) * 2018-11-14 2019-01-15 郑州云海信息技术有限公司 A kind of data transmission method of distributed cluster system, device, equipment and medium
WO2020103059A1 (en) * 2018-11-21 2020-05-28 深圳市欢太科技有限公司 Data processing method and apparatus, electronic device and storage medium
CN111464531B (en) * 2020-03-31 2021-12-14 洛阳理工学院 An Instant Confirmation File Transfer Method Based on Multiple Encryption
WO2022198595A1 (en) * 2021-03-25 2022-09-29 华为技术有限公司 Encryption control method and apparatus for data transmission
CN113486380B (en) * 2021-07-23 2023-04-11 西安万像电子科技有限公司 Encryption method of text file
CN115174136B (en) * 2022-05-23 2024-02-02 北京旷视科技有限公司 Data acquisition and data transmission method, terminal, server and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710613A (en) * 2012-05-14 2012-10-03 西安电子科技大学 Signcryption method of biological features of a plurality of receivers
CN104145274A (en) * 2012-07-30 2014-11-12 英特尔公司 Media encryption based on biometric data
CN104507080A (en) * 2014-11-19 2015-04-08 广东欧珀移动通信有限公司 File processing method and terminal
CN104992100A (en) * 2015-07-15 2015-10-21 西安凯虹电子科技有限公司 Iris dynamic encryption and decryption system and method for electronic document flowing

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1290534A2 (en) * 2000-06-02 2003-03-12 Kinetic Sciences Inc. Method for biometric encryption of e-mail
WO2008021041A2 (en) * 2006-08-07 2008-02-21 Id Rank Security, Inc. Systems and methods for conducting secure wired and wireless networked telephony
FR2930830A1 (en) * 2008-04-30 2009-11-06 Thales Sa CONFIDENCE RESOURCE INTEGRATED WITH A BIOMETRIC DATA MONITORING DEVICE PROVIDING SECURITY OF CONTROL AND THAT OF DATA
CN103414790A (en) * 2013-08-30 2013-11-27 苏州跨界软件科技有限公司 File transfer system based on NFC
US10623400B2 (en) * 2013-10-14 2020-04-14 Greg Hauw Method and device for credential and data protection
CN108200093B (en) * 2015-10-28 2021-08-24 Oppo广东移动通信有限公司 Encryption and decryption method and encryption and decryption device for transmission files

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710613A (en) * 2012-05-14 2012-10-03 西安电子科技大学 Signcryption method of biological features of a plurality of receivers
CN104145274A (en) * 2012-07-30 2014-11-12 英特尔公司 Media encryption based on biometric data
CN104507080A (en) * 2014-11-19 2015-04-08 广东欧珀移动通信有限公司 File processing method and terminal
CN104992100A (en) * 2015-07-15 2015-10-21 西安凯虹电子科技有限公司 Iris dynamic encryption and decryption system and method for electronic document flowing

Also Published As

Publication number Publication date
CN108200093A (en) 2018-06-22
CN105227578A (en) 2016-01-06
WO2017071324A1 (en) 2017-05-04
CN105227578B (en) 2018-02-16

Similar Documents

Publication Publication Date Title
CN108200093B (en) Encryption and decryption method and encryption and decryption device for transmission files
CN105262756B (en) The encryption and decryption approaches and encryption and decryption devices of data
US9832016B2 (en) Methods, systems and computer program product for providing verification code recovery and remote authentication
KR102330538B1 (en) Roaming content wipe actions across devices
CN104092550B (en) Cipher code protection method, system and device
US10230697B2 (en) User terminals, and methods and computer-readable recording mediums storing computer programs for transmitting and receiving messages
EP4002751A1 (en) Computer system, device, and method for securing sensitive data in the cloud
WO2016045464A1 (en) Decryption method and mobile terminal
CN103020504B (en) Based on picture management system and the picture management method of finger print identifying
CN107113164B (en) Method, apparatus and computer readable medium for deduplication of encrypted data
CN107666395A (en) One population file management method, user terminal, group chat system
EP2942899A1 (en) Information processing method, trust server and cloud server
WO2015117437A1 (en) File encryption/decryption method and device
CN105656870B (en) A data transmission method, device and system
CN108390755B (en) Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip
CN112182624A (en) Encryption method, encryption device, storage medium and electronic equipment
KR101485968B1 (en) Method for accessing to encoded files
EP3629204B1 (en) Processing data on an electronic device
US20090024844A1 (en) Terminal And Method For Receiving Data In A Network
CN108701195B (en) Data security protection method and device
KR20130038894A (en) Data processing terminal, method of processing data therof, data processing system and method of processing data thereof
JP2007142504A (en) Information processing system
JPWO2006025241A1 (en) Data transmission device, data reception device, server, transmission / reception device, data sharing system, data transmission program, data reception program, data sharing program, data transmission / reception program, and computer-readable recording medium
CN105635100A (en) Information encryption method, information decryption method and terminal
CN110417638B (en) Communication data processing method and device, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210824