WO2012006830A1 - 移动终端及其加密方法 - Google Patents
移动终端及其加密方法 Download PDFInfo
- Publication number
- WO2012006830A1 WO2012006830A1 PCT/CN2010/077893 CN2010077893W WO2012006830A1 WO 2012006830 A1 WO2012006830 A1 WO 2012006830A1 CN 2010077893 W CN2010077893 W CN 2010077893W WO 2012006830 A1 WO2012006830 A1 WO 2012006830A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- password
- mobile terminal
- file
- encryption
- encryption level
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the present invention relates to the field of communications, and in particular to a mobile terminal and an encryption method thereof.
- BACKGROUND At present, various types of mobile terminals have a password protection function, which can generally protect important files or information stored in a mobile terminal by setting a password, and only the correct password can be input to view the encrypted content. This method effectively prevents the leakage of information, but at the same time, there are also hidden dangers: People who are closely related to the owner of the mobile terminal (such as a lover, a child, etc.) may obtain the password by asking the owner of the mobile terminal, and then The mobile terminal decrypts to know the encrypted content in the mobile terminal.
- the current mobile terminal encryption technology, encryption or decryption operation is public, and anyone may know that the mobile terminal is encrypted, thereby causing the above to move in the case that some people have to inform the mobile terminal of the password. Exposure of encrypted information in the terminal.
- the present invention is directed to the disclosure of an operation of encrypting or decrypting a mobile terminal in the related art, thereby causing anyone to know that the mobile terminal has been encrypted. Therefore, the main object of the present invention is to provide a mobile terminal and Its encryption method to solve the above problems.
- a mobile terminal is provided.
- the mobile terminal of the present invention includes: a password management module, configured to manage a first password and a second password of the mobile terminal, where the first password is used to encrypt a file of a first encryption level in the mobile terminal, The second password is used to encrypt the file of the second encryption level in the mobile terminal, and the second encryption level is higher than the first encryption level; the password receiving module is configured to receive the first password or the second password input by the user of the mobile terminal. And a file display module, configured to display the first encryption level file in the first password; and a file for displaying the first encryption level and the second encryption level according to the second password.
- the mobile terminal further includes: a receiving module, configured to receive an encrypted message that encrypts the file; a determining module, configured to determine whether the password received by the password receiving module is a second password; and the encryption module is configured to: Yes, according to the encrypted message, the second encryption level is used to encrypt the file with the second password.
- the password management module is further configured to set the second password when the mobile terminal is used for the first time.
- the mobile terminal further includes a password repairing module, configured to prompt the user 4 to tamper with the first password and/or the second password.
- the mobile terminal encryption method includes: the mobile terminal encrypts the file of the first encryption level using the first password, and encrypts the file of the second encryption level with the second password, wherein the second encryption level is higher than a first encryption level; the mobile terminal receives the first password input by the user, and displays the file of the first encryption level according to the first password; or the mobile terminal receives the second password input by the user, and displays the first encryption according to the second password Level file and file at the second encryption level.
- the method further includes: the mobile terminal receives the encrypted message for encrypting the file, and the password input by the user; the mobile terminal determines whether the password is The second password; if the judgment result is yes, the mobile terminal performs an operation of encrypting the file using the second password according to the encrypted message. Further, the mobile terminal sets the second password when it is first used.
- the method further includes: the mobile terminal receiving the first password input by the user; the mobile terminal prompting the user to select whether to perform the setting of the second password, and receiving the selection result of the user If the result of the selection is YES, the operation of setting the second password is performed. Further, if the result of the selection is no, the setting of the second password is no longer prompted in subsequent use. Further, the method further includes: the mobile terminal prompting the user to tamper with the first password and/or the second password. According to the present invention, the file display module has the first password and only displays the first encryption level.
- the file does not prompt that the file of the second encryption level still exists, which solves the problem that the mobile terminal discloses the operation of encrypting or decrypting in the related art, thereby causing anyone to know that the mobile terminal has been encrypted, and avoiding the problem in the mobile terminal.
- the exposure of the second encryption level file ensures file security.
- FIG. 1 is a block diagram showing the structure of a mobile terminal according to an embodiment of the present invention
- FIG. 2 is a block diagram showing the structure of a mobile terminal according to a preferred embodiment of the present invention
- FIG. 3 is a mobile terminal encryption according to an embodiment of the present invention.
- FIG. 4 is a flowchart of a mobile terminal password setting when a normal password function is turned on according to an embodiment of the present invention
- FIG. 5 is a mobile terminal password setting when a normal password function is not turned on according to an embodiment of the present invention
- Figure 6 is a flow chart of file browsing in an embodiment of the present invention.
- the present invention provides an implementation method for making the encryption setting of the mobile terminal relatively invisible.
- the method described in the present invention can achieve better implementation of others even if the mobile terminal is obtained and is familiar with the mobile.
- FIG. 1 is a structural block diagram of a mobile terminal according to an embodiment of the present invention, including a password management module 11, a password receiving module 12, and a file display. Module 13.
- the structure is described in detail below.
- the password management module 11 is configured to manage the first password and the second password of the mobile terminal, where the first password is used to encrypt the file of the first encryption level in the mobile terminal, and the second password is used to the mobile terminal.
- the file of the second encryption level is encrypted, and the second encryption level is higher than the first encryption level.
- the password receiving module 12 is configured to receive a first password or a second password input by a user of the mobile terminal.
- the file display module 13 is connected to the password management module 11 and the password receiving module 12, and configured to display the first encryption level file corresponding to the first password managed by the password management module 11 according to the first password received by the password receiving module 12; For the second password received by the password receiving module 12, the file of the first encryption level corresponding to the first password managed by the password management module 11 and the file of the second encryption level corresponding to the second password managed by the password management module 11 are displayed. It should be noted that, when the file display module 13 displays the first encryption level file corresponding to the first password managed by the password management module 11 according to the first password received by the password receiving module 12, the second encryption is not prompted. Level file.
- the mobile terminal discloses an operation of encrypting or decrypting, thereby causing anyone to know that the mobile terminal has been encrypted.
- the mobile terminal uses two sets of passwords of the first password and the second password, and when the user inputs the first password, the mobile terminal only displays the file of the first encryption level corresponding to the first password, and The user is prompted to have a second encryption level file. Since the user who knows the first password does not know that there is still a file of the second encryption level, it is impossible to know that the mobile terminal has also encrypted with the second password. In this way, the exposure of the file of the second encryption level in the mobile terminal can be avoided, and the file security is ensured.
- the mobile terminal further includes: a receiving module 14, a determining module 15, and an encryption module 16.
- the receiving module 14 is configured to receive an encrypted message for encrypting the file
- the determining module 15 is connected to the password receiving module 14 for determining whether the password received by the password receiving module 14 is a second password.
- the encryption module 16 is connected to the determining module. 15 .
- the determination result of the determination module 15 is YES, according to the encrypted message received by the receiving module 14 , the second encryption level is used to perform the second encryption level of the file.
- the preferred embodiment describes a process of encrypting a file of a second encryption level.
- the mobile terminal does not make a clear prompt for the user, for example, "Please enter the second password.” Therefore, the password received by the password receiving module 14 may be the first password or the second password.
- the determining module 15 determines that the password received by the password receiving module 14 is the second password, the file is subjected to the second encryption level. Encryption, otherwise the file is encrypted at the first encryption level to improve the security of the mobile terminal.
- the password management module 11 is further configured to set the second password when the mobile terminal is used for the first time.
- the mobile terminal in the preferred embodiment will not prompt the setting of the second password, thereby preventing others who can access the mobile terminal from knowing the existence of the second password, and improving the second.
- the concealment of the password Preferably, the mobile terminal further includes a password repairing module 17 for prompting the user 4 to tamper with the first password and/or the second password.
- the preferred embodiment describes a tampering process for the second password. In view of the concealment of the second password, the mobile terminal does not make a clear prompt for the user, for example, "Please enter the second password.” Therefore, the password received by the password receiving module 14 may be the first password or the second password.
- the present invention also provides a preferred embodiment, which incorporates the technical solutions of the above-mentioned plurality of preferred embodiments, which will be described in detail below with reference to FIG. 2 is a structural block diagram of a mobile terminal according to a preferred embodiment of the present invention, including a password setting module and a password management module, wherein the password setting module is responsible for completing setting and changing of a normal password and an advanced password, and simultaneously implementing two sets of passwords. Does not affect.
- the password setting module is responsible for calling the password management module to implement the password saving function and the current password information acquisition function.
- the password management module uses two access areas: a normal password (corresponding to the first password described above) storage area and an advanced password (corresponding to the second password described above) storage area.
- the folder browser determines the currently input password information by calling the password management module, and displays different contents according to different password information.
- a mobile terminal encryption method is also provided.
- FIG. 3 is a flowchart of a method for encrypting a mobile terminal according to an embodiment of the present invention, including the following step 4: S302 to step S304.
- Step S302 The mobile terminal encrypts the file of the first encryption level by using the first password, and encrypts the file of the second encryption level by using the second password, where the second encryption level is higher than the first encryption level.
- Step 4 S304, the mobile terminal receives the first password input by the user, and displays the file of the first encryption level according to the first password; or the mobile terminal receives the second password input by the user, and displays the second password according to the second password.
- An encryption level file and a second encryption level file It should be noted that, when the mobile terminal displays the file of the first encryption level according to the first password, it does not prompt that the file of the second encryption level still exists.
- the mobile terminal discloses an operation of encrypting or decrypting, thereby causing anyone to know that the mobile terminal has been encrypted.
- the mobile terminal uses two sets of passwords of the first password and the second password, and when the user inputs the first password, the mobile terminal only displays the file of the first encryption level corresponding to the first password, and The user is prompted to have a second encryption level file. Since the user who knows the first password does not know that there is still a file of the second encryption level, it is impossible to know that the mobile terminal has also encrypted with the second password. In this way, the exposure of the file of the second encryption level in the mobile terminal can be avoided, and the file security is ensured.
- the mobile terminal receives the encrypted message for encrypting the file, and the password input by the user; the mobile terminal determines whether the password is the second password. If the judgment result is yes, the mobile terminal performs an operation of encrypting the file using the second password according to the encrypted message.
- the preferred embodiment describes a process of encrypting a file of a second encryption level. Considering the concealment of the second password and the file of the second encryption level, the mobile terminal does not make a clear prompt for the user, for example, "Please enter the second password.” Therefore, the password received by the mobile terminal may be the first password or the second password.
- the mobile terminal determines that the password is the second password
- the file is encrypted by the second encryption level, otherwise the file is first encrypted. Level of encryption to improve the security of mobile terminals.
- the mobile terminal sets the second password when it is first used. And, before setting the second password, the mobile terminal receives the first password input by the user; the mobile terminal prompts the user to select whether to perform the setting of the second password, and receives the selection result of the user; if the selection result is yes, the pair is executed The second password is set to operate. If the result of the selection is no, it will not be used in subsequent use. Then prompt to set the second password.
- the mobile terminal in the preferred embodiment will not prompt the setting of the second password, thereby preventing others who can access the mobile terminal from knowing the existence of the second password, and improving the second. Password security.
- the mobile terminal prompts the user to tamper with the first password and/or the second password.
- the preferred embodiment describes a tampering process for the second password.
- the mobile terminal does not make a clear prompt for the user, for example, "Please enter the second password.” Therefore, the password received by the mobile terminal may be the first password or the second password.
- the mobile terminal determines that the received password is the second password, the user is allowed to modify the second password.
- FIG. 4 is a flowchart of the password setting of the mobile terminal when the normal password function is turned on according to the embodiment of the present invention, and includes the following steps S402 to S410.
- Step S402 The user enters the password setting module, and the setting module determines whether it is the first entry, if it is to go to step S404, if not, then to step S408.
- Step S404 Prompt the user whether to set an advanced password. If yes, go to step S406; if not, exit the password setting module.
- Step S406 Perform advanced password setting processing, and exit the password setting module after the setting is completed.
- Step S408 Wait for the user to input the password of the mobile terminal. If the input password is a normal password, go to step S410; if the input password is a high-level password, go to step S406.
- Step S410 Perform normal password setting processing, and exit the password setting module after setting.
- Step S412 Determine whether it is an advanced password? If the determination result is yes, step S406 is performed. Otherwise, step S410 is performed.
- FIG. 5 is a flowchart of the mobile terminal password setting when the normal password function is not turned on according to the embodiment of the present invention, and includes the following steps S502 to S508.
- Step S502 The user enters the password setting module, and the setting module determines whether it is the first entry. If yes, the process goes to step S504, and if not, the process goes to step S508.
- Step S504 Prompt the user whether to set an advanced password. If yes, go to step S506; if not, exit the password setting module.
- Step S506 Perform advanced password setting processing, and exit the password setting module after setting.
- Step S508 Determine whether the user inputs an advanced password. If the advanced password is entered, go to step S506, and if the advanced password is not entered, exit the password setting module.
- Preferred Embodiment 3 This preferred embodiment 3 describes a process of performing file browsing after the password setting is completed based on the preferred embodiment 1.
- FIG. 6 is a flow chart of file browsing according to an embodiment of the present invention, including the following steps S602 to S610.
- Step S602 Enter a folder browser module to determine whether the user inputs a password of the mobile terminal. If the mobile terminal password is not input, go to step S604; if the password is entered, go to step S606.
- Step S604 The folder browser displays the unencrypted content in the mobile terminal.
- Step S606 Determine the type of the input password. If the input password is a normal password, go to step S608; if the input password is a high-level password, go to step S610.
- Step S608 The folder browser displays unencrypted content and generally encrypted content in the mobile terminal.
- Step S610 The folder browser displays all the contents. The preferred embodiment passes forces.
- a secret password is distinguished to display a file of the corresponding encryption level. Specifically, when the user inputs the normal password in step S608, the mobile terminal only displays the unencrypted content and the normally encrypted content, and does not prompt the user to still have the advanced encrypted content.
- the invention can easily distinguish the encryption setting (advanced password encryption or second password encryption) of the mobile terminal owner from the general mobile terminal encryption setting (usually password encryption or first password encryption), even if it is known that the encryption is usually Unable to detect the functionality of advanced encryption, and advanced encryption can have all the permissions normally encrypted, and vice versa. In addition, usually encryption and advanced encryption do not affect each other.
- the password can be set whether the password is turned on or off, so that the average user seems to have no password protection.
- the file display module only displays the file of the first encryption level according to the first password, and does not prompt that the file of the second encryption level still exists, and solves the related art.
- the terminal discloses the operation of encrypting or decrypting, thereby causing anyone to know that the mobile terminal has been encrypted, avoiding the exposure of the second encryption level file in the mobile terminal, and ensuring file security.
- modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices.
- they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device, or they may be separately fabricated into individual integrated circuit modules, or they may be Multiple modules or steps are made into a single integrated circuit module.
- the invention is not limited to any particular hardware and software. Piece combination.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Abstract
本发明公开了一种移动终端及其加密方法,该移动终端包括:密码管理模块,用于对移动终端的第一密码和第二密码进行管理,其中,第一密码用于对移动终端中的第一加密级别的文件进行加密,第二密码用于对移动终端中的第二加密级别的文件进行加密,并且第二加密级别高于第一加密级别;密码接收模块,用于接收移动终端的用户输入的第一密码或第二密码;文件显示模块,用于根据第一密码显示第一加密级别的文件;以及用于根据第二密码显示第一加密级别的文件和第二加密级别的文件。本发明避征移动终端中的第二加密级别的文件的曝光,保证了文件安全。
Description
移动终端及其加密方法 技术领域 本发明涉及通信领域, 具体而言, 涉及一种移动终端及其加密方法。 背景技术 目前, 各种款式的移动终端都具有密码保护功能, 其通常可以对移动终 端中存储的重要文件或者信息通过设置密码进行保护, 只有输入正确的密码 才能查看加密的内容。 这种方式有效地阻止了信息的泄漏, 但同时也存在如下的隐患: 与移动 终端拥有者关系密切的人(如爱人、 子女等), 可能通过询问该移动终端拥有 者从而获取密码, 然后对移动终端进行解密从而得知该移动终端中的加密内 容。 由此可见, 目前的移动终端加密技术, 加密或者解密的操作是公开的, 任何人都可能知道该移动终端进行了加密, 从而造成上述在某些不得不告知 他人移动终端密码的情况下, 移动终端中的加密信息的曝光。 发明内容 针对相关技术中移动终端对加密或者解密的操作进行公开, 从而造成任 何人都知道该移动终端进行过加密的问题而提出本发明, 为此, 本发明的主 要目的在于提供一种移动终端及其加密方法, 以解决上述问题。 为了实现上述目的, 才艮据本发明的一个方面, 提供了一种移动终端。 居本发明的移动终端包括: 密码管理模块, 用于对移动终端的第一密 码和第二密码进行管理, 其中, 第一密码用于对移动终端中的第一加密级别 的文件进行加密, 第二密码用于对移动终端中的第二加密级别的文件进行加 密, 并且第二加密级别高于第一加密级别; 密码接收模块, 用于接收移动终 端的用户输入的第一密码或第二密码; 文件显示模块, 用于 居第一密码显 示第一加密级别的文件; 以及用于才艮据第二密码显示第一加密级别的文件和 第二加密级别的文件。
进一步地, 上述移动终端还包括: 接收模块, 用于接收对文件进行加密 的加密消息; 判断模块, 用于判断密码接收模块接收的密码是否为第二密码; 加密模块, 用于在判断结果为是时, 根据加密消息, 使用第二密码对文件进 行第二加密级别的加密。 进一步地, 密码管理模块还用于在首次使用移动终端时对第二密码进行 设置。 进一步地, 上述移动终端还包括密码修 丈模块, 用于提示用户 4爹改第一 密码和 /或第二密码。 为了实现上述目的, 根据本发明的另一个方面, 还提供了一种移动终端 力口密方法。 才艮据本发明的移动终端加密方法包括: 移动终端使用第一密码对第一加 密级别的文件进行加密, 并使用第二密码对第二加密级别的文件进行加密, 其中第二加密级别高于第一加密级别;移动终端接收到用户输入的第一密码, 并根据第一密码显示第一加密级别的文件; 或者移动终端接收到用户输入的 第二密码,并根据第二密码显示第一加密级别的文件和第二加密级别的文件。 进一步地, 在移动终端使用第二密码对第二加密级别的文件进行加密之 前, 还包括: 移动终端接收到用于对文件进行加密的加密消息, 以及用户输 入的密码; 移动终端判断密码是否为第二密码; 如果判断结果为是, 则移动 终端根据加密消息, 执行使用第二密码对文件进行加密的操作。 进一步地, 移动终端在首次使用时对第二密码进行设置。 进一步地,在移动终端在首次使用时对第二密码进行设置之前,还包括: 移动终端接收用户输入的第一密码; 移动终端提示用户选择是否进行第二密 码的设置, 并接收用户的选择结果; 如果选择结果为是, 则执行对第二密码 进行设置的操作。 进一步地, 如果选择结果为否, 则在后续使用中不再提示对第二密码进 行设置。 进一步地, 还包括: 移动终端提示用户 爹改第一密码和 /或第二密码。 通过本发明, 釆用文件显示模块 居第一密码仅仅显示第一加密级别的
文件, 并不提示还存在第二加密级别的文件, 解决了相关技术中移动终端对 加密或者解密的操作进行公开, 从而造成任何人都知道该移动终端进行过加 密的问题, 避免了移动终端中的第二加密级别的文件的曝光, 保证了文件安 全。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部 分, 本发明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的 不当限定。 在附图中: 图 1是 居本发明实施例的移动终端的结构框图; 图 2是 居本发明优选实施例的移动终端的结构框图; 图 3是才艮据本发明实施例的移动终端加密方法的流程图; 图 4是才艮据本发明实施例的通常密码功能开启时移动终端密码设置的流 程图; 图 5是才艮据本发明实施例的通常密码功能未开启时移动终端密码设置的 流程图; 图 6是 居本发明实施例的文件浏览的流程图。 具体实施方式 需要说明的是, 在不冲突的情况下, 本申请中的实施例及实施例中的特 征可以相互组合。 下面将参考附图并结合实施例来详细说明本发明。 4十对移动终端加密设置实现方式的一些问题, 本发明提出一种让移动终 端加密设置相对隐形化的实现方法, 利用本发明所描述的方法能够比较好的 实现他人即使获得移动终端并且熟悉移动终端加密操作的情况下, 也无法知 晓移动终端中是否设置有加密内容。 同时也能确保在别人知道移动终端密码 情况下仍然无法看到全部加密内容。 根据本发明的实施例, 提供了一种移动终端, 图 1是根据本发明实施例 的移动终端的结构框图, 包括密码管理模块 11 , 密码接收模块 12和文件显
示模块 13。 下面对其结构进行详细描述。 密码管理模块 11 , 用于对移动终端的第一密码和第二密码进行管理, 其 中, 第一密码用于对移动终端中的第一加密级别的文件进行加密, 第二密码 用于对移动终端中的第二加密级别的文件进行加密, 并且第二加密级别高于 第一加密级别。 密码接收模块 12 , 用于接收移动终端的用户输入的第一密码或第二密 码。 文件显示模块 13 , 连接至密码管理模块 11和密码接收模块 12 , 用于根 据密码接收模块 12接收的第一密码, 显示密码管理模块 11管理的第一密码 对应的第一加密级别的文件; 以及用于根据密码接收模块 12 接收的第二密 码,显示密码管理模块 11管理的第一密码对应的第一加密级别的文件和密码 管理模块 11管理的第二密码对应的第二加密级别的文件。 需要说明的是, 在文件显示模块 13根据密码接收模块 12接收的第一密 码, 显示密码管理模块 11 管理的第一密码对应的第一加密级别的文件的同 时, 并不提示还存在第二加密级别的文件。 相关技术中, 移动终端对加密或者解密的操作进行公开, 从而造成任何 人都知道该移动终端进行过加密。 本发明实施例中, 移动终端釆用了第一密 码和第二密码两套密码, 并且, 当用户输入第一密码时, 移动终端仅仅显示 第一密码对应的第一加密级别的文件, 并不提示该用户还存在第二加密级别 的文件。 由于知道第一密码的用户并不知道还存在第二加密级别的文件, 故 其不可能知道该移动终端还釆用第二密码进行过加密。 这样, 可以避免移动 终端中的第二加密级别的文件的曝光, 保证文件安全。 优选地, 上述移动终端还包括: 接收模块 14 , 判断模块 15和加密模块 16。 下面对其结构进行详细描述。 接收模块 14 , 用于接收对文件进行加密的加密消息; 判断模块 15 , 连 接至密码接收模块 14 , 用于判断密码接收模块 14接收的密码是否为第二密 码; 加密模块 16 , 连接至判断模块 15 , 用于在判断模块 15的判断结果为是 时, 根据接收模块 14 接收的加密消息, 使用第二密码对文件进行第二加密 级别的力口密。
需要说明的是, 本优选实施例描述了对第二加密级别的文件进行加密的 过程。 考虑到第二密码以及第二加密级别的文件的隐蔽性, 本移动终端不对 用户进行例如 "请输入第二密码"的明确提示。 因此, 密码接收模块 14接收到 的密码可能为第一密码也可能为第二密码, 当判断模块 15 判断密码接收模 块 14 接收到的密码为第二密码时, 则对文件进行第二加密级别的加密, 否 则对文件进行第一加密级别的加密, 以提高移动终端的安全性。 优选地,密码管理模块 11还用于在首次使用移动终端时对第二密码进行 设置。 需要说明的是, 本优选实施例中的移动终端在后续使用时将不再对设置 第二密码进行提示, 从而避免能够接触到该移动终端的他人得知该第二密码 的存在, 提高第二密码的隐蔽性。 优选地, 上述移动终端还包括密码修 丈模块 17 , 用于提示用户 4爹改第一 密码和 /或第二密码。 需要说明的是, 本优选实施例描述了对第二密码的 4爹改过程。 考虑到第 二密码的隐蔽性, 本移动终端不对用户进行例如"请输入第二密码"的明确提 示。 因此, 密码接收模块 14 接收到的密码可能为第一密码也可能为第二密 码, 当判断模块 15判断密码接收模块 14接收到的密码为第二密码时, 则允 许用户 4爹改第二密码, 否则仅仅允许用户 爹改第一密码, 从而提高第二密码 的隐蔽性。 本发明还提供了一个优选实施例, 结合了上述多个优选实施例的技术方 案, 下面结合图 2来详细描述。 图 2是根据本发明优选实施例的移动终端的结构框图, 包括密码设置模 块和密码管理模块, 其中, 密码设置模块负责完成用户进行通常密码和高级 密码的设置、 更改, 同时实现两套密码互不影响。 密码设置模块负责调用密 码管理模块, 实现密码保存功能和当前密码信息获取功能。 密码管理模块釆 用两块存取区域: 通常密码(对应于上述第一密码)保存区域和高级密码(对 应于上述第二密码) 保存区域。 文件夹浏览器通过调用密码管理模块来判断 当前输入的密码信息, 根据不同的密码信息进行不同内容的显示。 才艮据本发明的实施例, 还提供了一种移动终端加密方法。 图 3是才艮据本 发明实施例的移动终端加密方法的流程图, 包括如下的步 4聚 S302 至步骤
S304。 步骤 S302, 移动终端使用第一密码对第一加密级别的文件进行加密, 并 使用第二密码对第二加密级别的文件进行加密, 其中第二加密级别高于第一 加密级别。 步 4聚 S304, 移动终端接收到用户输入的第一密码, 并才艮据第一密码显示 第一加密级别的文件; 或者移动终端接收到用户输入的第二密码, 并根据第 二密码显示第一加密级别的文件和第二加密级别的文件。 需要说明的是,在移动终端根据第一密码显示第一加密级别的文件同时, 并不提示还存在第二加密级别的文件。 相关技术中, 移动终端对加密或者解密的操作进行公开, 从而造成任何 人都知道该移动终端进行过加密。 本发明实施例中, 移动终端釆用了第一密 码和第二密码两套密码, 并且, 当用户输入第一密码时, 移动终端仅仅显示 第一密码对应的第一加密级别的文件, 并不提示该用户还存在第二加密级别 的文件。 由于知道第一密码的用户并不知道还存在第二加密级别的文件, 故 其不可能知道该移动终端还釆用第二密码进行过加密。 这样, 可以避免移动 终端中的第二加密级别的文件的曝光, 保证文件安全。 优选地,在移动终端使用第二密码对第二加密级别的文件进行加密之前, 移动终端接收到用于对文件进行加密的加密消息, 以及用户输入的密码; 移 动终端判断密码是否为第二密码; 如果判断结果为是, 则移动终端根据加密 消息, 执行使用第二密码对文件进行加密的操作。 需要说明的是, 本优选实施例描述了对第二加密级别的文件进行加密的 过程。 考虑到第二密码以及第二加密级别的文件的隐蔽性, 本移动终端不对 用户进行例如 "请输入第二密码"的明确提示。 因此, 移动终端接收到的密码 可能为第一密码也可能为第二密码, 当移动终端判断该密码为第二密码时, 则对文件进行第二加密级别的加密, 否则对文件进行第一加密级别的加密, 以提高移动终端的安全性。 优选地, 移动终端在首次使用时对第二密码进行设置。 并且, 在对第二 密码进行设置之前, 移动终端接收用户输入的第一密码; 移动终端提示用户 选择是否进行第二密码的设置, 并接收用户的选择结果; 如果选择结果为是, 则执行对第二密码进行设置的操作。 如果选择结果为否, 则在后续使用中不
再提示对第二密码进行设置。 需要说明的是, 本优选实施例中的移动终端在后续使用时将不再对设置 第二密码进行提示, 从而避免能够接触到该移动终端的他人得知该第二密码 的存在, 提高第二密码的安全性。 优选地, 移动终端提示用户^ ί'爹改第一密码和 /或第二密码。 需要说明的是, 本优选实施例描述了对第二密码的 4爹改过程。 考虑到第 二密码的隐蔽性, 本移动终端不对用户进行例如"请输入第二密码"的明确提 示。 因此, 移动终端接收到的密码可能为第一密码也可能为第二密码, 当移 动终端判断接收到的密码为第二密码时, 则允许用户修改第二密码, 否则仅 仅允许用户^ ί'爹改第一密码, 从而提高第二密码的隐蔽性。 为了帮助理解上述实施例, 下面进一步描述本发明的其他多个优选实施 例。 优选实施例一 本优选实施例一描述了通常密码 (对应于上述第一密码) 功能开启时, 移动终端密码设置的过程。 图 4是才艮据本发明实施例的通常密码功能开启时移动终端密码设置的流 程图, 包括如下的步骤 S402至步骤 S410。 步骤 S402: 用户进入密码设置模块, 设置模块判断是否是第一次进入, 如果是转到步骤 S404, 如果不是则转到步骤 S408。 步骤 S404: 提示用户是否设置高级密码。 如果选择是则转到步骤 S406; 如果选择不是则退出密码设置模块。 步骤 S406: 进行高级密码设置处理, 设置完毕后退出密码设置模块。 步骤 S408: 等待用户输入移动终端密码。 如果输入密码是通常密码, 则 转到步骤 S410; 如果输入密码是高级密码, 则转到步骤 S406。 步骤 S410: 进行通常密码设置处理, 设置完毕后退出密码设置模块。 步骤 S412: 判断是否为高级密码? 如果判断结果为是, 执行步骤 S406,
否则执行步骤 S410。 优选实施例二 本优选实施例二描述了通常密码功能未开启时, 移动终端密码设置的过 程。 图 5是才艮据本发明实施例的通常密码功能未开启时移动终端密码设置的 流程图, 包括如下的步骤 S502至步骤 S508。 步骤 S502: 用户进入密码设置模块, 设置模块判断是否是第一次进入, 如果是则转到步骤 S504 , 如果不是则转到步骤 S508。 步骤 S504: 提示用户是否设置高级密码。 如果选择是则转到步骤 S506; 如果选择不是则退出密码设置模块。 步骤 S506: 进行高级密码设置处理, 设置完毕后退出密码设置模块。 步骤 S508: 判断用户是否输入高级密码。 如果输入高级密码则转到步骤 S506 , 如果没有输入高级密码则退出密码设置模块。 优选实施例三 本优选实施例三基于优选实施例一, 描述了在密码设置完成后进行文件 浏览的过程。 图 6 是才艮据本发明实施例的文件浏览的流程图, 包括如下的步骤 S602 至 S610。 步骤 S602: 进入文件夹浏览器模块, 判断用户是否输入移动终端密码。 如果未输入移动终端密码则转到步骤 S604; 如果输入密码则转到步骤 S606。 步骤 S604: 文件夹浏览器显示移动终端中未加密的内容。 步骤 S606: 判断输入密码的种类。 如果输入密码是通常密码, 则转到步 骤 S608; 如果输入密码是高级密码, 则转到步骤 S610。 步骤 S608 : 文件夹浏览器显示移动终端中未加密的内容和通常加密内 容。
步骤 S610: 文件夹浏览器显示全部内容。 本优选实施例通过对力。密密码进行区分,从而显示相应加密级别的文件。 具体地, 步骤 S608 中当用户输入通常密码时, 移动终端仅仅显示未加密的 内容和通常加密内容, 并不提示用户还存在高级加密内容。 由于知道通常密 码的用户并不知道还存在高级加密内容, 故其不可能知道该移动终端还釆用 高级密码进行过加密,从而可以避免移动终端中较高加密级别的文件的曝光, 保证文件安全。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本 领域的技术人员来说, 本发明可以有各种更改和变化, 本发明的保护范围以 权利要求为准。 需要说明的是, 在附图的流程图示出的步骤可以在诸如一组计算机可执 行指令的计算机系统中执行, 并且, 虽然在流程图中示出了逻辑顺序, 但是 在某些情况下, 可以以不同于此处的顺序执行所示出或描述的步骤。 本发明可以很容易的把移动终端主人私有的加密设置 (高级密码加密或 第二密码加密) 和一般移动终端加密设置 (通常密码加密或第一密码加密) 区分开来, 实现即使知道通常加密也无法发觉高级加密存在的功能, 并且高 级加密可以拥有通常加密的所有权限, 反之则不行。 另外通常加密和高级加 密相互之间不会影响, 通常密码无论是打开还是关闭都可以对高级密码进行 设置, 这样在一般用户看来移动终端就像没有设置密码保护一样。 综上所述, 居本发明的上述实施例, 釆用文件显示模块才艮据第一密码 仅仅显示第一加密级别的文件, 并不提示还存在第二加密级别的文件, 解决 了相关技术中移动终端对加密或者解密的操作进行公开, 从而造成任何人都 知道该移动终端进行过加密的问题, 避免了移动终端中的第二加密级别的文 件的曝光, 保证了文件安全。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可 以用通用的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布 在多个计算装置所组成的网络上, 可选地, 它们可以用计算装置可执行的程 序代码来实现, 从而, 可以将它们存储在存储装置中由计算装置来执行, 或 者将它们分别制作成各个集成电路模块, 或者将它们中的多个模块或步骤制 作成单个集成电路模块来实现。 这样, 本发明不限制于任何特定的硬件和软
件结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本 领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的 ^"神和 原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护 范围之内。
Claims
权 利 要 求 书 一种移动终端, 其特征在于, 包括:
密码管理模块, 用于对移动终端的第一密码和第二密码进行管理, 其中, 所述第一密码用于对所述移动终端中的第一加密级别的文件进行 加密, 所述第二密码用于对所述移动终端中的第二加密级别的文件进行 加密, 并且所述第二加密级别高于所述第一加密级别;
密码接收模块, 用于接收所述移动终端的用户输入的所述第一密码 或所述第二密码;
文件显示模块, 用于才艮据所述第一密码显示所述第一加密级别的文 件; 以及用于才艮据所述第二密码显示所述第一加密级别的文件和所述第 二加密级别的文件。 根据权利要求 1所述的移动终端, 其特征在于, 还包括:
接收模块, 用于接收对文件进行加密的加密消息;
判断模块, 用于判断所述密码接收模块接收的密码是否为所述第二 密码;
加密模块, 用于在判断结果为是时, 根据所述加密消息, 使用所述 第二密码对所述文件进行所述第二加密级别的加密。 才艮据权利要求 1所述的移动终端, 其特征在于, 所述密码管理模块还用 于在首次使用所述移动终端时对所述第二密码进行设置。 根据权利要求 1所述的移动终端, 其特征在于, 还包括:
密码修 _?丈模块, 用于提示所述用户 4爹改所述第一密码和 /或所述第二 密码。 一种移动终端加密方法, 其特征在于, 包括: 移动终端使用第一密码对第一加密级别的文件进行加密, 并使用第 二密码对第二加密级别的文件进行加密, 其中所述第二加密级别高于所 述第一加密级别;
所述移动终端接收到用户输入的所述第一密码, 并 -据所述第一密 码显示所述第一加密级别的文件; 或者所述移动终端接收到所述用户输 入的所述第二密码, 并艮据所述第二密码显示所述第一加密级别的文件 和所述第二加密级别的文件。 根据权利要求 5所述的方法, 其特征在于, 在所述移动终端使用所述第 二密码对所述第二加密级别的文件进行加密之前, 还包括:
所述移动终端接收到用于对文件进行加密的加密消息, 以及所述用 户输入的密码;
所述移动终端判断所述密码是否为所述第二密码;
如果判断结果为是, 则所述移动终端根据所述加密消息, 执行使用 所述第二密码对所述文件进行加密的操作。 根据权利要求 5所述的方法, 其特征在于, 所述移动终端在首次使用时 对所述第二密码进行设置。 根据权利要求 7所述的方法, 其特征在于, 在所述移动终端在首次使用 时对所述第二密码进行设置之前, 还包括:
所述移动终端接收用户输入的所述第一密码;
所述移动终端提示所述用户选择是否进行所述第二密码的设置, 并 接收所述用户的选择结果;
如果所述选择结果为是, 则执行对所述第二密码进行设置的操作。 根据权利要求 8所述的方法, 其特征在于, 如果所述选择结果为否, 则 在后续使用中不再提示对所述第二密码进行设置。 根据权利要求 5所述的方法, 其特征在于, 还包括:
所述移动终端提示所述用户 4爹改所述第一密码和 /或所述第二密码。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102302493A CN101895396A (zh) | 2010-07-14 | 2010-07-14 | 移动终端及其加密方法 |
CN201010230249.3 | 2010-07-14 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012006830A1 true WO2012006830A1 (zh) | 2012-01-19 |
Family
ID=43104475
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2010/077893 WO2012006830A1 (zh) | 2010-07-14 | 2010-10-19 | 移动终端及其加密方法 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101895396A (zh) |
WO (1) | WO2012006830A1 (zh) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102542210A (zh) * | 2010-12-31 | 2012-07-04 | 富泰华工业(深圳)有限公司 | 对文件使用权限管理的电子装置及方法 |
CN102271332B (zh) * | 2011-07-18 | 2017-09-12 | 中兴通讯股份有限公司 | 终端信息保密方法及装置 |
CN103377332B (zh) * | 2012-04-26 | 2016-04-20 | 腾讯科技(深圳)有限公司 | 访问应用程序的方法及装置 |
CN103455737A (zh) * | 2012-05-28 | 2013-12-18 | 百度在线网络技术(北京)有限公司 | 用户信息的保护方法及装置 |
KR101416540B1 (ko) * | 2012-07-12 | 2014-07-09 | 주식회사 로웸 | 패스워드의 연속 인증을 이용하는 패스워드 인증 시스템 및 패스워드 인증 방법 |
CN102750497B (zh) | 2012-07-20 | 2014-04-16 | 腾讯科技(深圳)有限公司 | 一种解密隐私内容的方法及装置 |
CN104134046B (zh) * | 2014-07-29 | 2017-03-29 | 努比亚技术有限公司 | 加密方法和装置 |
CN106209896B (zh) * | 2016-07-29 | 2020-02-18 | 网宿科技股份有限公司 | 基于音视频格式的流媒体加密方法和模块 |
CN111385656A (zh) * | 2020-03-04 | 2020-07-07 | 四川长虹电器股份有限公司 | 户外电子广告机导入节目文件的权限管控方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1959693A (zh) * | 2006-11-29 | 2007-05-09 | 北京飞天诚信科技有限公司 | 一种实现指纹智能密钥装置多用户使用的方法 |
CN101005661A (zh) * | 2006-11-15 | 2007-07-25 | 深圳凯虹移动通信有限公司 | 具有数据、菜单隐形功能的移动终端及其加密隐藏方法 |
CN101257681A (zh) * | 2008-03-26 | 2008-09-03 | 宇龙计算机通信科技(深圳)有限公司 | 私密数据保护装置、移动终端、私密数据存储及读取方法 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI268081B (en) * | 2005-06-24 | 2006-12-01 | Hitrust Com Inc | Data-encrypting/decrypting method, data-saving media using the method, and data-encrypting/decrypting module |
-
2010
- 2010-07-14 CN CN2010102302493A patent/CN101895396A/zh active Pending
- 2010-10-19 WO PCT/CN2010/077893 patent/WO2012006830A1/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101005661A (zh) * | 2006-11-15 | 2007-07-25 | 深圳凯虹移动通信有限公司 | 具有数据、菜单隐形功能的移动终端及其加密隐藏方法 |
CN1959693A (zh) * | 2006-11-29 | 2007-05-09 | 北京飞天诚信科技有限公司 | 一种实现指纹智能密钥装置多用户使用的方法 |
CN101257681A (zh) * | 2008-03-26 | 2008-09-03 | 宇龙计算机通信科技(深圳)有限公司 | 私密数据保护装置、移动终端、私密数据存储及读取方法 |
Also Published As
Publication number | Publication date |
---|---|
CN101895396A (zh) | 2010-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2012006830A1 (zh) | 移动终端及其加密方法 | |
CN108781163B (zh) | 用于数据通信的方法、系统以及计算机可读介质 | |
US10182255B2 (en) | Method, terminal, and system for communication pairing of a digital television terminal and a mobile terminal | |
CN111404696B (zh) | 协同签名方法、安全服务中间件、相关平台及系统 | |
KR101343264B1 (ko) | 보안 장치 인증 | |
JP6509197B2 (ja) | セキュリティパラメータに基づくワーキングセキュリティキーの生成 | |
CN110719173B (zh) | 一种信息处理方法及装置 | |
US9742565B2 (en) | Method and system for backing up private key of electronic signature token | |
WO2017172033A1 (en) | Transport layer security token binding and trusted signing | |
US9712326B2 (en) | Method and system for backing up private key of electronic signature token | |
US8397281B2 (en) | Service assisted secret provisioning | |
JP2004513420A (ja) | レベル化された機密保護があるアクセス制御のための方法及び装置 | |
CN104410967A (zh) | 一种进行连接的方法、设备和系统 | |
WO2015180689A1 (zh) | 验证信息的获取方法及装置 | |
CN112003697B (zh) | 密码模块加解密方法、装置、电子设备及计算机存储介质 | |
CN107784209A (zh) | 用于防止信息电器装置中安全漏洞的方法和信息电器装置 | |
CN113032753A (zh) | 身份验证的方法及装置 | |
CN113378119A (zh) | 一种软件授权方法、装置、设备及存储介质 | |
CN112637140A (zh) | 密码传输方法、终端、服务器及可读存储介质 | |
CA3148324A1 (en) | Computer-implemented method and system for secure identification of disconnected objects and their locations | |
JP2004015077A (ja) | 携帯通信端末セキュリティシステム及びその方法 | |
JP6201835B2 (ja) | 情報処理装置、情報処理方法及びコンピュータプログラム | |
CN101635762B (zh) | 手持装置的防护设定方法以及防护解除方法 | |
US20150222433A1 (en) | Method and apparatus for disabling algorithms in a device | |
WO2012065422A1 (zh) | 移动终端密钥的更新方法及移动终端 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10854622 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10854622 Country of ref document: EP Kind code of ref document: A1 |