CN101795450A - Method and device for carrying out security protection on mobile phone data - Google Patents
Method and device for carrying out security protection on mobile phone data Download PDFInfo
- Publication number
- CN101795450A CN101795450A CN200910045729A CN200910045729A CN101795450A CN 101795450 A CN101795450 A CN 101795450A CN 200910045729 A CN200910045729 A CN 200910045729A CN 200910045729 A CN200910045729 A CN 200910045729A CN 101795450 A CN101795450 A CN 101795450A
- Authority
- CN
- China
- Prior art keywords
- data
- mobile phone
- file
- carried out
- buffer memory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method and a device for carrying out security protection on mobile phone data. The method comprises an encryption process and a decryption process, wherein the encryption process comprises the following steps of: (S1) putting input data into a buffer memory, inputting a secret key from the mobile phone and encrypting the data by utilizing an encryption algorithm; and (S2) storing a cipher text generated after combining the data and the secret key to a medium; and the decryption process comprises the following steps of: (S3) making a read file enter the buffer memory, inputting the secret key from the mobile phone and decrypting the file by utilizing a decryption algorithm; and then outputting the file. In the invention, client data entering the mobile phone is encrypted in real time and stored in the memory medium of the mobile phone in an encrypted form, thus even if a stranger steals the data of the user through various methods, the stranger cannot see or use the data of the user without the secret key. The invention can encrypt memory data in mobile memory cards, memory chips and SIM (subscriber identity module) cards in mobile phones of users, and the like in real time.
Description
Technical field
The present invention relates to a kind of method and apparatus that data are carried out safeguard protection, particularly relate to a kind of method and apparatus that data in mobile phone is carried out safeguard protection.
Background technology
Mobile phone is more and more universal as the instrument of the frequent use in people's daily life, and science and technology development has also given mobile phone various functions, and the capacity of mobile phone storage data is increasing.In these data, there are many informational needs that the people beyond the cellie is maintained secrecy.And because the portability of mobile phone causes mobile phone often to be lost, the detachability of data storage card etc. have brought bigger potential safety hazard also for user's data.Along with popularizing of smart mobile phone, the popularizing of mobile Internet, the hacker steals user data by methods such as wooden horse, viruses and brings great threat also for user's data safety.
Because the detachability of memory device in the present mobile phone, can take down as storage card, storage chip can disassemble etc. from circuit board, and particularly by the means of stealing of the Internet, the past, time slot scrambling commonly used can not adapt to the requirement that the user encrypts data.
Summary of the invention
The technical problem to be solved in the present invention is in order to overcome the defective of mobile phone data security difference of the prior art, a kind of method and apparatus that data in mobile phone is carried out safeguard protection to be provided.
The present invention solves above-mentioned technical problem by following technical proposals:
A kind of method that data in mobile phone is carried out safeguard protection, its characteristics are that it comprises ciphering process and decrypting process, and wherein ciphering process comprises the steps:
S
1, the data of input are put into buffer memory, from mobile phone input key and utilize cryptographic algorithm that these data are encrypted;
S
2, store these data and key into medium in conjunction with the ciphertext that the back generates;
Decrypting process comprises the steps:
S
3, read file and enter buffer area, from mobile phone input key and utilize decipherment algorithm that this document is decrypted, output file then.
Preferably, step S
1In, when input file to be encrypted during, earlier this document is carried out piecemeal greater than buffer memory capacity, the size of piece is encrypted each piece respectively then less than buffer memory capacity.
Preferably, step S
3In, when file to be deciphered during, earlier this document is carried out piecemeal greater than buffer memory capacity, the size of piece is decrypted each piece respectively then less than buffer memory capacity.
Preferably, step S
1In, the mode of input data is that camera is taken pictures, in keyboard input or the interface input one or more.
Preferably, this enciphering and deciphering algorithm is one or more in the following algorithm: AES, RSA, Cast128, Blowfish, Gost, IDEA.
A kind of device that data in mobile phone is carried out safeguard protection, its characteristics are that it comprises with lower module:
Encrypting module is put into buffer memory with the data of input, imports key and utilizes cryptographic algorithm that these data are encrypted from mobile phone, stores these data and key into medium in conjunction with the ciphertext that the back generates;
Deciphering module reads file and enters buffer area, imports key and utilizes decipherment algorithm that this document is decrypted from mobile phone, then output file.
Preferably, this encrypting module also comprises a big file encryption module, is used for earlier this document being carried out piecemeal when input file to be encrypted during greater than buffer memory capacity, and the size of piece is encrypted each piece respectively then less than buffer memory capacity.
Preferably, this deciphering module also comprises a big file decryption module, is used for earlier this document being carried out piecemeal when file to be deciphered during greater than buffer memory capacity, and the size of piece is decrypted each piece respectively then less than buffer memory capacity.
Positive progressive effect of the present invention is:
1, the present invention is by carrying out real-time encrypted and being stored in method in the storage medium of mobile phone with the form after encrypting to the customer data that enters mobile phone, even the stranger has stolen user's data by the whole bag of tricks, can't not see or use user's data because there being key yet;
2, the present invention can in the user mobile phone movably storage data in storage card, storage chip, the SIM card etc. carry out real-time encrypted.
Description of drawings
Fig. 1 is the data flow schematic diagram of method for security protection among the present invention.
Fig. 2 is the encryption and decryption flow chart of generic-document method for security protection among the present invention.
Fig. 3 is the encryption and decryption flow chart of big file security guard method among the present invention.
Fig. 4 is the structural representation of safety guard among the present invention.
Embodiment
Provide preferred embodiment of the present invention below in conjunction with accompanying drawing, to describe technical scheme of the present invention in detail.
As shown in Figure 1, in the present embodiment in the mobile phone input of various data substantially by the input of camera, keyboard, data-interface input and use SOME METHODS input such as data card copy.After the user started encryption function, the mobile phone data security protective device of embedding (being encryption software module) is the input equipment on the continuous monitoring user mobile phone in the normal use of user, as camera, keyboard, data-interface etc.Sensitive datas such as the photo that will store for the user, video recording, file, telephone directory are encrypted; and be stored in (storage card, memory device, SIM card etc.) in the corresponding storage medium, thereby realized protection to user data according to user's requirement.
Introduce method for security protection of the present invention below in conjunction with Fig. 2, it comprises the steps:
In addition, the user also can directly encrypt and store the data in the storage medium.In input process, forget data are encrypted directly such as the user and stored, at this moment just can encrypt the data that are stored on the medium.As Application Expansion, the user also can be by encrypting data the safety of method protection user data in transmission course of back transmission.
Introduce big file encryption-decryption process of the present invention below in conjunction with Fig. 3, it comprises the steps:
Introduce safety guard of the present invention below in conjunction with Fig. 4, it comprises as lower module:
Encrypting module is put into buffer memory with the data of input, imports key and utilizes cryptographic algorithm that these data are encrypted from mobile phone, stores these data and key into medium in conjunction with the ciphertext that the back generates.This encrypting module also comprises a big file encryption module, is used for earlier this document being carried out piecemeal when input file to be encrypted during greater than buffer memory capacity, and the size of piece is encrypted each piece respectively then less than buffer memory capacity.
In the mobile phone of Internet connection is arranged, the outflow of the continuous monitoring user data of encrypting module, in case the transfer of data that the file of having encrypted is carried out is arranged, and allow without the user, just automatically data are encrypted or interrupt transmission, to guarantee checking data security in the data procedures at validated user.
Deciphering module reads file and enters buffer area, imports key and utilizes decipherment algorithm that this document is decrypted from mobile phone, then output file.This deciphering module also comprises a big file decryption module, is used for earlier this document being carried out piecemeal when file to be deciphered during greater than buffer memory capacity, and the size of piece is decrypted each piece respectively then less than buffer memory capacity.
Though more than described the specific embodiment of the present invention, it will be understood by those of skill in the art that these only illustrate, under the prerequisite that does not deviate from principle of the present invention and essence, can make numerous variations or modification to these execution modes.Therefore, protection scope of the present invention is limited by appended claims.
Claims (8)
1. the method that data in mobile phone is carried out safeguard protection is characterized in that, it comprises ciphering process and decrypting process, and wherein ciphering process comprises the steps:
S
1, the data of input are put into buffer memory, from mobile phone input key and utilize cryptographic algorithm that these data are encrypted;
S
2, store these data and key into medium in conjunction with the ciphertext that the back generates;
Decrypting process comprises the steps:
S
3, read file and enter buffer area, from mobile phone input key and utilize decipherment algorithm that this document is decrypted, output file then.
2. the method that data in mobile phone is carried out safeguard protection as claimed in claim 1 is characterized in that step S
1In, when input file to be encrypted during, earlier this document is carried out piecemeal greater than buffer memory capacity, the size of piece is encrypted each piece respectively then less than buffer memory capacity.
3. the method that data in mobile phone is carried out safeguard protection as claimed in claim 2 is characterized in that step S
3In, when file to be deciphered during, earlier this document is carried out piecemeal greater than buffer memory capacity, the size of piece is decrypted each piece respectively then less than buffer memory capacity.
4. the method that data in mobile phone is carried out safeguard protection as claimed in claim 1 is characterized in that step S
1In, the mode of input data is that camera is taken pictures, in keyboard input or the interface input one or more.
5. the method that data in mobile phone is carried out safeguard protection as claimed in claim 1 is characterized in that, this enciphering and deciphering algorithm is one or more in the following algorithm: AES, RSA, Cast128, Blowfish, Gost, IDEA.
6. the device that data in mobile phone is carried out safeguard protection is characterized in that, it comprises with lower module:
Encrypting module is put into buffer memory with the data of input, imports key and utilizes cryptographic algorithm that these data are encrypted from mobile phone, stores these data and key into medium in conjunction with the ciphertext that the back generates;
Deciphering module reads file and enters buffer area, imports key and utilizes decipherment algorithm that this document is decrypted from mobile phone, then output file.
7. the device that data in mobile phone is carried out safeguard protection as claimed in claim 6; it is characterized in that; this encrypting module also comprises a big file encryption module; be used for when input file to be encrypted during greater than buffer memory capacity; earlier this document is carried out piecemeal; the size of piece is encrypted each piece respectively then less than buffer memory capacity.
8. the device that data in mobile phone is carried out safeguard protection as claimed in claim 7; it is characterized in that; this deciphering module also comprises a big file decryption module; be used for when file to be deciphered during greater than buffer memory capacity; earlier this document is carried out piecemeal; the size of piece is decrypted each piece respectively then less than buffer memory capacity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910045729A CN101795450A (en) | 2009-02-03 | 2009-02-03 | Method and device for carrying out security protection on mobile phone data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910045729A CN101795450A (en) | 2009-02-03 | 2009-02-03 | Method and device for carrying out security protection on mobile phone data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101795450A true CN101795450A (en) | 2010-08-04 |
Family
ID=42587828
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910045729A Pending CN101795450A (en) | 2009-02-03 | 2009-02-03 | Method and device for carrying out security protection on mobile phone data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101795450A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102495983A (en) * | 2011-12-08 | 2012-06-13 | 孙紫阳 | Method for encrypting and decrypting data of intelligent mobile terminal in real time |
CN102647712A (en) * | 2012-04-06 | 2012-08-22 | 惠州Tcl移动通信有限公司 | Mobile phone data encryption method and decryption method |
CN102665201A (en) * | 2011-12-09 | 2012-09-12 | 中兴通讯股份有限公司 | Mobile terminal and user information encryption method for same |
CN102799540A (en) * | 2012-06-21 | 2012-11-28 | 中兴通讯股份有限公司 | Method, system and terminal for encrypting/decrypting storage card by secret key of subscriber identity module |
CN102883039A (en) * | 2012-07-30 | 2013-01-16 | 成都西可科技有限公司 | Method for encrypting multimedia private diary of mobile phone |
CN104392183A (en) * | 2014-11-10 | 2015-03-04 | 深圳市元征科技股份有限公司 | Method for automatically retrieving and inspecting automobile type files by automobile diagnosis equipment |
CN104967511A (en) * | 2014-07-11 | 2015-10-07 | 腾讯科技(深圳)有限公司 | Processing method for enciphered data, and apparatus thereof |
CN105656870A (en) * | 2015-06-29 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Data transmission method, device and system |
CN106326762A (en) * | 2016-10-17 | 2017-01-11 | 广东七洲科技股份有限公司 | Data protection method realizing encryption while shooting for mobile terminal |
CN109348183A (en) * | 2018-11-20 | 2019-02-15 | 珠海格力电器股份有限公司 | Image data protection and identification system and method, camera and terminal |
CN111885397A (en) * | 2020-06-17 | 2020-11-03 | 视联动力信息技术股份有限公司 | Data encryption and decryption method and device |
-
2009
- 2009-02-03 CN CN200910045729A patent/CN101795450A/en active Pending
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102495983B (en) * | 2011-12-08 | 2014-08-27 | 孙紫阳 | Method for encrypting and decrypting data of intelligent mobile terminal in real time |
CN102495983A (en) * | 2011-12-08 | 2012-06-13 | 孙紫阳 | Method for encrypting and decrypting data of intelligent mobile terminal in real time |
CN102665201A (en) * | 2011-12-09 | 2012-09-12 | 中兴通讯股份有限公司 | Mobile terminal and user information encryption method for same |
CN102647712B (en) * | 2012-04-06 | 2017-06-16 | 惠州Tcl移动通信有限公司 | A kind of mobile phone data encryption method and decryption method |
CN102647712A (en) * | 2012-04-06 | 2012-08-22 | 惠州Tcl移动通信有限公司 | Mobile phone data encryption method and decryption method |
CN102799540A (en) * | 2012-06-21 | 2012-11-28 | 中兴通讯股份有限公司 | Method, system and terminal for encrypting/decrypting storage card by secret key of subscriber identity module |
CN102799540B (en) * | 2012-06-21 | 2017-07-14 | 南京中兴软件有限责任公司 | Utilize method, system and terminal of the user's identification card key to storage card encryption and decryption |
CN102883039A (en) * | 2012-07-30 | 2013-01-16 | 成都西可科技有限公司 | Method for encrypting multimedia private diary of mobile phone |
CN104967511B (en) * | 2014-07-11 | 2018-08-28 | 腾讯科技(深圳)有限公司 | The processing method and processing device of encryption data |
CN104967511A (en) * | 2014-07-11 | 2015-10-07 | 腾讯科技(深圳)有限公司 | Processing method for enciphered data, and apparatus thereof |
CN104392183B (en) * | 2014-11-10 | 2017-07-25 | 深圳市元征科技股份有限公司 | The method that automotive diagnostic installation automatically retrieval verifies vehicle file |
CN104392183A (en) * | 2014-11-10 | 2015-03-04 | 深圳市元征科技股份有限公司 | Method for automatically retrieving and inspecting automobile type files by automobile diagnosis equipment |
CN105656870A (en) * | 2015-06-29 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Data transmission method, device and system |
CN105656870B (en) * | 2015-06-29 | 2019-03-08 | 宇龙计算机通信科技(深圳)有限公司 | A kind of data transmission method, apparatus and system |
CN106326762A (en) * | 2016-10-17 | 2017-01-11 | 广东七洲科技股份有限公司 | Data protection method realizing encryption while shooting for mobile terminal |
CN109348183A (en) * | 2018-11-20 | 2019-02-15 | 珠海格力电器股份有限公司 | Image data protection and identification system and method, camera and terminal |
CN111885397A (en) * | 2020-06-17 | 2020-11-03 | 视联动力信息技术股份有限公司 | Data encryption and decryption method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101795450A (en) | Method and device for carrying out security protection on mobile phone data | |
US10380361B2 (en) | Secure transaction method from a non-secure terminal | |
US8457308B2 (en) | Communication system and method for protecting messages between two mobile phones | |
EP2165284B1 (en) | Method and apparatus for securing data in memory device | |
CN1889419B (en) | Method and apparatus for realizing encrypting | |
CN108880791A (en) | Cryptographic key protection method, terminal and computer readable storage medium | |
CN105260669B (en) | The transmission method and Transmission system of photo | |
CN103294961A (en) | Method and device for file encrypting/decrypting | |
CN102156843B (en) | Data encryption method and system as well as data decryption method | |
CN104573551A (en) | File processing method and mobile terminal | |
CN102831346B (en) | A kind of file protecting system carries out the method for file encryption-decryption | |
EP2835997A1 (en) | Cell phone data encryption method and decryption method | |
CN201590091U (en) | Encryption type memory card read/write device based on password authentication | |
CN103544453A (en) | USB (universal serial bus) KEY based virtual desktop file protection method and device | |
CN101646168A (en) | Data encryption method, decryption method and mobile terminal | |
CN106100851B (en) | Password management system, intelligent wristwatch and its cipher management method | |
CN101296349A (en) | Video file enciphering/deciphering system and method | |
CN102306255A (en) | Document protection method and system | |
CN102868826A (en) | Terminal and terminal data protection method | |
CN103873521A (en) | Cloud architecture-based mobile phone privacy file protection system and method | |
CN105279447A (en) | Method and device for data encryption, and method and device for data decryption | |
CN101383825A (en) | Method, apparatus and terminal implementing computer file ciphering | |
CN103177224A (en) | Data protection method and device used for terminal external storage card | |
CN104239809A (en) | File protecting method, file protecting device, file decryption method, file decryption device and terminal | |
CN111259407A (en) | Picture processing method and device, storage medium and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20100804 |