CN101795450A - Method and device for carrying out security protection on mobile phone data - Google Patents

Method and device for carrying out security protection on mobile phone data Download PDF

Info

Publication number
CN101795450A
CN101795450A CN200910045729A CN200910045729A CN101795450A CN 101795450 A CN101795450 A CN 101795450A CN 200910045729 A CN200910045729 A CN 200910045729A CN 200910045729 A CN200910045729 A CN 200910045729A CN 101795450 A CN101795450 A CN 101795450A
Authority
CN
China
Prior art keywords
data
mobile phone
file
carried out
buffer memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200910045729A
Other languages
Chinese (zh)
Inventor
丁翼如
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenyang Chenxun Simcom Technology Co Ltd
Original Assignee
Shenyang Chenxun Simcom Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenyang Chenxun Simcom Technology Co Ltd filed Critical Shenyang Chenxun Simcom Technology Co Ltd
Priority to CN200910045729A priority Critical patent/CN101795450A/en
Publication of CN101795450A publication Critical patent/CN101795450A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and a device for carrying out security protection on mobile phone data. The method comprises an encryption process and a decryption process, wherein the encryption process comprises the following steps of: (S1) putting input data into a buffer memory, inputting a secret key from the mobile phone and encrypting the data by utilizing an encryption algorithm; and (S2) storing a cipher text generated after combining the data and the secret key to a medium; and the decryption process comprises the following steps of: (S3) making a read file enter the buffer memory, inputting the secret key from the mobile phone and decrypting the file by utilizing a decryption algorithm; and then outputting the file. In the invention, client data entering the mobile phone is encrypted in real time and stored in the memory medium of the mobile phone in an encrypted form, thus even if a stranger steals the data of the user through various methods, the stranger cannot see or use the data of the user without the secret key. The invention can encrypt memory data in mobile memory cards, memory chips and SIM (subscriber identity module) cards in mobile phones of users, and the like in real time.

Description

Data in mobile phone is carried out the method and apparatus of safeguard protection
Technical field
The present invention relates to a kind of method and apparatus that data are carried out safeguard protection, particularly relate to a kind of method and apparatus that data in mobile phone is carried out safeguard protection.
Background technology
Mobile phone is more and more universal as the instrument of the frequent use in people's daily life, and science and technology development has also given mobile phone various functions, and the capacity of mobile phone storage data is increasing.In these data, there are many informational needs that the people beyond the cellie is maintained secrecy.And because the portability of mobile phone causes mobile phone often to be lost, the detachability of data storage card etc. have brought bigger potential safety hazard also for user's data.Along with popularizing of smart mobile phone, the popularizing of mobile Internet, the hacker steals user data by methods such as wooden horse, viruses and brings great threat also for user's data safety.
Because the detachability of memory device in the present mobile phone, can take down as storage card, storage chip can disassemble etc. from circuit board, and particularly by the means of stealing of the Internet, the past, time slot scrambling commonly used can not adapt to the requirement that the user encrypts data.
Summary of the invention
The technical problem to be solved in the present invention is in order to overcome the defective of mobile phone data security difference of the prior art, a kind of method and apparatus that data in mobile phone is carried out safeguard protection to be provided.
The present invention solves above-mentioned technical problem by following technical proposals:
A kind of method that data in mobile phone is carried out safeguard protection, its characteristics are that it comprises ciphering process and decrypting process, and wherein ciphering process comprises the steps:
S 1, the data of input are put into buffer memory, from mobile phone input key and utilize cryptographic algorithm that these data are encrypted;
S 2, store these data and key into medium in conjunction with the ciphertext that the back generates;
Decrypting process comprises the steps:
S 3, read file and enter buffer area, from mobile phone input key and utilize decipherment algorithm that this document is decrypted, output file then.
Preferably, step S 1In, when input file to be encrypted during, earlier this document is carried out piecemeal greater than buffer memory capacity, the size of piece is encrypted each piece respectively then less than buffer memory capacity.
Preferably, step S 3In, when file to be deciphered during, earlier this document is carried out piecemeal greater than buffer memory capacity, the size of piece is decrypted each piece respectively then less than buffer memory capacity.
Preferably, step S 1In, the mode of input data is that camera is taken pictures, in keyboard input or the interface input one or more.
Preferably, this enciphering and deciphering algorithm is one or more in the following algorithm: AES, RSA, Cast128, Blowfish, Gost, IDEA.
A kind of device that data in mobile phone is carried out safeguard protection, its characteristics are that it comprises with lower module:
Encrypting module is put into buffer memory with the data of input, imports key and utilizes cryptographic algorithm that these data are encrypted from mobile phone, stores these data and key into medium in conjunction with the ciphertext that the back generates;
Deciphering module reads file and enters buffer area, imports key and utilizes decipherment algorithm that this document is decrypted from mobile phone, then output file.
Preferably, this encrypting module also comprises a big file encryption module, is used for earlier this document being carried out piecemeal when input file to be encrypted during greater than buffer memory capacity, and the size of piece is encrypted each piece respectively then less than buffer memory capacity.
Preferably, this deciphering module also comprises a big file decryption module, is used for earlier this document being carried out piecemeal when file to be deciphered during greater than buffer memory capacity, and the size of piece is decrypted each piece respectively then less than buffer memory capacity.
Positive progressive effect of the present invention is:
1, the present invention is by carrying out real-time encrypted and being stored in method in the storage medium of mobile phone with the form after encrypting to the customer data that enters mobile phone, even the stranger has stolen user's data by the whole bag of tricks, can't not see or use user's data because there being key yet;
2, the present invention can in the user mobile phone movably storage data in storage card, storage chip, the SIM card etc. carry out real-time encrypted.
Description of drawings
Fig. 1 is the data flow schematic diagram of method for security protection among the present invention.
Fig. 2 is the encryption and decryption flow chart of generic-document method for security protection among the present invention.
Fig. 3 is the encryption and decryption flow chart of big file security guard method among the present invention.
Fig. 4 is the structural representation of safety guard among the present invention.
Embodiment
Provide preferred embodiment of the present invention below in conjunction with accompanying drawing, to describe technical scheme of the present invention in detail.
As shown in Figure 1, in the present embodiment in the mobile phone input of various data substantially by the input of camera, keyboard, data-interface input and use SOME METHODS input such as data card copy.After the user started encryption function, the mobile phone data security protective device of embedding (being encryption software module) is the input equipment on the continuous monitoring user mobile phone in the normal use of user, as camera, keyboard, data-interface etc.Sensitive datas such as the photo that will store for the user, video recording, file, telephone directory are encrypted; and be stored in (storage card, memory device, SIM card etc.) in the corresponding storage medium, thereby realized protection to user data according to user's requirement.
Introduce method for security protection of the present invention below in conjunction with Fig. 2, it comprises the steps:
Step 101 is put into buffer memory with the data of input, imports key and utilizes cryptographic algorithm that these data are encrypted from mobile phone.Wherein, after data were put into buffer memory, mobile phone can judge whether and need encrypt data, if do not need to encrypt then directly storage.When cryptographic algorithm is selected, encryption software has the algorithm of multistage difficulty, and the encryption time that needs is also different with the resource that needs, and mainly the resource that needs is the internal memory (as buffer memory) of mobile phone, in actual applications, user's therefrom balance selection as requested.The algorithm that file is encrypted is a lot, as: AES, RSA, Cast128, Blowfish, Gost, IDEA etc. are general cryptographic algorithm.
Step 102 stores these data and key into medium in conjunction with the ciphertext that the back generates.
Step 103 reads file and enters buffer area, imports key and utilizes decipherment algorithm that this document is decrypted from mobile phone, then output file.When data were deciphered, the user can carry out reverse operating as key to ciphered data by password or fingerprint etc., can check or by operations such as software for editing make amendment by display screen.After the user withdrawed from operation, data automatically restored to encrypted state.In this process, user's data is stored with cipher mode always.
In addition, the user also can directly encrypt and store the data in the storage medium.In input process, forget data are encrypted directly such as the user and stored, at this moment just can encrypt the data that are stored on the medium.As Application Expansion, the user also can be by encrypting data the safety of method protection user data in transmission course of back transmission.
Introduce big file encryption-decryption process of the present invention below in conjunction with Fig. 3, it comprises the steps:
Step 201, big file encryption input.
Step 202 is carried out piecemeal to big file, and the size that guarantees piece is less than buffer memory capacity.
Step 203 is respectively to storing after each block encryption.
Step 204 is decrypted back output to file, and this decrypting process is with identical to big file encryption Principle of Process.
Introduce safety guard of the present invention below in conjunction with Fig. 4, it comprises as lower module:
Encrypting module is put into buffer memory with the data of input, imports key and utilizes cryptographic algorithm that these data are encrypted from mobile phone, stores these data and key into medium in conjunction with the ciphertext that the back generates.This encrypting module also comprises a big file encryption module, is used for earlier this document being carried out piecemeal when input file to be encrypted during greater than buffer memory capacity, and the size of piece is encrypted each piece respectively then less than buffer memory capacity.
In the mobile phone of Internet connection is arranged, the outflow of the continuous monitoring user data of encrypting module, in case the transfer of data that the file of having encrypted is carried out is arranged, and allow without the user, just automatically data are encrypted or interrupt transmission, to guarantee checking data security in the data procedures at validated user.
Deciphering module reads file and enters buffer area, imports key and utilizes decipherment algorithm that this document is decrypted from mobile phone, then output file.This deciphering module also comprises a big file decryption module, is used for earlier this document being carried out piecemeal when file to be deciphered during greater than buffer memory capacity, and the size of piece is decrypted each piece respectively then less than buffer memory capacity.
Though more than described the specific embodiment of the present invention, it will be understood by those of skill in the art that these only illustrate, under the prerequisite that does not deviate from principle of the present invention and essence, can make numerous variations or modification to these execution modes.Therefore, protection scope of the present invention is limited by appended claims.

Claims (8)

1. the method that data in mobile phone is carried out safeguard protection is characterized in that, it comprises ciphering process and decrypting process, and wherein ciphering process comprises the steps:
S 1, the data of input are put into buffer memory, from mobile phone input key and utilize cryptographic algorithm that these data are encrypted;
S 2, store these data and key into medium in conjunction with the ciphertext that the back generates;
Decrypting process comprises the steps:
S 3, read file and enter buffer area, from mobile phone input key and utilize decipherment algorithm that this document is decrypted, output file then.
2. the method that data in mobile phone is carried out safeguard protection as claimed in claim 1 is characterized in that step S 1In, when input file to be encrypted during, earlier this document is carried out piecemeal greater than buffer memory capacity, the size of piece is encrypted each piece respectively then less than buffer memory capacity.
3. the method that data in mobile phone is carried out safeguard protection as claimed in claim 2 is characterized in that step S 3In, when file to be deciphered during, earlier this document is carried out piecemeal greater than buffer memory capacity, the size of piece is decrypted each piece respectively then less than buffer memory capacity.
4. the method that data in mobile phone is carried out safeguard protection as claimed in claim 1 is characterized in that step S 1In, the mode of input data is that camera is taken pictures, in keyboard input or the interface input one or more.
5. the method that data in mobile phone is carried out safeguard protection as claimed in claim 1 is characterized in that, this enciphering and deciphering algorithm is one or more in the following algorithm: AES, RSA, Cast128, Blowfish, Gost, IDEA.
6. the device that data in mobile phone is carried out safeguard protection is characterized in that, it comprises with lower module:
Encrypting module is put into buffer memory with the data of input, imports key and utilizes cryptographic algorithm that these data are encrypted from mobile phone, stores these data and key into medium in conjunction with the ciphertext that the back generates;
Deciphering module reads file and enters buffer area, imports key and utilizes decipherment algorithm that this document is decrypted from mobile phone, then output file.
7. the device that data in mobile phone is carried out safeguard protection as claimed in claim 6; it is characterized in that; this encrypting module also comprises a big file encryption module; be used for when input file to be encrypted during greater than buffer memory capacity; earlier this document is carried out piecemeal; the size of piece is encrypted each piece respectively then less than buffer memory capacity.
8. the device that data in mobile phone is carried out safeguard protection as claimed in claim 7; it is characterized in that; this deciphering module also comprises a big file decryption module; be used for when file to be deciphered during greater than buffer memory capacity; earlier this document is carried out piecemeal; the size of piece is decrypted each piece respectively then less than buffer memory capacity.
CN200910045729A 2009-02-03 2009-02-03 Method and device for carrying out security protection on mobile phone data Pending CN101795450A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910045729A CN101795450A (en) 2009-02-03 2009-02-03 Method and device for carrying out security protection on mobile phone data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910045729A CN101795450A (en) 2009-02-03 2009-02-03 Method and device for carrying out security protection on mobile phone data

Publications (1)

Publication Number Publication Date
CN101795450A true CN101795450A (en) 2010-08-04

Family

ID=42587828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910045729A Pending CN101795450A (en) 2009-02-03 2009-02-03 Method and device for carrying out security protection on mobile phone data

Country Status (1)

Country Link
CN (1) CN101795450A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102495983A (en) * 2011-12-08 2012-06-13 孙紫阳 Method for encrypting and decrypting data of intelligent mobile terminal in real time
CN102647712A (en) * 2012-04-06 2012-08-22 惠州Tcl移动通信有限公司 Mobile phone data encryption method and decryption method
CN102665201A (en) * 2011-12-09 2012-09-12 中兴通讯股份有限公司 Mobile terminal and user information encryption method for same
CN102799540A (en) * 2012-06-21 2012-11-28 中兴通讯股份有限公司 Method, system and terminal for encrypting/decrypting storage card by secret key of subscriber identity module
CN102883039A (en) * 2012-07-30 2013-01-16 成都西可科技有限公司 Method for encrypting multimedia private diary of mobile phone
CN104392183A (en) * 2014-11-10 2015-03-04 深圳市元征科技股份有限公司 Method for automatically retrieving and inspecting automobile type files by automobile diagnosis equipment
CN104967511A (en) * 2014-07-11 2015-10-07 腾讯科技(深圳)有限公司 Processing method for enciphered data, and apparatus thereof
CN105656870A (en) * 2015-06-29 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Data transmission method, device and system
CN106326762A (en) * 2016-10-17 2017-01-11 广东七洲科技股份有限公司 Data protection method realizing encryption while shooting for mobile terminal
CN109348183A (en) * 2018-11-20 2019-02-15 珠海格力电器股份有限公司 Image data protection and identification system and method, camera and terminal
CN111885397A (en) * 2020-06-17 2020-11-03 视联动力信息技术股份有限公司 Data encryption and decryption method and device

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102495983B (en) * 2011-12-08 2014-08-27 孙紫阳 Method for encrypting and decrypting data of intelligent mobile terminal in real time
CN102495983A (en) * 2011-12-08 2012-06-13 孙紫阳 Method for encrypting and decrypting data of intelligent mobile terminal in real time
CN102665201A (en) * 2011-12-09 2012-09-12 中兴通讯股份有限公司 Mobile terminal and user information encryption method for same
CN102647712B (en) * 2012-04-06 2017-06-16 惠州Tcl移动通信有限公司 A kind of mobile phone data encryption method and decryption method
CN102647712A (en) * 2012-04-06 2012-08-22 惠州Tcl移动通信有限公司 Mobile phone data encryption method and decryption method
CN102799540A (en) * 2012-06-21 2012-11-28 中兴通讯股份有限公司 Method, system and terminal for encrypting/decrypting storage card by secret key of subscriber identity module
CN102799540B (en) * 2012-06-21 2017-07-14 南京中兴软件有限责任公司 Utilize method, system and terminal of the user's identification card key to storage card encryption and decryption
CN102883039A (en) * 2012-07-30 2013-01-16 成都西可科技有限公司 Method for encrypting multimedia private diary of mobile phone
CN104967511B (en) * 2014-07-11 2018-08-28 腾讯科技(深圳)有限公司 The processing method and processing device of encryption data
CN104967511A (en) * 2014-07-11 2015-10-07 腾讯科技(深圳)有限公司 Processing method for enciphered data, and apparatus thereof
CN104392183B (en) * 2014-11-10 2017-07-25 深圳市元征科技股份有限公司 The method that automotive diagnostic installation automatically retrieval verifies vehicle file
CN104392183A (en) * 2014-11-10 2015-03-04 深圳市元征科技股份有限公司 Method for automatically retrieving and inspecting automobile type files by automobile diagnosis equipment
CN105656870A (en) * 2015-06-29 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Data transmission method, device and system
CN105656870B (en) * 2015-06-29 2019-03-08 宇龙计算机通信科技(深圳)有限公司 A kind of data transmission method, apparatus and system
CN106326762A (en) * 2016-10-17 2017-01-11 广东七洲科技股份有限公司 Data protection method realizing encryption while shooting for mobile terminal
CN109348183A (en) * 2018-11-20 2019-02-15 珠海格力电器股份有限公司 Image data protection and identification system and method, camera and terminal
CN111885397A (en) * 2020-06-17 2020-11-03 视联动力信息技术股份有限公司 Data encryption and decryption method and device

Similar Documents

Publication Publication Date Title
CN101795450A (en) Method and device for carrying out security protection on mobile phone data
US10380361B2 (en) Secure transaction method from a non-secure terminal
US8457308B2 (en) Communication system and method for protecting messages between two mobile phones
EP2165284B1 (en) Method and apparatus for securing data in memory device
CN1889419B (en) Method and apparatus for realizing encrypting
CN105260669B (en) The transmission method and Transmission system of photo
CN103294961A (en) Method and device for file encrypting/decrypting
CN108880791A (en) Cryptographic key protection method, terminal and computer readable storage medium
CN102156843B (en) Data encryption method and system as well as data decryption method
CN102334124A (en) File protection method and device
CN104573551A (en) File processing method and mobile terminal
CN102831346B (en) A kind of file protecting system carries out the method for file encryption-decryption
CN102750497A (en) Method and device for deciphering private information
EP2835997A1 (en) Cell phone data encryption method and decryption method
CN201590091U (en) Encryption type memory card read/write device based on password authentication
CN103544453A (en) USB (universal serial bus) KEY based virtual desktop file protection method and device
CN101646168A (en) Data encryption method, decryption method and mobile terminal
CN106100851B (en) Password management system, intelligent wristwatch and its cipher management method
CN101296349A (en) Video file enciphering/deciphering system and method
CN102306255A (en) Document protection method and system
CN102868826A (en) Terminal and terminal data protection method
CN103873521A (en) Cloud architecture-based mobile phone privacy file protection system and method
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN101383825A (en) Method, apparatus and terminal implementing computer file ciphering
CN103177224A (en) Data protection method and device used for terminal external storage card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100804