CN104469752A - Encryption method and device and terminal - Google Patents

Encryption method and device and terminal Download PDF

Info

Publication number
CN104469752A
CN104469752A CN201410657385.9A CN201410657385A CN104469752A CN 104469752 A CN104469752 A CN 104469752A CN 201410657385 A CN201410657385 A CN 201410657385A CN 104469752 A CN104469752 A CN 104469752A
Authority
CN
China
Prior art keywords
equipment
encryption
encrypted card
identity information
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410657385.9A
Other languages
Chinese (zh)
Other versions
CN104469752B (en
Inventor
申世安
刘英东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen ZTE Mobile Telecom Co Ltd
Original Assignee
Shenzhen ZTE Mobile Telecom Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen ZTE Mobile Telecom Co Ltd filed Critical Shenzhen ZTE Mobile Telecom Co Ltd
Priority to CN201410657385.9A priority Critical patent/CN104469752B/en
Publication of CN104469752A publication Critical patent/CN104469752A/en
Application granted granted Critical
Publication of CN104469752B publication Critical patent/CN104469752B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses an encryption method and device and a terminal. The method includes the following steps that identity information of equipment is acquired through an encryption card; an encryption key is generated according to the identity information; the equipment is encrypted through the encryption key. By the implementation of the encryption method and device and the terminal, the identity information of the equipment is acquired through the encryption card, the encryption key is generated according to the identity information, and the equipment is encrypted through the encryption key. The equipment is encrypted in the mode that the external encryption card is inserted, the equipment is encrypted through the encryption key independently generated by the encryption card, the simplification of an encryption password is avoided, and the encryption safety of the equipment is improved.

Description

A kind of encryption method, device and terminal
Technical field
The present invention relates to communication technical field, particularly relate to a kind of encryption method, device and terminal.
Background technology
In prior art, usually have following several to the cipher mode of terminal equipment:
1. by the software program that terminal equipment is built-in, this terminal equipment is encrypted, such as, by software program setting program password or system password, this terminal is encrypted;
2. by the server that is connected with this terminal unit remote or other terminal equipment, this terminal equipment is encrypted;
Adopt above-mentioned terminal equipment encryption method, on the one hand, the codon pair terminal equipment using folk prescription to determine is encrypted, and namely by programming or by Remote Acquisitioning, the mode that encryption key obtains is comparatively single, is easily cracked; On the other hand, adopt above-mentioned encryption method, need to rely on local password create-rule or long-range password create-rule, simultaneously, adopt local password create-rule be easily cracked or steal, adopt long-range password create-rule to be easily stolen in communication process and usurp.Therefore, in prior art, the defect that encryption key is comparatively single, fail safe is lower is existed to the encryption method of terminal equipment.
Summary of the invention
In view of this, the technical problem to be solved in the present invention is to provide a kind of encryption method, device and terminal, to solve in prior art, there is to the encryption method of terminal equipment the defect that encryption key is comparatively single, fail safe is lower.。
It is as follows that the present invention solves the problems of the technologies described above adopted technical scheme:
Construct a kind of encryption method, the method comprises:
The identity information of equipment is obtained by encrypted card;
Encryption key is generated according to identity information;
By encryption keys equipment.
Preferably, comprised further by the identity information of encrypted card acquisition equipment:
Judge whether encrypted card plugs together to equipment;
If encrypted card has plugged together to equipment, then set up the communication linkage between encrypted card and equipment;
If encrypted card and device separates, then remove encryption key, and disconnect communication linkage.
Preferably, also comprised by the identity information of encrypted card acquisition equipment:
If encrypted card and the built vertical communication linkage of equipment, then linked by encrypted card coded communication, generate encrypted link;
Generate enciphered message by encrypted card, and by encrypted link, enciphered message is sent to equipment;
Determined by equipment and extract the identity information matched with enciphered message, wherein, identity information comprises equipment Serial Number, system component identifications and application program identification.
Preferably, generate encryption key according to identity information specifically to comprise:
Determine the Encryption permissions of encrypted card, wherein, determine local Encryption permissions by encrypted card, or obtain Encryption permissions by remote linkage;
Resolve identity information according to Encryption permissions, and generate encryption key by predetermined manner and analysis result.
Preferably, by also comprising after encryption keys equipment:
By pattern, letter, numeral, physical button or their combination, generating solution lock signal;
If unlocking signal is verified through encrypted card, then unlocker device.
The invention allows for a kind of encryption device, this device comprises:
Identity information acquisition module, for obtaining the identity information of equipment by encrypted card;
Encryption key generation module, for generating encryption key according to identity information;
Encryption keys module, for passing through encryption keys equipment.
Preferably, identity information acquisition module comprise plug together condition adjudgement unit, communication linkage sets up unit and communication linkage releasing unit, wherein,
Plug together condition adjudgement unit for judging whether encrypted card plugs together to equipment;
If communication linkage is set up unit and plugged together to equipment for encrypted card, then set up the communication linkage between encrypted card and equipment;
If communication linkage releasing unit is used for encrypted card and device separates, then removes encryption key, and disconnect communication linkage.
Preferably, identity information acquisition module also comprises encrypted link generation unit, enciphered message transmitting element, identity information extraction unit, wherein,
If encrypted link generation unit is used for encrypted card and the built vertical communication linkage of equipment, then linked by encrypted card coded communication, generate encrypted link;
Enciphered message transmitting element is used for generating enciphered message by encrypted card, and by encrypted link, enciphered message is sent to equipment;
Identity information extraction unit is used for being determined by equipment and extracting the identity information matched with enciphered message, and wherein, identity information comprises equipment Serial Number, system component identifications and application program identification.
Preferably, encryption key generation module comprises Encryption permissions determining unit and encrypting key generating unit, wherein,
Encryption permissions determining unit, for determining the Encryption permissions of encrypted card, wherein, is determined local Encryption permissions by encrypted card, or is obtained Encryption permissions by remote linkage;
Encrypting key generating unit is used for resolving identity information according to Encryption permissions, and generates encryption key by predetermined manner and analysis result.
Device also comprises deciphering module, and deciphering module comprises unlocking information generation unit and equipment solution lock unit, wherein,
Unlocking information generation unit is used for by pattern, letter, numeral, physical button or their combination, generating solution lock signal;
Be verified through encrypted card if equipment solution lock unit is used for unlocking signal, then unlocker device.
The invention allows for a kind of ciphering terminal, this terminal comprises above-mentioned encryption device.
Implement the present invention, obtained the identity information of equipment by encrypted card, and generate encryption key according to identity information, and then by encryption keys equipment.The mode achieving to insert external encryption card is encrypted equipment, and is encrypted equipment by the encryption key that encrypted card independently generates, and avoids the unification of Crypted password, enhances the fail safe of devices encrypt.
Accompanying drawing explanation
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the flow chart of the unlock method that the present invention proposes;
Fig. 2 is the flow chart of the encryption method that the present invention second preferred embodiment proposes;
Fig. 3 is the flow chart of the encryption method that the present invention the 3rd preferred embodiment proposes;
Fig. 4 is the flow chart of the encryption method that the present invention the 4th preferred embodiment proposes;
Fig. 5 is the flow chart of the encryption method that the present invention the 5th preferred embodiment proposes;
Fig. 6 is the structured flowchart of the encryption device that the present invention proposes.
Embodiment
In order to make technical problem to be solved by this invention, technical scheme and beneficial effect clearly, understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Embodiment one
Fig. 1 is the flow chart of the encryption method that the present invention proposes.The method comprises:
S1, obtains the identity information of equipment by encrypted card.
Particularly, the encrypted card that the present embodiment adopts is equipped with independently functional module, such as micro treatment module, encrypting module, deciphering module, communication module and memory module etc.The encrypted card that the present embodiment adopts can be smart machine SD storage card formed objects, compatible to SD card draw-in groove and the corresponding interface.The encrypted card that the present embodiment adopts can also be the card with specific size and special interface.
Particularly, the equipment using this encrypted card to carry out unlocking operation is provided with the draw-in groove matched with this encrypted card.Be appreciated that in draw-in groove the interface contact or interface pin that are provided with and set up communication linkage with above-mentioned encrypted card.
Further, when encrypted card inserts described equipment, obtained the identity information of equipment by the communication interface of encrypted card and equipment;
Further, obtained the identity information of equipment by interface contact or interface pin, or obtained the identity information of equipment by wireless communication link (NFC, bluetooth, WiFi etc.).
S2, generates encryption key according to identity information.
By the functional module of encrypted card inside, relevant treatment is carried out to the identity information got, particularly, after encrypted card receives the identity information of equipment end, by calling the establishment module of encrypted card, such as micro treatment module, encrypting module, deciphering module and memory module etc., generate encryption key by these functional modules.Such as, in the memory module of encrypted card, transfer the create-rule of encryption key, then call microprocessor and generate encryption key according to create-rule and identity information.
Further, generate corresponding encryption key according to different encrypted cards, or generate different encryption keys according to same encrypted card;
Further, different cryptographic objects is determined according to different encryption keys;
Further, the corresponding functional module of this equipment is encrypted according to different cryptographic objects.
S3, by encryption keys equipment.
Particularly, when equipment receives the encryption key of encrypted card generation, initiatively this equipment is encrypted by this encryption key, or is encrypted by this encryption key of this equipment calls.
Further, encrypt the corresponding functional module of this equipment according to different cryptographic objects, meanwhile, determine the secret grade of corresponding functional module, such as, Cipher Strength grade, encrypting user level grade and decrypted user Permission Levels etc.
Further, be encrypted this equipment according to one or more encryption key, being appreciated that can by the memory module of the first encryption keys equipment, by the call module of the second encryption keys equipment, by the network linking module etc. of the 3rd encryption keys equipment.
The beneficial effect of the present embodiment is, is obtained the identity information of equipment by encrypted card, and generates encryption key according to identity information, and then by encryption keys equipment.The mode achieving to insert external encryption card is encrypted equipment, and is encrypted equipment by the encryption key that encrypted card independently generates, and avoids the unification of Crypted password, enhances the fail safe of devices encrypt.
Embodiment two
Fig. 2 is the flow chart of the encryption method that the present invention second preferred embodiment proposes.Based on above-described embodiment, the identity information being obtained equipment by encrypted card is comprised further:
S11, judges whether encrypted card plugs together to equipment.By arrange in draw-in groove set up the interface contact of communication linkage with above-mentioned encrypted card or interface pin judges whether encrypted card plugs together to equipment, be appreciated that, when using the close contacts such as NFC to connect, judge whether that equipment to be connected enters effective join domain.
S12, if encrypted card has plugged together to equipment, has then set up the communication linkage between encrypted card and equipment.The communication linkage being appreciated that between encrypted card with equipment can be that NFC communication links, bluetooth communication link or WiFi communication link.
S13, if encrypted card and device separates, then removes encryption key, and disconnects communication linkage.When encrypted card generates encryption key, in order to prevent the encryption key generated from revealing, when when encrypted card and device separates, remove the encryption key generated.
The beneficial effect of the present embodiment is, by judging whether encrypted card plugs together to equipment, if encrypted card has plugged together to equipment, then setting up the communication linkage between encrypted card and equipment, if encrypted card and device separates, then having removed encryption key, and disconnect communication linkage.Achieve when encrypted card inserts equipment, be namely encrypted, immediately insert instant encryption, immediately extract, immediately remove encryption key, reduce the possibility that encryption key is revealed.
Embodiment three
Fig. 3 is the flow chart of the encryption method that the present invention the 3rd preferred embodiment proposes.Based on above-described embodiment, the identity information being obtained equipment by encrypted card is also comprised:
S14, if encrypted card and the built vertical communication linkage of equipment, is then linked by encrypted card coded communication, generates encrypted link.
Be appreciated that, in equipment end, encrypting module is not set, and encrypting module is built in encrypted card, the beneficial effect brought like this is, encrypting module independent operating, thus the encryption key that encrypted card is generated independent to exist and interference-free, simultaneously, miscellaneous equipment does not read the authority of this encrypted card yet, thus ensure that the fail safe of encrypted card.
Further, encrypt the communication linkage between equipment end by encrypted card, ensure that encryption key can not be stolen in the process of transmission, improve the fail safe of cipher key delivery.
S15, generates enciphered message by encrypted card, and by encrypted link, enciphered message is sent to equipment.
As above, described in example, one or more encryption key can be sent by encrypted card to equipment end single.
S16, is determined by equipment and extracts the identity information matched with enciphered message.Wherein, identity information comprises equipment Serial Number, system component identifications and application program identification.
Wherein, equipment Serial Number comprises that the sequence of equipment complete machine is good, the sequence number etc. of hardware module;
System buildup mark comprises call component identification (such as transmitter mark, receiver mark and voice channel mark etc.), the memory module mark (such as storage inside mark, exterior storage mark, system storage mark and user's storaging mark etc.) of equipment.
Further, in order to increase applicability and the practicality of encrypted card, on the one hand, same encrypted card can be used for encrypting different equipment end, and on the other hand, same equipment can use different encrypted cards to be encrypted.
The beneficial effect of the present embodiment is, is linked by encrypted card coded communication, generates encrypted link, and by encrypted link, enciphered message is sent to equipment, is subsequently determined by equipment and extracts the identity information matched with enciphered message.Enhance the fail safe in encryption key transmitting procedure, meanwhile, obtain corresponding identity information according to different encryption requirements, improve the operability of devices encrypt.
Embodiment four
Fig. 4 is the flow chart of the encryption method that the present invention the 4th preferred embodiment proposes.Based on above-described embodiment, generate encryption key according to identity information and specifically comprise:
S21, determines the Encryption permissions of encrypted card.Wherein, determine local Encryption permissions by encrypted card, or obtain Encryption permissions by remote linkage.Particularly, the Encryption permissions that the Encryption permissions of this devices encrypt or this encrypted card possess can be determined according to the functional module of encrypted card inside, Encryption permissions can also be obtained by remote linkage, be appreciated that, by a rear mode, for same encrypted card at different use scenes or when inserting different equipment, correspondingly obtain the Encryption permissions mated from remote linkage.
S22, resolves identity information according to Encryption permissions, and generates encryption key by predetermined manner and analysis result.
Due to the corresponding corresponding identity information of different Encryption permissions, particularly, example is encrypted as with the encrypted card of smart mobile phone, if the identity information of mobile phone has equipment Serial Number mark, system component identifications and application program identification, meanwhile, Encryption permissions specifically: the encryption of equipment physical hardware or device software encryption, network layer encryption in application layer encryption or system component, the encryption of game class application program or the encryption of voice call class application program etc. in system component.
The beneficial effect of the present embodiment is, by determining the Encryption permissions of encrypted card, and resolves identity information according to Encryption permissions, then generates encryption key by predetermined manner and analysis result.Make for same encrypted card at different use scenes or insert different equipment time, the Encryption permissions mated correspondingly is obtained from remote linkage, improve the usability that encrypted card carries out devices encrypt, simultaneously, by Encryption permissions determination encryption key, segment cryptographic object and the encryption level of encryption key, improve Consumer's Experience.
Embodiment five
Fig. 5 is the flow chart of the encryption method that the present invention the 5th preferred embodiment proposes.Based on above-described embodiment, by also comprising after encryption keys equipment:
S41, by pattern, letter, numeral, physical button or their combination, generates decrypted signal.
As above described in example, input corresponding pattern, letter, numeral, physical button or their combination by mobile phone terminal, generate decrypted signal, then by above-mentioned encrypted link, decrypted signal is transferred to the encrypted card plugging together connection.
S42, if decrypted signal is verified through encrypted card, then unlocker device.
Be appreciated that all encryption keys generate, decrypted signal deciphering is all encapsulated in encrypted card and completes, thus ensure that encrypting and decrypting process is carried out independent of equipment, ensure the fail safe of encrypting and decrypting.
The beneficial effect of the present embodiment is, by pattern, letter, numeral, physical button or their combination, generates decrypted signal, and according to the decrypted signal be verified, then decryption device.Encrypting and decrypting is operated carry out independent of equipment, ensure that the fail safe that encrypting and decrypting operates.
One of ordinary skill in the art will appreciate that all or part of step realized in above-described embodiment method is that the hardware that can control to be correlated with by program completes, described program can be stored in a computer read/write memory medium, described storage medium, as ROM/RAM, disk, CD etc.
Embodiment six
Fig. 6 is the structured flowchart of the encryption device that the present invention proposes.The invention allows for a kind of encryption device, this device comprises:
Identity information acquisition module 10, for obtaining the identity information of equipment by encrypted card;
Encryption key generation module 20, for generating encryption key according to identity information;
Encryption keys module 30, for passing through encryption keys equipment.
Preferably, identity information acquisition module 10 comprise plug together condition adjudgement unit 11, communication linkage sets up unit 12 and communication linkage releasing unit 13, wherein,
Plug together condition adjudgement unit 11 for judging whether encrypted card plugs together to equipment;
If communication linkage is set up unit 12 and plugged together to equipment for encrypted card, then set up the communication linkage between encrypted card and equipment;
If communication linkage releasing unit 13 for encrypted card and device separates, then removes encryption key, and disconnects communication linkage.
Preferably, identity information acquisition module 10 also comprises encrypted link generation unit 14, enciphered message transmitting element 15, identity information extraction unit 16, wherein,
If encrypted link generation unit 14 for encrypted card and the built vertical communication linkage of equipment, is then linked by encrypted card coded communication, generate encrypted link;
Enciphered message for generating enciphered message by encrypted card, and is sent to equipment by encrypted link by enciphered message transmitting element 15;
Identity information extraction unit 16 is for determining by equipment and extracting the identity information matched with enciphered message, and wherein, identity information comprises equipment Serial Number, system component identifications and application program identification.
Preferably, encryption key generation module 20 comprises Encryption permissions determining unit 21 and encrypting key generating unit 22, wherein,
Encryption permissions determining unit 21, for determining the Encryption permissions of encrypted card, wherein, is determined local Encryption permissions by encrypted card, or is obtained Encryption permissions by remote linkage;
Encrypting key generating unit 22 for resolving identity information according to Encryption permissions, and generates encryption key by predetermined manner and analysis result.
Device also comprises deciphering module 40, and deciphering module comprises enciphered message generation unit 41 and devices encrypt unit 42, wherein,
Enciphered message generation unit 41, for by pattern, letter, numeral, physical button or their combination, generates decrypted signal;
If devices encrypt unit 42 is verified through encrypted card for coded signal, then unlocker device.
The invention allows for a kind of ciphering terminal, this terminal comprises above-mentioned encryption device.
Implement the present invention, obtained the identity information of equipment by encrypted card, and generate encryption key according to identity information, and then by encryption keys equipment.The mode achieving to insert external encryption card is encrypted equipment, and is encrypted equipment by the encryption key that encrypted card independently generates, and avoids the unification of Crypted password, enhances the fail safe of devices encrypt.
This encryption device may be used for mobile phone, or there are other communication terminals of conversation function of mobile phone, such as, in smart mobile phone etc., can be run on the software unit in these communication terminals, also can be integrated in these communication terminals as independently suspension member or run in the application system of these mobile terminals.
It should be noted that, the technical characteristic in said method embodiment is all corresponding applicable at this device, no longer repeats here.
Above with reference to the accompanying drawings of the preferred embodiments of the present invention, not thereby limit to interest field of the present invention.Those skilled in the art do not depart from the scope and spirit of the present invention, and multiple flexible program can be had to realize the present invention, and the feature such as an embodiment can be used for another embodiment and obtains another embodiment.All use do within technical conceive of the present invention any amendment, equivalently replace and improve, all should within interest field of the present invention.

Claims (10)

1. an encryption method, is characterized in that, described method comprises:
The identity information of equipment is obtained by encrypted card;
Encryption key is generated according to described identity information;
By equipment described in described encryption keys.
2. encryption method according to claim 1, is characterized in that, the described identity information by encrypted card acquisition equipment comprises further:
Judge whether described encrypted card plugs together to described equipment;
If described encrypted card has plugged together to described equipment, then set up the communication linkage between described encrypted card and described equipment;
If described encrypted card and described device separates, then remove described encryption key, and disconnect described communication linkage.
3. encryption method according to claim 2, is characterized in that, the described identity information by encrypted card acquisition equipment also comprises:
If described encrypted card and described equipment have set up described communication linkage, then encrypt described communication linkage by described encrypted card, generate encrypted link;
Generate enciphered message by described encrypted card, and by described encrypted link, described enciphered message is sent to described equipment;
Determined by described equipment and extract the described identity information matched with described enciphered message, wherein, described identity information comprises equipment Serial Number, system component identifications and application program identification.
4. encryption method according to claim 3, is characterized in that, describedly generates encryption key according to described identity information and specifically comprises:
Determine the Encryption permissions of described encrypted card, wherein, determine local Encryption permissions by described encrypted card, or obtain described Encryption permissions by remote linkage;
Resolve described identity information according to described Encryption permissions, and generate described encryption key by predetermined manner and described analysis result.
5. encryption method according to claim 4, is characterized in that, described by also comprising after equipment described in described encryption keys:
By pattern, letter, numeral, physical button or their combination, generating solution lock signal;
If described unlocking signal is verified through described encrypted card, then unlock described equipment.
6. an encryption device, is characterized in that, described device comprises:
Identity information acquisition module, for obtaining the identity information of equipment by encrypted card;
Encryption key generation module, for generating encryption key according to described identity information;
Encryption keys module, for by equipment described in described encryption keys.
7. encryption device according to claim 6, is characterized in that, described identity information acquisition module comprise plug together condition adjudgement unit, communication linkage sets up unit and communication linkage releasing unit, wherein,
The described condition adjudgement unit that plugs together is for judging whether described encrypted card plugs together to described equipment;
Plug together to described equipment if described communication linkage sets up unit for described encrypted card, then set up the communication linkage between described encrypted card and described equipment;
If described communication linkage releasing unit is used for described encrypted card and described device separates, then removes described encryption key, and disconnect described communication linkage.
8. encryption device according to claim 7, is characterized in that, described identity information acquisition module also comprises encrypted link generation unit, enciphered message transmitting element, identity information extraction unit, wherein,
If described encrypted link generation unit is used for described encrypted card and described equipment has set up described communication linkage, then encrypt described communication linkage by described encrypted card, generate encrypted link;
Described enciphered message transmitting element is used for generating enciphered message by described encrypted card, and by described encrypted link, described enciphered message is sent to described equipment;
Described identity information extraction unit is used for being determined by described equipment and extracting the described identity information matched with described enciphered message, and wherein, described identity information comprises equipment Serial Number, system component identifications and application program identification.
9. encryption device according to claim 8, is characterized in that, described encryption key generation module comprises Encryption permissions determining unit and encrypting key generating unit, wherein,
Described Encryption permissions determining unit, for determining the Encryption permissions of described encrypted card, wherein, is determined local Encryption permissions by described encrypted card, or is obtained described Encryption permissions by remote linkage;
Described encrypting key generating unit is used for resolving described identity information according to described Encryption permissions, and generates described encryption key by predetermined manner and described analysis result.
Described device also comprises deciphering module, and described deciphering module comprises unlocking information generation unit and equipment solution lock unit, wherein,
Described unlocking information generation unit is used for by pattern, letter, numeral, physical button or their combination, generating solution lock signal;
Be verified through described encrypted card if described equipment solution lock unit is used for described unlocking signal, then unlock described equipment.
10. a ciphering terminal, is characterized in that, described terminal comprises the encryption device described in described claim 6-9.
CN201410657385.9A 2014-11-17 2014-11-17 A kind of encryption method, device and terminal Active CN104469752B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410657385.9A CN104469752B (en) 2014-11-17 2014-11-17 A kind of encryption method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410657385.9A CN104469752B (en) 2014-11-17 2014-11-17 A kind of encryption method, device and terminal

Publications (2)

Publication Number Publication Date
CN104469752A true CN104469752A (en) 2015-03-25
CN104469752B CN104469752B (en) 2019-07-30

Family

ID=52914966

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410657385.9A Active CN104469752B (en) 2014-11-17 2014-11-17 A kind of encryption method, device and terminal

Country Status (1)

Country Link
CN (1) CN104469752B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516083A (en) * 2015-11-25 2016-04-20 上海华为技术有限公司 Data security management method, apparatus, and system
CN105634729A (en) * 2015-12-25 2016-06-01 上海云丞聚智能科技有限公司 Mobile phone encryption and decryption method based on bluetooth equipment
CN107038572A (en) * 2017-04-14 2017-08-11 温咏 Encrypted card and its method of work
CN110750800A (en) * 2019-10-09 2020-02-04 厦门理工学院 Data security processing method, device, equipment and storage medium
CN116074437A (en) * 2023-01-12 2023-05-05 中国联合网络通信集团有限公司 Terminal unlocking method and device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101102574A (en) * 2007-08-14 2008-01-09 华为技术有限公司 Terminal verification method and device
CN101400163A (en) * 2007-09-28 2009-04-01 朗讯科技公司 Method for preventing unauthorized use of mobile phone and mobile phone thereof
CN102647275A (en) * 2011-02-22 2012-08-22 深圳市文鼎创数据科技有限公司 KEY for mobile terminal
CN102904719A (en) * 2011-07-27 2013-01-30 国民技术股份有限公司 USB (universal serial bus)-key and application method thereof
CN103237306A (en) * 2013-04-02 2013-08-07 程雪莲 Usbkey of cellphone identity authentication terminal and application of Usbkey

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101102574A (en) * 2007-08-14 2008-01-09 华为技术有限公司 Terminal verification method and device
CN101400163A (en) * 2007-09-28 2009-04-01 朗讯科技公司 Method for preventing unauthorized use of mobile phone and mobile phone thereof
CN102647275A (en) * 2011-02-22 2012-08-22 深圳市文鼎创数据科技有限公司 KEY for mobile terminal
CN102904719A (en) * 2011-07-27 2013-01-30 国民技术股份有限公司 USB (universal serial bus)-key and application method thereof
CN103237306A (en) * 2013-04-02 2013-08-07 程雪莲 Usbkey of cellphone identity authentication terminal and application of Usbkey

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516083A (en) * 2015-11-25 2016-04-20 上海华为技术有限公司 Data security management method, apparatus, and system
CN105634729A (en) * 2015-12-25 2016-06-01 上海云丞聚智能科技有限公司 Mobile phone encryption and decryption method based on bluetooth equipment
CN107038572A (en) * 2017-04-14 2017-08-11 温咏 Encrypted card and its method of work
CN107038572B (en) * 2017-04-14 2018-07-24 桂林微网互联信息技术有限公司 Encrypted card and its working method
CN110750800A (en) * 2019-10-09 2020-02-04 厦门理工学院 Data security processing method, device, equipment and storage medium
CN116074437A (en) * 2023-01-12 2023-05-05 中国联合网络通信集团有限公司 Terminal unlocking method and device and storage medium

Also Published As

Publication number Publication date
CN104469752B (en) 2019-07-30

Similar Documents

Publication Publication Date Title
CN110192381B (en) Key transmission method and device
CN107690642B (en) Method and system for transmitting data
CN103139767B (en) Mobile phone and communication means thereof
US8700908B2 (en) System and method for managing secure information within a hybrid portable computing device
CN104469752A (en) Encryption method and device and terminal
JP2017514421A (en) Authentication apparatus and method
CN112075094B (en) Method for updating a one-time secret key
CN103136819A (en) Unlocking method for door control system based on mobile terminal and mobile terminal
CN104331653A (en) Fingerprint decryption method and fingerprint decryption device
KR20170042549A (en) Method for the authentication of a first electronic entity by a second electronic entity, and electronic entity implementing such a method
CN102930188A (en) Screen unlocking method and device as well as terminal
CN101262349A (en) SMS-based identity authentication method and device
CN105405185A (en) Safety verifying method and apparatus thereof
CN101964805B (en) Method, equipment and system for safely sending and receiving data
CN106792700A (en) The method for building up and system of a kind of secure communication environment of wearable device
CN102761871A (en) Method for preventing fake device during other party identity authentication of wireless communication devices
CN105631271A (en) Unlocking method, unlocking device, wearable intelligent equipment and terminal
CN104065648B (en) A kind of data processing method of voice call
JP2008535427A (en) Secure communication between data processing device and security module
CN108401494B (en) Method and system for transmitting data
CN110278083A (en) ID authentication request treating method and apparatus, equipment replacement method and apparatus
CN104796262B (en) Data ciphering method and terminal system
CN105142134A (en) Parameter obtaining and transmission methods/devices
CN104955029A (en) Address book protection method, address book protection device and communication system
CN104852800A (en) Data transmission method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
CB02 Change of applicant information

Address after: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 floor 10

Applicant after: Nubian Technologies Ltd.

Address before: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 floor 10

Applicant before: Shenzhen ZTE Mobile Tech Co., Ltd.

COR Change of bibliographic data
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant