CN106295379A - Encrypt input method and device, deciphering input method and device and relevant device - Google Patents

Encrypt input method and device, deciphering input method and device and relevant device Download PDF

Info

Publication number
CN106295379A
CN106295379A CN201610772590.9A CN201610772590A CN106295379A CN 106295379 A CN106295379 A CN 106295379A CN 201610772590 A CN201610772590 A CN 201610772590A CN 106295379 A CN106295379 A CN 106295379A
Authority
CN
China
Prior art keywords
urtext
ciphertext
server
character
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610772590.9A
Other languages
Chinese (zh)
Inventor
崔陈福
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anyun Century Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201610772590.9A priority Critical patent/CN106295379A/en
Publication of CN106295379A publication Critical patent/CN106295379A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention provides a kind of and encrypts input method, corresponding device and mobile terminal, corresponding server, and terminal obtains encrypted instruction, according to encrypted instruction, the urtext of output is sent to server;Terminal receives the ciphertext of server feedback, and ciphertext is associated with urtext;Urtext is replaced to ciphertext by terminal.The urtext of terminal output can be encrypted by server, and finally replaces to ciphertext, and what information was transmitted during transmission (such as instant messaging etc.) is ciphertext, from without revealing urtext, improves the safety of information;Owing to server stores the urtext being associated with ciphertext, thus the recipient of information can get, by server, the urtext being associated with ciphertext.Additionally provide and a kind of decipher input method, corresponding device and mobile terminal, corresponding server.

Description

Encrypt input method and device, deciphering input method and device and relevant device
Technical field
The present invention relates to input method technique field, specifically, the present invention relates to a kind of encryption input method and device and phase The mobile terminal answered, a kind of decipher input method and device and corresponding mobile terminal, a kind of ciphertext for input method output The server of deciphering, the server of a kind of urtext encryption for input method output.
Background technology
Input method refers to the coded method for various symbols input computer or other equipment (such as mobile phone) being used, example Such as GB2312 coding, GBK coding, BIG5 coding, Unicode coding, UTF-8 coding etc., Input Method Editor (Input Method Editor, IME) it is the software realizing word input, also having person is input method software, input method platform, input method Framework or input method system.
Owing to the coding of input method is wide variety of, in message transmitting procedure, if information is intercepted, obtain correspondence Coding after, information just can be decrypted and reveal.Such as, when using instant chat software to chat, chat messages exists If transmitting procedure is intercepted, then can cause the leakage of chat messages.Therefore, traditional input method safety has much room for improvement.
Summary of the invention
The purpose of the present invention is intended at least solve the highest technology of one of above-mentioned technological deficiency, particularly safety and lacks Fall into.
First aspect, provides one encryption input method, comprises the steps: in the embodiment of the present invention
Obtain encrypted instruction, according to encrypted instruction, the urtext of output is sent to server;
Receiving the ciphertext of server feedback, ciphertext is associated with urtext;
Urtext is replaced to ciphertext.
In a possible design, ciphertext includes:
The character code corresponding to text message that is different with urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to text message;Non-coding character is as hiding mark Know, it is impossible to be encoded recognition rule identification.
In a possible design, text message is from the text database of setting in server.
In a possible design, text message is to determine at random from the text database set.
In a possible design, text database includes at least one in poem, proverb, Chinese idiom, popular word.
In a possible design, each word, phrase or the character in text message is divided by the mapping ruler set Word, phrase or the character of order the most corresponding with urtext map mutually.
In a possible design, the mapping ruler of setting includes: languages or part of speech are same or like.
In a possible design, multiple non-coding characters with the form of scattered form or entirety according to the row set Cloth regular array before the character code corresponding to text message, between or afterwards.
In a possible design, non-coding character is from the character database of setting in server.
In a possible design, non-coding character is to determine at random from the character database set.
Second aspect, provides one deciphering input method, comprises the steps: in the embodiment of the present invention
Ciphertext is obtained from third party application;
Receiving and deciphering instructs, and according to decryption instructions, ciphertext is sent to server;
Receive the urtext of server feedback, export urtext;Urtext is associated with ciphertext.
In a possible design, ciphertext includes:
The character code corresponding to text message that is different with urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to text message;Non-coding character is as hiding mark Know, it is impossible to be encoded recognition rule identification.
In a possible design, text message is from the text database of setting in server.
In a possible design, text message is to determine at random from the text database set.
In a possible design, text database includes at least one in poem, proverb, Chinese idiom, popular word.
In a possible design, each word, phrase or the character in text message is divided by the mapping ruler set Word, phrase or the character of order the most corresponding with urtext map mutually.
In a possible design, the mapping ruler of setting includes: languages or part of speech are same or like.
In a possible design, multiple non-coding characters with the form of scattered form or entirety according to the row set Cloth regular array before the character code corresponding to text message, between or afterwards.
In a possible design, non-coding character is from the character database of setting in server.
In a possible design, non-coding character is to determine at random from the character database set.
The third aspect, the side of the urtext encryption providing a kind of server to be input method output in the embodiment of the present invention Method, comprises the steps:
Receive the urtext sent by terminal;
The ciphertext being associated with urtext is determined according to urtext;
Ciphertext is sent to terminal.
In a possible design, determine that the ciphertext being associated with urtext includes according to urtext as follows Step:
Determine the character code corresponding to text message that is different with urtext and that associate, and determine multiple non-encoded word Symbol;Multiple non-coding characters are as hiding mark, it is impossible to be encoded recognition rule identification;
Set up the character code corresponding to text message, hide contacting, by text message between mark and urtext Corresponding character code and hiding mark composition ciphertext.
Fourth aspect, the side of the ciphertext deciphering providing a kind of server to be input method output in the embodiment of the present invention Method, comprises the steps:
Receive the ciphertext sent by terminal;
The urtext being associated with ciphertext is determined according to ciphertext;
Urtext is sent to terminal.
In a possible design, determine that the urtext being associated with ciphertext includes according to ciphertext as follows Step:
It is decoded ciphertext obtaining the character code corresponding to text message and multiple non-coding character;Multiple non- Code character is as hiding mark, it is impossible to be encoded recognition rule identification;
Determine the urtext homogeneously associated with the character code corresponding to text message, hiding mark.
5th aspect, provides one encryption input equipment in the embodiment of the present invention, including:
First encrypting module, is used for obtaining encrypted instruction, is sent to service by the urtext of output according to encrypted instruction Device;
First receiver module, for receiving the ciphertext of server feedback, ciphertext is associated with urtext;
First replacement module, for replacing to ciphertext by urtext.
In a possible design, ciphertext includes:
The character code corresponding to text message that is different with urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to text message;Non-coding character is as hiding mark Know, it is impossible to be encoded recognition rule identification.
In a possible design, text message is from the text database of setting in server.
In a possible design, text message is to determine at random from the text database set.
In a possible design, text database includes at least one in poem, proverb, Chinese idiom, popular word.
In a possible design, each word, phrase or the character in text message is divided by the mapping ruler set Word, phrase or the character of order the most corresponding with urtext map mutually.
In a possible design, the mapping ruler of setting includes: languages or part of speech are same or like.
In a possible design, multiple non-coding characters with the form of scattered form or entirety according to the row set Cloth regular array before the character code corresponding to text message, between or afterwards.
In a possible design, non-coding character is from the character database of setting in server.
In a possible design, non-coding character is to determine at random from the character database set.
6th aspect, provides one deciphering input equipment in the embodiment of the present invention, including:
First acquisition module, for obtaining ciphertext from third party application;
First deciphering module, instructs for receiving and deciphering, according to decryption instructions, ciphertext is sent to server;
First receiver module, for receiving the urtext of server feedback, exports urtext;Urtext and encryption Text is associated.
In a possible design, ciphertext includes:
The character code corresponding to text message that is different with urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to text message;Non-coding character is as hiding mark Know, it is impossible to be encoded recognition rule identification.
In a possible design, text message is from the text database of setting in server.
In a possible design, text message is to determine at random from the text database set.
In a possible design, text database includes at least one in poem, proverb, Chinese idiom, popular word.
In a possible design, each word, phrase or the character in text message is divided by the mapping ruler set Word, phrase or the character of order the most corresponding with urtext map mutually.
In a possible design, the mapping ruler of setting includes: languages or part of speech are same or like.
In a possible design, multiple non-coding characters with the form of scattered form or entirety according to the row set Cloth regular array before the character code corresponding to text message, between or afterwards.
In a possible design, non-coding character is from the character database of setting in server.
In a possible design, non-coding character is to determine at random from the character database set.
7th aspect, provides the server of a kind of urtext encryption for input method output, bag in the embodiment of the present invention Include:
Second receiver module, for receiving the urtext sent by terminal;
Second encrypting module, for determining, according to urtext, the ciphertext being associated with urtext;
Second sending module, for being sent to terminal by ciphertext.
In a possible design, the second encrypting module is used for:
Determine the character code corresponding to text message that is different with urtext and that associate, and determine multiple non-encoded word Symbol;Multiple non-coding characters are as hiding mark, it is impossible to be encoded recognition rule identification;
Set up the character code corresponding to text message, hide contacting, by text message between mark and urtext Corresponding character code and hiding mark composition ciphertext.
Eighth aspect, provides the server of a kind of ciphertext deciphering for input method output, bag in the embodiment of the present invention Include:
Second receiver module, for receiving the ciphertext sent by terminal;
Second deciphering module, for determining, according to ciphertext, the urtext being associated with ciphertext;
Second sending module, for being sent to terminal by urtext.
In a possible design, the second deciphering module is used for:
It is decoded ciphertext obtaining the character code corresponding to text message and multiple non-coding character;Multiple non- Code character is as hiding mark, it is impossible to be encoded recognition rule identification;
Determine the urtext homogeneously associated with the character code corresponding to text message, hiding mark.
9th aspect, provides a kind of mobile terminal in the embodiment of the present invention, comprising:
Touch-sensitive display;
One or more processors;
Memorizer;
One or more application programs, wherein one or more application programs be stored in memorizer and be configured to by One or more processors perform, and one or more programs are configured to:
Obtain encrypted instruction, according to encrypted instruction, the urtext of output is sent to server;
Receiving the ciphertext of server feedback, ciphertext is associated with urtext;
Urtext is replaced to ciphertext.
In a possible design, ciphertext includes:
The character code corresponding to text message that is different with urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to text message;Non-coding character is as hiding mark Know, it is impossible to be encoded recognition rule identification.
In a possible design, text message is from the text database of setting in server.
In a possible design, text message is to determine at random from the text database set.
In a possible design, text database includes at least one in poem, proverb, Chinese idiom, popular word.
In a possible design, each word, phrase or the character in text message is divided by the mapping ruler set Word, phrase or the character of order the most corresponding with urtext map mutually.
In a possible design, the mapping ruler of setting includes: languages or part of speech are same or like.
In a possible design, multiple non-coding characters with the form of scattered form or entirety according to the row set Cloth regular array before the character code corresponding to text message, between or afterwards.
In a possible design, non-coding character is from the character database of setting in server.
In a possible design, non-coding character is to determine at random from the character database set.
Tenth aspect, provides a kind of mobile terminal in the embodiment of the present invention, comprising:
Touch-sensitive display;
One or more processors;
Memorizer;
One or more application programs, wherein one or more application programs be stored in memorizer and be configured to by One or more processors perform, and one or more programs are configured to:
Ciphertext is obtained from third party application;
Receiving and deciphering instructs, and according to decryption instructions, ciphertext is sent to server;
Receive the urtext of server feedback, export urtext;Urtext is associated with ciphertext.
In a possible design, ciphertext includes:
The character code corresponding to text message that is different with urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to text message;Non-coding character is as hiding mark Know, it is impossible to be encoded recognition rule identification.
In a possible design, text message is from the text database of setting in server.
In a possible design, text message is to determine at random from the text database set.
In a possible design, text database includes at least one in poem, proverb, Chinese idiom, popular word.
In a possible design, each word, phrase or the character in text message is divided by the mapping ruler set Word, phrase or the character of order the most corresponding with urtext map mutually.
In a possible design, the mapping ruler of setting includes: languages or part of speech are same or like.
In a possible design, multiple non-coding characters with the form of scattered form or entirety according to the row set Cloth regular array before the character code corresponding to text message, between or afterwards.
In a possible design, non-coding character is from the character database of setting in server.
In a possible design, non-coding character is to determine at random from the character database set.
Above-mentioned encryption input method, corresponding device and mobile terminal, corresponding server, terminal obtains encrypted instruction, According to encrypted instruction, the urtext of output is sent to server;Terminal receives the ciphertext of server feedback, adds ciphertext This is associated with urtext;Urtext is replaced to ciphertext by terminal.The urtext of terminal output can be by clothes Business device is encrypted, and finally replaces to ciphertext, and what information was transmitted during transmission (such as instant messaging etc.) is to add Ciphertext originally, from without revealing urtext, improves the safety of information;Owing to server stores relevant to ciphertext The urtext of connection, thus the recipient of information can get, by server, the urtext being associated with ciphertext.
Above-mentioned deciphering input method, corresponding device and mobile terminal, corresponding server, from third party application Obtain ciphertext;Receiving and deciphering instructs, and according to decryption instructions, ciphertext is sent to server;Receive server feedback Urtext, exports urtext;Urtext is associated with ciphertext.Owing to server stores relevant to ciphertext The urtext of connection, first information receiver receives ciphertext, may then pass through server and gets and ciphertext phase The urtext of association, thus realize the communication for information of secret, safety is high.
Aspect and advantage that the present invention adds will part be given in the following description, and these will become from the following description Obtain substantially, or recognized by the practice of the present invention.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, in embodiment being described below required for make Accompanying drawing be briefly described, it should be apparent that, below describe in accompanying drawing be only some embodiments of the present invention, for From the point of view of those skilled in the art, on the premise of not paying creative work, it is also possible to obtain the attached of other according to these accompanying drawings Figure.
Fig. 1 is the encryption input method flow chart of an embodiment;
Fig. 2 be the server of an embodiment be input method output urtext encryption method flow diagram;
Fig. 3 is the encryption input equipment module map of an embodiment;
Fig. 4 is the server module figure of the urtext encryption for input method output of an embodiment;
Fig. 5 is the deciphering input method flow chart of an embodiment;
Fig. 6 be the server of an embodiment be input method output ciphertext deciphering method flow diagram;
Fig. 7 is the deciphering input equipment module map of an embodiment;
Fig. 8 is the server module figure of the ciphertext deciphering for input method output of an embodiment;
Fig. 9 is illustrated that the block diagram of the part-structure of the mobile phone relevant to the mobile terminal of embodiment of the present invention offer.
Detailed description of the invention
In order to make those skilled in the art be more fully understood that the present invention program, below in conjunction with in the embodiment of the present invention Accompanying drawing, is clearly and completely described the technical scheme in the embodiment of the present invention.
In some flow processs of description in description and claims of this specification and above-mentioned accompanying drawing, contain according to Particular order occur multiple operations, but it should be clearly understood that these operation can not according to its occur in this article suitable Sequence performs or executed in parallel, the sequence number of operation such as 101,102 etc., is only used for distinguishing each different operation, sequence number Itself does not represent any execution sequence.It addition, these flow processs can include more or less of operation, and these operations can To perform in order or executed in parallel.It should be noted that " first ", " second " herein etc. describe, it is for distinguishing not Message together, equipment, module etc., do not represent sequencing, and not limiting " first " and " second " is different types.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative used herein " ", " Individual ", " described " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that use in the description of the present invention arranges Diction " including " refers to there is described feature, integer, step, operation, element and/or assembly, but it is not excluded that existence or adds Other features one or more, integer, step, operation, element, assembly and/or their group.It should be understood that when we claim unit Part is " connected " or during " coupled " to another element, and it can be directly connected or coupled to other elements, or can also exist Intermediary element.Additionally, " connection " used herein or " coupling " can include wireless connections or wireless couple.Used herein arrange Diction "and/or" includes that one or more list the whole of item or any cell being associated combines with whole.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, and all terms used herein (include technology art Language and scientific terminology), have with the those of ordinary skill in art of the present invention be commonly understood by identical meaning.Also should Be understood by, those terms defined in such as general dictionary, it should be understood that have with in the context of prior art The meaning that meaning is consistent, and unless by specific definitions as here, otherwise will not use idealization or the most formal implication Explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal unit " had both included wireless communication The equipment of number receptor, it only possesses the equipment of wireless signal receiver of non-emissive ability, includes again receiving and launching hardware Equipment, its have can on bidirectional communication link, perform two-way communication reception and launch hardware equipment.This equipment May include that honeycomb or other communication equipments, it has single line display or multi-line display or does not has multi-line to show The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), it can Process with combine voice, data, fax and/or its communication ability;PDA (Personal Digital Assistant, individual Digital assistants), it can include the access of radio frequency receiver, pager, the Internet/intranet, web browser, notepad, day Go through and/or GPS (Global Positioning System, global positioning system) receptor;Conventional laptop and/or palm Type computer or other equipment, its have and/or include the conventional laptop of radio frequency receiver and/or palmtop computer or its His equipment." terminal " used herein above, " terminal unit " can be portable, can transport, be arranged on the vehicles (aviation, Sea-freight and/or land) in, or be suitable for and/or be configured at local runtime, and/or with distribution form, operate in the earth And/or any other position operation in space." terminal " used herein above, " terminal unit " can also is that communication terminal, on Network termination, music/video playback terminal, such as, can be PDA, MID (Mobile Internet Device, mobile Internet Equipment) and/or there is the mobile phone of music/video playing function, it is also possible to it is the equipment such as intelligent television, Set Top Box.
Those skilled in the art of the present technique are appreciated that remote network devices used herein above, and it includes but not limited to meter The cloud that calculation machine, network host, single network server, multiple webserver collection or multiple server are constituted.Here, Yun Youji A large amount of computers or the webserver in cloud computing (Cloud Computing) are constituted, and wherein, cloud computing is Distributed Calculation One, the super virtual machine being made up of a group loosely-coupled computer collection.In embodiments of the invention, far-end Can realize communicating by any communication mode between the network equipment, terminal unit with WNS server, include but not limited to, based on The mobile communication of 3GPP, LTE, WIMAX, based on TCP/IP, the computer network communication of udp protocol and based on bluetooth, infrared The low coverage wireless transmission method of transmission standard.
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, the every other enforcement that those skilled in the art are obtained under not making creative work premise Example, broadly falls into the scope of protection of the invention.
Encryption input method which will be described and deciphering input method can apply in Input Method Editor, and it is corresponding Device, mobile terminal can apply in all input terminals, such as computer, panel computer, mobile phone etc. intelligent terminal.
Fig. 1 is the encryption input method flow chart of an embodiment.
The embodiment of the present invention provides one encryption input method, comprises the steps:
Step S110: obtain encrypted instruction, according to encrypted instruction, the urtext of output is sent to server.
User, can be by being encrypted operation with to the urtext inputted when IME carries out input operation to IME It is encrypted.Such as, IME provides " encryption " button, and user is encrypted by clicking on this button.
For IME, terminal system will provide corresponding Keyboard Message to IME, IME again to key according to KeyEvent Dish message coding generates corresponding urtext and exports, and output here can be that output is to third party application (such as instant communication software), it is also possible to be in IME, carry out display output.For Windows system and Android system, That provide Keyboard Message is all input method manager (Input Method Manager, IMM).Described coding, can include GB2312 coding, GBK coding, BIG5 coding, Unicode coding, UTF-8 coding etc. character encoding forms.
After IME obtains encrypted instruction, sent by remote communication interface according to the urtext that encrypted instruction outputs it To server.Such as it is connected with the Internet by wap protocol, and is sent to be in the server of networking state.
Fig. 2 be the server of an embodiment be input method output urtext encryption method flow diagram.Original literary composition Originally after being sent to server, urtext is encrypted by server, and below describing a kind of server is input method output The method of urtext encryption, it comprises the steps S210~step S230:
Step S210: receive the urtext sent by terminal.
Step S220: determine the ciphertext being associated with urtext according to urtext.
The encryption character of ciphertext is for urtext, and it can be only different with urtext Text message, it is also possible to be the text message being accompanied with and hiding mark.Such as, if urtext is " today is on night duty ", and Ciphertext is " bright moon light before bed " this text message, then, for information acquisition person, information acquisition person only obtains " bright moon light before bed " this text message, in this case it is not apparent that the urtext " today is on night duty " of its correspondence.
But, for server, although the urtext that server receives is diversified, but it is not excluded that The situation that multiple urtext are all the same.Such as utilizing in instant communication software chat process, numerous users may can send out Go out identical chat messages, such as " today is on night duty " such chat messages, then server receives a plurality of " today is on night duty " Such urtext, the most corresponding a plurality of ciphertext, it is probably equally between these ciphertexts, it is also possible to no The same, server easily may cause confusion when user is decrypted.
In order to avoid unnecessary trouble, server needs to be identified ciphertext being identified with convenient service device And differentiation.Therefore, ciphertext includes text message that is different with urtext and that associate and hides mark.So-called different, i.e. Urtext and text message are different on content of text.If above-mentioned text message and hidden from the perspective of coding Hide mark, then ciphertext includes: and character code text message corresponding to that associate different with urtext;And it is attached to literary composition Multiple non-coding characters on character code corresponding to this information;Non-coding character is as hiding mark, it is impossible to be encoded knowing Not rule identifies, namely non-coding character can be understood as not possessing the character encoding specific format in fact, thus can not be had Effect identifies.
By Unicode encode as a example by, if urtext be " today is on night duty ", correspondence Unicode be encoded to " 20170;天值夜班”.“今”“天”“值”“&# 22812;”“班" it is the coding of the specific format of 5 Chinese text in " today is on night duty " respectively.And in ciphertext And the text message that associate different with urtext be " bright moon light before bed ", Unicode corresponding to text information is encoded to “床前明月光”.Visible, urtext and the text envelope in ciphertext Breath is different on content of text, thereby increases and it is possible to be the most different, i.e. 5 words in text are the most different.
In order to realize that ciphertext is identified and distinguished between, need to enclose on the coding of text message and hide mark.By There is its specific form in coding, thus the character that major part does not meets form will not be identified and show.Continue above-mentioned Example, encloses on the coding of text information after hiding mark, becomes “ 床19491001前&# 26126;月光", wherein, it is clipped in “ 床" and “ 前" the two coding between character " 19491001 " are exactly to hide mark.Certainly, hiding mark can be numeral, letter, symbol etc. character.
Above-mentioned hiding mark is to be arranged between character code with overall form.It practice, multiple non-encoded word The therefore mark that symbol is constituted can be arranged in text message with the form of scattered form or entirety according to the arranging rule set Before corresponding character code, between or afterwards.Continue above-mentioned example, if hiding mark is scattered form, then at this Enclose on the coding of text message after hiding mark, become “ 床1949前1001明&# 26376;光", wherein, it is clipped in “ 床" and “ 前" the two coding between character " 1949 ", with And it is clipped in “ 前" and “ 明" the two coding between character " 1001 ", together constitute hide mark " 19491001 ", it is scattered being arranged between character code.Certainly, hiding mark can also is that and is arranged in text message Before or after corresponding character code, do not repeat them here.
Certainly, it is not excluded that also can enclose other interference character on the coding of text information.Such as hide mark For " 19491001 ", interference character be " abcdefgh ", disturb character can also with the form of scattered form or entirety according to Set arranging rule be arranged in the character code corresponding to text message before, between or afterwards.The volume of such as ciphertext Code can become: “ 床19491001前abcdefgh明月光", or “ &# 24202;1a9b4c9d1e0f0g1h前明月光", interference character identifies phase with hiding Interfix disorderly, can only know during the character string in face code " 1a9b4c9d1e0f0g1h " in subsequent decryption procedure identification by server The other character with extraction odd bits, thus obtain hiding mark 19491001.The arrangement form of interference character can be varied, As long as subsequent server can identify according to the rule set hides mark and interference character, it is not repeated herein.
Therefore, ciphertext includes the character code corresponding to text message that is different with urtext and that associate, and The multiple non-coding characters being attached on the character code corresponding to text message.Non-coding character is as hiding mark, it is impossible to quilt Code identification rule identification, namely non-coding character can be understood as not possessing the character of coding specific format in fact, thus not Can be effectively recognized.
After server obtains urtext, need to determine for this urtext or the text message of Choice encryption text, make Must be associated, there are mapping relations.For example, it is possible to set a text data Storehouse, includes substantial amounts of text message, such as poem, proverb, Chinese idiom, popular word etc. in text data base.Then service Device can select text message therein as the text message of ciphertext in the text database of this setting.
When server is the text message that urtext determines ciphertext, can determine at random, it is also possible to be logical Cross what the mapping ruler set determined.After determining, it is equivalent to establish the text envelope of urtext and ciphertext Association between breath, server will store the incidence relation between them.
When determining at random, if such as urtext is " today is on night duty, stays out and has a meal ";And text database has Substantial amounts of poem, which includes " bright moon light before bed " and " flower falls to knowing how many ";At the text message determining ciphertext at random Time, " bright moon light before bed " text message as ciphertext may be have selected at random.Certainly, owing to " today is on night duty, does not returns Family has a meal " include two subordinate sentences, every subordinate sentence can also a corresponding text message, determine " bright moon before bed the most at random Light, flower falls to knowing how many " as the text message of ciphertext, wherein " bright moon light before bed " correspondence " today is on night duty ", " Hua Luozhi How much " correspondence " is stayed out and is had a meal ".If i.e. have more than one subordinate sentence in urtext, each subordinate sentence can correspond to Article one, respective ciphertext.
When being determined by the mapping ruler set, each word, phrase or the character in text message is by reflecting of setting Word, phrase or the character of penetrating rule order corresponding with urtext respectively map mutually.The most in certain embodiments, setting Mapping ruler includes: languages or part of speech are same or like.If such as urtext is " today is on night duty, stays out and has a meal "; And text database has substantial amounts of vocabulary, and such as verb, noun, adjective etc., which includes " last night " " flying " " white Cloud " " climbing the mountain " " sleep " etc. vocabulary;When determining the text message of ciphertext at random, may have selected that " last night flies at random White clouds, sleep of not climbing the mountain " as the text message of ciphertext.Visible, " last night " " flying " " white clouds " " climbing the mountain " " sleep " difference Corresponding " today " " value " " night shift " " going home " " having a meal ", languages are all Chinese, and part of speech is the most same or similar.
Server, specifically can be by following when determining, according to urtext, the ciphertext being associated with urtext Step 1~step 2 realize:
Step 1: determine the character code corresponding to text message that is different with urtext and that associate, and determine multiple non- Code character;Multiple non-coding characters are as hiding mark, it is impossible to be encoded recognition rule identification.Server determining at random or When being determined the text message of ciphertext by the mapping ruler set, just establish between urtext and text information Contact.Rather than code character, can pass through the character database set in the server determines, determine the most at random.? In this character database, include such as the character such as numeral, letter, symbol.If input method coding is Unicode coding, for Avoid the character string that stochastic generation is consistent with coded format, character database can not include " & " and/or " # ".
Step 2: set up the character code corresponding to text message, hide contacting, by literary composition between mark and urtext Character code corresponding to this information and hiding mark composition ciphertext.Such as urtext is " today is on night duty ", encryption Text message in text is " bright moon light before bed ", and hiding in ciphertext is designated " 19491001 ", then ciphertext pair The Unicode answered is encoded to “ 床19491001前明月光”.
Step S230: ciphertext is sent to terminal.After server determines ciphertext, will by remote communication interface Ciphertext is sent to above-mentioned terminal.
So far, server is that the method for the urtext encryption of input method output is described, and then continues to describe above-mentioned Encryption input method.After step S110, perform step S120.
Step S120: receive the ciphertext of server feedback.Ciphertext is associated with urtext.Ciphertext with Association between urtext is carried out by server side, server side just store ciphertext and urtext it Between incidence relation, strengthen terminal information security.
Step S130: urtext is replaced to ciphertext.Input Method Editor is by straight for the urtext in input frame Taking over and change ciphertext into, from the user point of view, the text message of the encrypted text of urtext substituted for, such as by original Text " today is on night duty " replaces to text message " bright moon light before bed ";And with from the point of view of machine angle, the text envelope of ciphertext The coding of breath, with hiding mark, will encode “ 今天值夜班" replace Change coding “ &#24202 into;19491001前明月光”.Then, receiving user's After transmission instruction, ciphertext is transmitted.Such as in instant communication process, user clicks on " transmission " button will add ciphertext This is sent by instant communication software.
Above-mentioned encryption input method, an object lesson is: user selects to have exported in instant communication software input frame Chat messages and click on " encryption " button, chat messages is encrypted by server, and returns the ciphertext after encryption, defeated Enter method editing machine ciphertext replaces above-mentioned chat messages and shows in the input frame of instant communication software.
So far, encryption input method is described.
Fig. 3 is the encryption input equipment module map of an embodiment.Corresponding above-mentioned encryption input method, below describes one Encryption input equipment, comprising: the first encrypting module the 110, first receiver module 120 and the first replacement module 130.First encryption Module 110 is used for obtaining encrypted instruction, according to encrypted instruction, the urtext of output is sent to server;First receiver module 120 for receiving the ciphertext of server feedback, and ciphertext is associated with urtext;First replacement module 130 is used for Urtext is replaced to ciphertext.This encryption input equipment correspond to above-mentioned encryption input method, intermodule worked Journey is referred to above-mentioned encryption input method, does not repeats them here.
Fig. 4 is the server module figure of the urtext encryption for input method output of an embodiment.Corresponding above-mentioned Server is the method for the urtext encryption of input method output, below describes a kind of urtext encryption for input method output Server, comprising: second receiver module the 210, second encrypting module the 220, second sending module 230.Second receiver module 210 for receiving the urtext sent by terminal;Second encrypting module 220 is for determining and urtext according to urtext The ciphertext being associated;Second sending module 230 is for being sent to terminal by ciphertext.In certain embodiments, second Encrypting module 220 is used for: determines the character code corresponding to text message that is different with urtext and that associate, and determines multiple Non-coding character;Multiple non-coding characters are as hiding mark, it is impossible to be encoded recognition rule identification;Set up text message institute right The character code answered, hide contacting between mark and urtext, by the character code corresponding to text message with hide mark Know composition ciphertext.This server correspond to the method for the urtext encryption that above-mentioned server is input method output, mould Work process between block is referred to the method for the urtext encryption that above-mentioned server is input method output, the most superfluous at this State.
Fig. 5 is the deciphering input method flow chart of an embodiment.Corresponding above-mentioned encryption input method, describes one below and solves Close input method, for being decrypted ciphertext described above.A kind of deciphering input method, comprises the steps:
Step S310: obtain ciphertext from third party application.Third party application can be instant messaging Software, such as wechat, QQ etc..User can be by replicating the acquisition of information ciphertext in third party application, such as Copying chat message from wechat, QQ and obtain ciphertext, these chat messages both can be this terminal send chat It message, it is also possible to be the chat messages of this terminal reception.
Step S320: receiving and deciphering instructs, and according to decryption instructions, ciphertext is sent to server.User gets and adds Ciphertext is after this, operation to be decrypted, such as, click on " deciphering " button so that terminal generation decryption instructions, then terminal according to The ciphertext got is sent to server by decryption instructions, allows server be decrypted.
Fig. 6 be the server of an embodiment be input method output ciphertext deciphering method flow diagram, below retouch The method stating the ciphertext deciphering that a kind of server is input method output, it comprises the steps S410~step S430:
Step S410: receive the ciphertext sent by terminal.
Step S420: determine the urtext being associated with ciphertext according to ciphertext.Encrypt defeated from the description above Understanding during entering method, server storage has the incidence relation before ciphertext and urtext, therefore can be according to adding Ciphertext originally determines corresponding urtext.
Server, when determining, according to ciphertext, the urtext being associated with ciphertext, specifically can include as follows Step S1~step S2 realize:
Step S1: be decoded ciphertext obtaining the character code corresponding to text message and multiple non-encoded word Symbol.Plurality of non-coding character is as hiding mark, it is impossible to be encoded recognition rule identification, is not to say that and can not be identified, Server can be identified according to decipherment algorithm.Here text message is exactly the text message in ciphertext, namely clothes Business device needs the character code of isolated text message, hiding mark from ciphertext.
With Unicode above coding example go on to say, the Unicode that ciphertext is corresponding be encoded to "; 19491001前明月光", the text message of ciphertext is " bright moon light before bed ", adds Hiding in this of ciphertext is designated " 19491001 ".Owing to coding has its specific form, thus server can identify this The coding of form;And hide mark arranging rule server encryption when and know, therefore can also recognize.When So, even if ciphertext is accompanied by interference character described above, owing to the arranging rule server of interference character is also known Road, naturally it is also possible to recognize these interference characters.
Step S2: determine the urtext homogeneously associated with the character code corresponding to text message, hiding mark.Example As, the incidence relation stored by server, obtain urtext " today is on night duty " and coding “ &#20170 thereof;&# 22825;值夜班”.
Step S430: urtext is sent to terminal.After server gets urtext, deciphering obtained is original Text is sent to above-mentioned terminal by remote communication interface.
So far, server is that the method for the ciphertext deciphering of input method output is described, and then continues to describe above-mentioned Deciphering input method.After step S320, perform step S330.
Step S330: receive the urtext of server feedback, exports urtext.Urtext is relevant to ciphertext Connection.Associating between urtext with ciphertext is carried out by server side, and server side just stores original literary composition Incidence relation between this and ciphertext, strengthens the information security of terminal.During output urtext, can be in input method The input frame of editing machine or the input frame of third party software export.
Above-mentioned deciphering input method, an object lesson is: user replicates the chat messages of instant communication software and clicks on " solution Close " button, chat messages is decrypted by server, and returns the urtext after deciphering, and Input Method Editor is by original literary composition This display is in the input frame of instant communication software.
So far, deciphering input method is described.
Fig. 7 is the deciphering input equipment module map of an embodiment.Corresponding above-mentioned deciphering input method, below describes one Deciphering input equipment, comprising: the first acquisition module the 310, first deciphering module 320 and the first receiver module 330.
First acquisition module 310 is for obtaining ciphertext from third party application;First deciphering module 320 is used for Receiving and deciphering instructs, and according to decryption instructions, ciphertext is sent to server;First receiver module 330 is used for receiving server The urtext of feedback, exports urtext;Urtext is associated with ciphertext.This deciphering input equipment correspond to above-mentioned Encryption input method, the work process of intermodule is referred to above-mentioned deciphering input method, does not repeats them here.
Fig. 8 is the server module figure of the ciphertext deciphering for input method output of an embodiment.Corresponding above-mentioned Server is the method for the ciphertext deciphering of input method output, below describes a kind of urtext encryption for input method output Server, comprising: the second receiver module the 410, second encrypting module 420 and the second sending module 430.
Second receiver module 410 is for receiving the urtext sent by terminal;Second encrypting module 420 is for according to former Beginning text determines the ciphertext being associated with urtext;Second sending module 430 is for being sent to terminal by ciphertext. In certain embodiments, the second encrypting module 420 is used for: determine corresponding to text message that is different with urtext and that associate Character code, and determine multiple non-coding character;Multiple non-coding characters are as hiding mark, it is impossible to be encoded recognition rule and know Not;Set up the character code corresponding to text message, hide contacting, corresponding to text message between mark and urtext Character code and hide mark composition ciphertext.This server correspond to above-mentioned server be input method output add ciphertext The method of this deciphering, the work process of intermodule is referred to the method for the ciphertext deciphering of above-mentioned input method output, This repeats no more.
The embodiment of the present invention additionally provides mobile terminal, as it is shown in figure 9, for convenience of description, illustrate only and the present invention The part that embodiment is relevant, concrete ins and outs do not disclose, and refer to embodiment of the present invention method part.This mobile terminal can Think and include mobile phone, panel computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point Of Sales, point-of-sale terminal), the arbitrarily terminal unit such as vehicle-mounted computer, as a example by mobile terminal is as mobile phone:
Fig. 9 is illustrated that the block diagram of the part-structure of the mobile phone relevant to the mobile terminal of embodiment of the present invention offer.Ginseng Examining Fig. 9, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 1510, memorizer 1520, input block 1530, display Unit 1540, sensor 1550, voicefrequency circuit 1560, Wireless Fidelity (wireless-fidelity, Wi-Fi) module 1570, place The reason parts such as device 1580 and power supply 1590.It will be understood by those skilled in the art that the not structure of the handset structure shown in Fig. 9 The restriction of mobile phone in pairs, can include that ratio illustrates more or less of parts, or combine some parts, or different parts Arrange.
Below in conjunction with Fig. 9 each component parts of mobile phone carried out concrete introduction:
RF circuit 1510 can be used for receiving and sending messages or in communication process, the reception of signal and transmission, especially, by base station After downlink information receives, process to processor 1580;It addition, be sent to base station by designing up data.Generally, RF circuit 1510 include but not limited to antenna, at least one amplifier, transceiver, bonder, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..Additionally, RF circuit 1510 can also be led to network and other equipment by radio communication Letter.Above-mentioned radio communication can use arbitrary communication standard or agreement, includes but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memorizer 1520 can be used for storing software program and module, and processor 1580 is stored in memorizer by operation The software program of 1520 and module, thus perform the application of various functions and the data process of mobile phone.Memorizer 1520 can be led Including storage program area and storage data field, wherein, needed for storage program area can store operating system, at least one function Application program (such as sound-playing function, image player function etc.) etc.;Storage data field can store the use institute according to mobile phone The data (such as voice data, phone directory etc.) etc. created.Additionally, memorizer 1520 can include that high random access stores Device, it is also possible to include nonvolatile memory, for example, at least one disk memory, flush memory device or other volatibility are solid State memory device.
Input block 1530 can be used for receiving numeral or the character information of input, and produce with the user setup of mobile phone with And function controls relevant key signals input.Specifically, input block 1530 can include contact panel 1531 and other inputs Equipment 1532.Contact panel 1531, also referred to as touch screen, can collect user thereon or neighbouring touch operation (such as user Use any applicable object such as finger, stylus or adnexa behaviour on contact panel 1531 or near contact panel 1531 Make), and drive corresponding attachment means according to formula set in advance.Optionally, contact panel 1531 can include touching detection Device and two parts of touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 1580, and order that processor 1580 sends can be received and performed.Additionally, The polytypes such as resistance-type, condenser type, infrared ray and surface acoustic wave can be used to realize contact panel 1531.Except touch surface Plate 1531, input block 1530 can also include other input equipments 1532.Specifically, other input equipments 1532 can include But it is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more.
Display unit 1540 can be used for each of the information that inputted by user of display or the information being supplied to user and mobile phone Plant menu.Display unit 1540 can include display floater 1541, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) Configure display floater 1541.Further, contact panel 1531 can cover display floater 1541, when contact panel 1531 detects Arrive thereon or after neighbouring touch operation, send processor 1580 to determine the type of touch event, with preprocessor 1580 provide corresponding visual output according to the type of touch event on display floater 1541.Although in fig .9, contact panel 1531 with display floater 1541 be to realize input and the input function of mobile phone as two independent parts, but some reality Execute in example, can be by integrated to contact panel 1531 and display floater 1541 and realize input and the output function of mobile phone.
Mobile phone may also include at least one sensor 1550, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor can include ambient light sensor and proximity transducer, and wherein, ambient light sensor can be according to ambient light Light and shade regulate the brightness of display floater 1541, proximity transducer can cut out display floater when mobile phone moves in one's ear 1541 and/or backlight.As the one of motion sensor, accelerometer sensor can detect (generally three axles) in all directions and add The size of speed, can detect that size and the direction of gravity time static, can be used for identifying application (the such as horizontal/vertical screen of mobile phone attitude Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;As for mobile phone also Other sensors such as configurable gyroscope, barometer, drimeter, thermometer, infrared ray sensor, do not repeat them here.
Voicefrequency circuit 1560, speaker 1561, microphone 1562 can provide the audio interface between user and mobile phone.Audio frequency The signal of telecommunication after the voice data conversion that circuit 1560 can will receive, is transferred to speaker 1561, speaker 1561 changes Export for acoustical signal;On the other hand, the acoustical signal of collection is converted to the signal of telecommunication by microphone 1562, by voicefrequency circuit 1560 Voice data is converted to after reception, then after voice data output processor 1580 is processed, through RF circuit 1510 to be sent to ratio Such as another mobile phone, or voice data is exported to memorizer 1520 to process further.
Wi-Fi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics by Wi-Fi module 1570 Mail, browsing webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 9 illustrates Wi-Fi module 1570, but it is understood that, it is also not belonging to must be configured into of mobile phone, can exist as required completely Omit in the scope of the essence not changing invention.
Processor 1580 is the control centre of mobile phone, utilizes various interface and the various piece of the whole mobile phone of connection, It is stored in the software program in memorizer 1520 and/or module by running or performing, and calls and be stored in memorizer 1520 Interior data, perform the various functions of mobile phone and process data, thus mobile phone is carried out integral monitoring.Optionally, processor 1580 can include one or more processing unit;Preferably, processor 1580 can integrated application processor and modulation /demodulation process Device, wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor is mainly located Reason radio communication.It is understood that above-mentioned modem processor can not also be integrated in processor 1580.
Mobile phone also includes the power supply 1590 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply Management system is logically contiguous with processor 1580, thus realizes management charging, electric discharge and power consumption pipe by power-supply management system The functions such as reason.
Although not shown, mobile phone can also include photographic head, bluetooth module etc., does not repeats them here.
In embodiments of the present invention, the processor 1580 included by this terminal also has following functions: obtain encrypted instruction, According to encrypted instruction, the urtext of output is sent to server.Receive server feedback ciphertext, ciphertext with Urtext is associated.Urtext is replaced to ciphertext.Namely processor 1580 possesses the encryption input that execution is above-mentioned The function of method.
Or, in embodiments of the present invention, the processor 1580 included by this terminal also has following functions: from third party Application program obtains ciphertext;Receiving and deciphering instructs, and according to decryption instructions, ciphertext is sent to server;Receive clothes The urtext of business device feedback, exports urtext;Urtext is associated with ciphertext.Namely processor 1580 possesses and holds The function of the deciphering input method that row is above-mentioned.
Certainly, in actual realization, processor 1580 possesses the function performing above-mentioned encryption input method, also possesses and holds The function of the deciphering input method that row is above-mentioned.It is defeated that usual this mobile terminal can be that computer, panel computer, mobile phone etc. are loaded with Enter the intelligent terminal of method editing machine.
Above-mentioned encryption input method, corresponding device and mobile terminal, corresponding server, terminal obtains encrypted instruction, According to encrypted instruction, the urtext of output is sent to server;Terminal receives the ciphertext of server feedback, adds ciphertext This is associated with urtext;Urtext is replaced to ciphertext by terminal.The urtext of terminal output can be by clothes Business device is encrypted, and finally replaces to ciphertext, and what information was transmitted during transmission (such as instant messaging etc.) is to add Ciphertext originally, from without revealing urtext, improves the safety of information;Owing to server stores relevant to ciphertext The urtext of connection, thus the recipient of information can get, by server, the urtext being associated with ciphertext.
Above-mentioned deciphering input method, corresponding device and mobile terminal, corresponding server, from third party application Obtain ciphertext;Receiving and deciphering instructs, and according to decryption instructions, ciphertext is sent to server;Receive server feedback Urtext, exports urtext;Urtext is associated with ciphertext.Owing to server stores relevant to ciphertext The urtext of connection, first information receiver receives ciphertext, may then pass through server and gets and ciphertext phase The urtext of association, thus realize the communication for information of secret, safety is high.
The invention discloses following scheme:
A1, a kind of encryption input method, comprise the steps:
Obtain encrypted instruction, according to described encrypted instruction, the urtext of output is sent to server;
Receiving the ciphertext of server feedback, described ciphertext is associated with described urtext;
Described urtext is replaced to described ciphertext.
A2, input method as described in A1, described ciphertext includes:
The character code corresponding to text message that is different with described urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to described text message;Described non-coding character conduct Hide mark, it is impossible to be encoded recognition rule identification.
A3, input method as described in A2, described text message is from the text database set in described server.
A4, input method as described in A3, described text message is to determine at random from the text database of described setting.
A5, input method as described in A4, described text database includes at least in poem, proverb, Chinese idiom, popular word Kind.
A6, input method as described in A3, each word, phrase or the character in described text message is advised by the mapping set Word, phrase or the character of order corresponding with described urtext maps mutually the most respectively.
A7, input method as described in A6, the mapping ruler of described setting includes: languages or part of speech are same or like.
A8, input method as described in A2, the plurality of non-coding character with the form of scattered form or entirety according to setting Before fixed arranging rule is arranged in the character code corresponding to described text message, between or afterwards.
A9, input method as described in A2, described non-coding character is from the character database set in described server.
A10, input method as described in A9, described non-coding character is to determine at random from the character database of described setting 's.
B11, a kind of deciphering input method, comprise the steps:
Ciphertext is obtained from third party application;
Receiving and deciphering instructs, and according to described decryption instructions, described ciphertext is sent to server;
Receive the urtext of server feedback, export described urtext;Described urtext and described ciphertext It is associated.
B12, input method as described in B11, described ciphertext includes:
The character code corresponding to text message that is different with described urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to described text message;Described non-coding character conduct Hide mark, it is impossible to be encoded recognition rule identification.
B13, input method as described in B12, described text message is from the text database set in described server.
B14, input method as described in B13, described text message is to determine at random from the text database of described setting 's.
B15, input method as described in B14, described text database includes in poem, proverb, Chinese idiom, popular word at least A kind of.
B16, input method as described in B13, each word, phrase or the character in described text message is by the mapping set Word, phrase or the character of rule order corresponding with described urtext respectively map mutually.
B17, input method as described in B16, the mapping ruler of described setting includes: languages or part of speech are same or like.
B18, input method as described in B12, the plurality of non-coding character with the form of scattered form or entirety according to Set arranging rule be arranged in the character code corresponding to described text message before, between or afterwards.
B19, input method as described in B12, described non-coding character is from the character database set in described server.
B20, input method as described in B19, described non-coding character be from the character database of described setting random really Fixed.
C21, a kind of server are the method for the urtext encryption of input method output, comprise the steps:
Receive the urtext sent by terminal;
The ciphertext being associated with described urtext is determined according to described urtext;
Described ciphertext is sent to described terminal.
C22, method as described in C21, determine according to described urtext and add ciphertext with described urtext is associated Originally comprise the steps:
Determine the character code corresponding to text message that is different with described urtext and that associate, and determine multiple non-volume Code character;The plurality of non-coding character is as hiding mark, it is impossible to be encoded recognition rule identification;
Set up the character code corresponding to described text message, connection between described hiding mark and described urtext System, forms described ciphertext by the character code corresponding to described text message and described hiding mark.
D23, a kind of server are the method for the ciphertext deciphering of input method output, comprise the steps:
Receive the ciphertext sent by terminal;
The urtext being associated with described ciphertext is determined according to described ciphertext;
Described urtext is sent to described terminal.
D24, method as described in D23, determine the original literary composition being associated with described ciphertext according to described ciphertext Originally comprise the steps:
It is decoded described ciphertext obtaining the character code corresponding to text message and multiple non-coding character;Institute State multiple non-coding character as hiding mark, it is impossible to be encoded recognition rule identification;
Determine the urtext homogeneously associated with the character code corresponding to described text message, hiding mark.
D25, a kind of encryption input equipment, including:
First encrypting module, is used for obtaining encrypted instruction, the urtext of output is sent to according to described encrypted instruction Server;
First receiver module, for receiving the ciphertext of server feedback, described ciphertext and described urtext It is associated;
First replacement module, for replacing to described ciphertext by described urtext.
D26, input equipment as described in D25, described ciphertext includes:
The character code corresponding to text message that is different with described urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to described text message;Described non-coding character conduct Hide mark, it is impossible to be encoded recognition rule identification.
D27, input equipment as described in D26, described text message is from the text database set in described server.
D28, input equipment as described in D27, described text message be from the text database of described setting random really Fixed.
D29, input equipment as described in D28, described text database includes in poem, proverb, Chinese idiom, popular word extremely Few one.
D30, input equipment as described in D27, each word, phrase or the character in described text message is by reflecting of setting Word, phrase or the character of penetrating rule order corresponding with described urtext respectively map mutually.
D31, input equipment as described in D30, the mapping ruler of described setting includes: languages or part of speech are same or like.
D32, input equipment as described in D26, the plurality of non-coding character is with the form root of scattered form or entirety According to set arranging rule be arranged in the character code corresponding to described text message before, between or afterwards.
D33, input equipment as described in D26, described non-coding character is from the character data set in described server Storehouse.
D34, input equipment as described in D33, described non-coding character is random from the character database of described setting Determine.
E35, a kind of deciphering input equipment, including:
First acquisition module, for obtaining ciphertext from third party application;
First deciphering module, instructs for receiving and deciphering, is sent to take by described ciphertext according to described decryption instructions Business device;
First receiver module, for receiving the urtext of server feedback, exports described urtext;Described original literary composition This is associated with described ciphertext.
E36, input equipment as described in E35, described ciphertext includes:
The character code corresponding to text message that is different with described urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to described text message;Described non-coding character conduct Hide mark, it is impossible to be encoded recognition rule identification.
E37, input equipment as described in E36, described text message is from the text database set in described server.
E38, input equipment as described in E37, described text message be from the text database of described setting random really Fixed.
E39, input equipment as described in E38, described text database includes in poem, proverb, Chinese idiom, popular word extremely Few one.
E40, input equipment as described in E37, each word, phrase or the character in described text message is by reflecting of setting Word, phrase or the character of penetrating rule order corresponding with described urtext respectively map mutually.
E41, input equipment as described in E40, the mapping ruler of described setting includes: languages or part of speech are same or like.
E42, input equipment as described in E36, the plurality of non-coding character is with the form root of scattered form or entirety According to set arranging rule be arranged in the character code corresponding to described text message before, between or afterwards.
E43, input equipment as described in E36, described non-coding character is from the character data set in described server Storehouse.
E44, input equipment as described in E43, described non-coding character is random from the character database of described setting Determine.
F45, the server of a kind of urtext encryption for input method output, including:
Second receiver module, for receiving the urtext sent by terminal;
Second encrypting module, for determining, according to described urtext, the ciphertext being associated with described urtext;
Second sending module, for being sent to described terminal by described ciphertext.
F46, server as described in F45, described second encrypting module is used for:
Determine the character code corresponding to text message that is different with described urtext and that associate, and determine multiple non-volume Code character;The plurality of non-coding character is as hiding mark, it is impossible to be encoded recognition rule identification;
Set up the character code corresponding to described text message, connection between described hiding mark and described urtext System, forms described ciphertext by the character code corresponding to described text message and described hiding mark.
F47, the server of a kind of ciphertext deciphering for input method output, including:
Second receiver module, for receiving the ciphertext sent by terminal;
Second deciphering module, for determining, according to described ciphertext, the urtext being associated with described ciphertext;
Second sending module, for being sent to described terminal by described urtext.
F48, server as described in F47, described second deciphering module is used for:
It is decoded described ciphertext obtaining the character code corresponding to text message and multiple non-coding character;Institute State multiple non-coding character as hiding mark, it is impossible to be encoded recognition rule identification;
Determine the urtext homogeneously associated with the character code corresponding to described text message, hiding mark.
G49, a kind of mobile terminal, comprising:
Touch-sensitive display;
One or more processors;
Memorizer;
One or more application programs, wherein said one or more application programs are stored in described memorizer and quilt Being configured to be performed by the one or more processor, the one or more program is configured to:
Obtain encrypted instruction, according to described encrypted instruction, the urtext of output is sent to server;
Receiving the ciphertext of server feedback, described ciphertext is associated with described urtext;
Described urtext is replaced to described ciphertext.
G50, mobile terminal as described in G49, described ciphertext includes:
The character code corresponding to text message that is different with described urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to described text message;Described non-coding character conduct Hide mark, it is impossible to be encoded recognition rule identification.
G51, mobile terminal as described in G50, described text message is from the text database set in described server.
G52, mobile terminal as described in G51, described text message be from the text database of described setting random really Fixed.
G53, mobile terminal as described in G52, described text database includes in poem, proverb, Chinese idiom, popular word extremely Few one.
G54, mobile terminal as described in G51, each word, phrase or the character in described text message is by reflecting of setting Word, phrase or the character of penetrating rule order corresponding with described urtext respectively map mutually.
G55, mobile terminal as described in G54, the mapping ruler of described setting includes: languages or part of speech are same or like.
G56, mobile terminal as described in G50, the plurality of non-coding character is with the form root of scattered form or entirety According to set arranging rule be arranged in the character code corresponding to described text message before, between or afterwards.
G57, mobile terminal as described in G50, described non-coding character is from the character data set in described server Storehouse.
G58, mobile terminal as described in G57, described non-coding character is random from the character database of described setting Determine.
H59, a kind of mobile terminal, comprising:
Touch-sensitive display;
One or more processors;
Memorizer;
One or more application programs, wherein said one or more application programs are stored in described memorizer and quilt Being configured to be performed by the one or more processor, the one or more program is configured to:
Ciphertext is obtained from third party application;
Receiving and deciphering instructs, and according to described decryption instructions, described ciphertext is sent to server;
Receive the urtext of server feedback, export described urtext;Described urtext and described ciphertext It is associated.
H60, mobile terminal as described in H59, described ciphertext includes:
The character code corresponding to text message that is different with described urtext and that associate;And
The multiple non-coding characters being attached on the character code corresponding to described text message;Described non-coding character conduct Hide mark, it is impossible to be encoded recognition rule identification.
H61, mobile terminal as described in H60, described text message is from the text database set in described server.
H62, mobile terminal as described in H61, described text message be from the text database of described setting random really Fixed.
H63, mobile terminal as described in H62, described text database includes in poem, proverb, Chinese idiom, popular word extremely Few one.
H64, mobile terminal as described in H61, each word, phrase or the character in described text message is by reflecting of setting Word, phrase or the character of penetrating rule order corresponding with described urtext respectively map mutually.
H65, mobile terminal as described in H64, the mapping ruler of described setting includes: languages or part of speech are same or like.
H66, mobile terminal as described in H60, the plurality of non-coding character is with the form root of scattered form or entirety According to set arranging rule be arranged in the character code corresponding to described text message before, between or afterwards.
H67, mobile terminal as described in H60, described non-coding character is from the character data set in described server Storehouse.
H68, mobile terminal as described in H67, described non-coding character is random from the character database of described setting Determine.
Although each step that it should be understood that in the flow chart of accompanying drawing shows successively according to the instruction of arrow, but These steps are not that the inevitable order indicated according to arrow performs successively.Unless expressly stated otherwise herein, these steps The the not strictest order that performs limit, it can perform in the other order.And, at least some of step in accompanying drawing Can include many sub-steps or multiple stage, these sub-steps or stage are not necessarily to have performed at synchronization Becoming, but can perform in different moment, its execution sequence is also not necessarily and carries out successively, but can with other steps or The sub-step of other steps of person or at least some of of stage perform in turn or alternately.
The above is only the some embodiments of the present invention, it is noted that for the ordinary skill people of the art For Yuan, under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (10)

1. an encryption input method, it is characterised in that comprise the steps:
Obtain encrypted instruction, according to described encrypted instruction, the urtext of output is sent to server;
Receiving the ciphertext of server feedback, described ciphertext is associated with described urtext;
Described urtext is replaced to described ciphertext.
2. a deciphering input method, it is characterised in that comprise the steps:
Ciphertext is obtained from third party application;
Receiving and deciphering instructs, and according to described decryption instructions, described ciphertext is sent to server;
Receive the urtext of server feedback, export described urtext;Described urtext is relevant to described ciphertext Connection.
3. a server is the method that the urtext that input method exports is encrypted, it is characterised in that comprise the steps:
Receive the urtext sent by terminal;
The ciphertext being associated with described urtext is determined according to described urtext;
Described ciphertext is sent to described terminal.
4. a server is the method that the ciphertext that input method exports is deciphered, it is characterised in that comprise the steps:
Receive the ciphertext sent by terminal;
The urtext being associated with described ciphertext is determined according to described ciphertext;
Described urtext is sent to described terminal.
5. an encryption input equipment, it is characterised in that including:
First encrypting module, is used for obtaining encrypted instruction, is sent to service by the urtext of output according to described encrypted instruction Device;
First receiver module, for receiving the ciphertext of server feedback, described ciphertext is relevant to described urtext Connection;
First replacement module, for replacing to described ciphertext by described urtext.
6. a deciphering input equipment, it is characterised in that including:
First acquisition module, for obtaining ciphertext from third party application;
First deciphering module, instructs for receiving and deciphering, according to described decryption instructions, described ciphertext is sent to server;
First receiver module, for receiving the urtext of server feedback, exports described urtext;Described urtext with Described ciphertext is associated.
7. the server of the urtext encryption that a kind is input method output, it is characterised in that including:
Second receiver module, for receiving the urtext sent by terminal;
Second encrypting module, for determining, according to described urtext, the ciphertext being associated with described urtext;
Second sending module, for being sent to described terminal by described ciphertext.
8. the server of the ciphertext deciphering that a kind is input method output, it is characterised in that including:
Second receiver module, for receiving the ciphertext sent by terminal;
Second deciphering module, for determining, according to described ciphertext, the urtext being associated with described ciphertext;
Second sending module, for being sent to described terminal by described urtext.
9. a mobile terminal, it is characterised in that comprising:
Touch-sensitive display;
One or more processors;
Memorizer;
One or more application programs, wherein said one or more application programs are stored in described memorizer and are configured For being performed by the one or more processor, the one or more program is configured to:
Obtain encrypted instruction, according to described encrypted instruction, the urtext of output is sent to server;
Receiving the ciphertext of server feedback, described ciphertext is associated with described urtext;
Described urtext is replaced to described ciphertext.
10. a mobile terminal, it is characterised in that comprising:
Touch-sensitive display;
One or more processors;
Memorizer;
One or more application programs, wherein said one or more application programs are stored in described memorizer and are configured For being performed by the one or more processor, the one or more program is configured to:
Ciphertext is obtained from third party application;
Receiving and deciphering instructs, and according to described decryption instructions, described ciphertext is sent to server;
Receive the urtext of server feedback, export described urtext;Described urtext is relevant to described ciphertext Connection.
CN201610772590.9A 2016-08-30 2016-08-30 Encrypt input method and device, deciphering input method and device and relevant device Pending CN106295379A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610772590.9A CN106295379A (en) 2016-08-30 2016-08-30 Encrypt input method and device, deciphering input method and device and relevant device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610772590.9A CN106295379A (en) 2016-08-30 2016-08-30 Encrypt input method and device, deciphering input method and device and relevant device

Publications (1)

Publication Number Publication Date
CN106295379A true CN106295379A (en) 2017-01-04

Family

ID=57675127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610772590.9A Pending CN106295379A (en) 2016-08-30 2016-08-30 Encrypt input method and device, deciphering input method and device and relevant device

Country Status (1)

Country Link
CN (1) CN106295379A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI658401B (en) * 2017-11-14 2019-05-01 財團法人工業技術研究院 Mobile communication device based on virtual mobile infrastructure and related input method switching methods thereof
CN110213201A (en) * 2018-03-01 2019-09-06 腾讯科技(深圳)有限公司 Processing method, device, computer equipment and the storage medium of data safety
CN110555183A (en) * 2018-05-31 2019-12-10 视联动力信息技术股份有限公司 Text data processing method and device
CN111212068A (en) * 2019-12-31 2020-05-29 熵加网络科技(北京)有限公司 Method for encrypting and decrypting characters by input method
US11956324B2 (en) 2021-01-07 2024-04-09 Stmicroelectronics S.R.L. Sensor device, system and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103198264A (en) * 2013-03-14 2013-07-10 厦门市美亚柏科信息股份有限公司 Method and device for recovering encrypted file system data
CN103366132A (en) * 2012-03-29 2013-10-23 国际商业机器公司 Device and method for encrypting data
CN104243149A (en) * 2013-06-19 2014-12-24 北京搜狗科技发展有限公司 Encrypting and decrypting method, device and server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103366132A (en) * 2012-03-29 2013-10-23 国际商业机器公司 Device and method for encrypting data
CN103198264A (en) * 2013-03-14 2013-07-10 厦门市美亚柏科信息股份有限公司 Method and device for recovering encrypted file system data
CN104243149A (en) * 2013-06-19 2014-12-24 北京搜狗科技发展有限公司 Encrypting and decrypting method, device and server

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI658401B (en) * 2017-11-14 2019-05-01 財團法人工業技術研究院 Mobile communication device based on virtual mobile infrastructure and related input method switching methods thereof
US10628614B2 (en) 2017-11-14 2020-04-21 Industrial Technology Research Institute Mobile communication device based on virtual mobile infrastructure and related input method switching method thereof
CN110213201A (en) * 2018-03-01 2019-09-06 腾讯科技(深圳)有限公司 Processing method, device, computer equipment and the storage medium of data safety
CN110555183A (en) * 2018-05-31 2019-12-10 视联动力信息技术股份有限公司 Text data processing method and device
CN111212068A (en) * 2019-12-31 2020-05-29 熵加网络科技(北京)有限公司 Method for encrypting and decrypting characters by input method
CN111212068B (en) * 2019-12-31 2022-02-08 北京升鑫网络科技有限公司 Method for encrypting and decrypting characters by input method
US11956324B2 (en) 2021-01-07 2024-04-09 Stmicroelectronics S.R.L. Sensor device, system and method

Similar Documents

Publication Publication Date Title
CN103702297B (en) Short message enhancement, apparatus and system
CN106295379A (en) Encrypt input method and device, deciphering input method and device and relevant device
CN104618217B (en) Share method, terminal, server and the system of resource
CN112989430A (en) Integrity verification method and device, terminal equipment and verification server
CN110475340A (en) DCI transmission method, terminal and base station
CN110888705B (en) Method for processing unread message corner marks and electronic equipment
CN107103074B (en) Processing method of shared information and mobile terminal
CN106332020A (en) Short message merging method and apparatus, and terminal device
CN109697008A (en) A kind of content share method, terminal and computer readable storage medium
CN109358931A (en) A kind of interface display method and terminal
CN107948429A (en) A kind of content demonstration method and terminal device
US20150109210A1 (en) Control method, and input device of touch screen terminal
CN106469280A (en) The method and device of instant messaging interface processing
CN110147186A (en) A kind of control method and terminal device of application
CN112311740B (en) Data encryption method, data decryption method, terminal and storage medium
CN108762829A (en) A kind of method, client and terminal for image beautification
CN116541865A (en) Password input method, device, equipment and storage medium based on data security
CN104915625B (en) A kind of method and device of recognition of face
CN106202422B (en) The treating method and apparatus of Web page icon
CN106874045A (en) A kind of startup method of application program, device and mobile terminal
CN106375182A (en) Voice communication method and device based on instant messaging application
CN110012152A (en) A kind of interface display method and terminal device
CN108319432A (en) A kind of application operation method and terminal
CN110190947B (en) Information encryption and decryption method, terminal and computer readable storage medium
CN109710207A (en) Method, dual-screen mobile terminal and the storage medium of dual-screen mobile terminal preview picture

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20170720

Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801

Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: Beijing Qihu Technology Co., Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170104