CN107622208A - Note encryption and decryption method and related product - Google Patents

Note encryption and decryption method and related product Download PDF

Info

Publication number
CN107622208A
CN107622208A CN201710778758.1A CN201710778758A CN107622208A CN 107622208 A CN107622208 A CN 107622208A CN 201710778758 A CN201710778758 A CN 201710778758A CN 107622208 A CN107622208 A CN 107622208A
Authority
CN
China
Prior art keywords
note
encryption
targeted security
security grade
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710778758.1A
Other languages
Chinese (zh)
Inventor
曾元清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710778758.1A priority Critical patent/CN107622208A/en
Publication of CN107622208A publication Critical patent/CN107622208A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of note encryption and decryption method and Related product, wherein note encryption method includes:Obtain the note content information of target note;The targeted security grade of target note is determined according to note content information;Obtain AES corresponding to targeted security grade;Target note is encrypted according to AES to obtain encryption note.Using the present invention, the security of note content information can be improved.

Description

Note encryption and decryption method and Related product
Technical field
The present invention relates to technical field of mobile terminals, has related generally to a kind of note encryption and decryption method and Related product.
Background technology
As science and technology development, smart mobile phone, notebook computer, tablet personal computer and desktop computer etc. at full speed is mobile eventually End is widely used in daily life.Substantial amounts of important information is usually stored in the note of mobile terminal by user In, it is easy to be extracted if necessary, and stored by way of encryption, the note for establishing oneself is not random by other people Check, improve the security of data.
In the prior art, encryption method is often encrypted by the way of unified, if disabled user once cracked it is close All note content information of code is revealed, and causes the security of data low.
The content of the invention
The embodiments of the invention provide a kind of note encryption and decryption method and Related product, note content information can be improved Security.
In a first aspect, the embodiment of the present invention provides a kind of note encryption method, including:
Obtain the note content information of target note;
The targeted security grade of the target note is determined according to the note content information;
Obtain AES corresponding to the targeted security grade;
The target note is encrypted according to the AES, obtains encrypting note.
Second aspect, the embodiment of the present invention provide a kind of note encryption device, including:
First acquisition unit, for obtaining the note content information of target note;
Determining unit, for determining the targeted security grade of the target note according to the note content information;
Second acquisition unit, for obtaining AES corresponding to the targeted security grade;
Ciphering unit, for the target note to be encrypted according to the AES, obtain encrypting note.
The third aspect, the embodiment of the present invention provide a kind of note decryption method, including:
Access request of the detection for encryption note;
Obtain decipherment algorithm corresponding to the targeted security grade for encrypting note and the targeted security grade;
Receive the first checking information of input;
First checking information is verified according to the decipherment algorithm;
When first checking information is proved to be successful, the encryption note is decrypted to obtain target note.
Fourth aspect, the embodiment of the present invention provide a kind of note decryption device, including:
Detection unit, for detecting the access request for encryption note;
Acquiring unit, for obtaining solution corresponding to the targeted security grade for encrypting note and the targeted security grade Close algorithm;
First receiving unit, for receiving the first checking information of input;
First authentication unit, for being verified according to the decipherment algorithm to first checking information;
Decryption unit, for when first checking information is proved to be successful, being decrypted to obtain to the encryption note Target note.
5th aspect, the embodiments of the invention provide a kind of mobile terminal, including:Processor, memory, communication interface with And one or more programs, wherein, one or more of programs are stored in the memory, and are configured by described Computing device, described program include being used to perform such as the method described by first aspect of the embodiment of the present invention or second aspect Instruction.
6th aspect, the embodiments of the invention provide a kind of computer-readable recording medium, wherein, it is described computer-readable Storage medium is used to store computer program, wherein, the computer program causes computer to perform such as the embodiment of the present invention the Part or all of step described by one side or second aspect.
Implement the embodiment of the present invention, will have the advantages that:
After employing above-mentioned note encryption and decryption method and Related product, the note content letter of target note is obtained Breath, the targeted security grade of above-mentioned target note is determined according to note content information, the encryption according to corresponding to targeted security grade Target note is encrypted to obtain encryption note for algorithm.I.e. different note content information corresponds to different safe classes, and AES corresponding to each safe class is different, that is to say, that different notes is using corresponding with its note content information AES is encrypted, and the difficulty of decryption encryption note is improved, so as to improve the security of note content information.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Wherein:
Fig. 1 is a kind of schematic flow sheet of note encryption method provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic flow sheet of note decryption method provided in an embodiment of the present invention;
Fig. 3 is a kind of structural representation of note encryption device provided in an embodiment of the present invention;
Fig. 3 A are a kind of structural representation of determining unit provided in an embodiment of the present invention;
Fig. 3 B are a kind of structural representation for extracting subelement provided in an embodiment of the present invention;
Fig. 3 C are a kind of structural representation of determination subelement provided in an embodiment of the present invention;
Fig. 4 is the structural representation that a kind of note provided in an embodiment of the present invention decrypts device;
Fig. 5 is a kind of structural representation of mobile terminal provided in an embodiment of the present invention.
Embodiment
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention Accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only Part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Term " first ", " second " in description and claims of this specification and above-mentioned accompanying drawing etc. are to be used to distinguish Different objects, rather than for describing particular order.In addition, term " comprising " and " having " and their any deformations, it is intended that It is to cover non-exclusive include.Such as process, method, system, product or the equipment for containing series of steps or unit do not have The step of being defined in the step of having listed or unit, but alternatively also including not listing or unit, or alternatively also wrap Include for other intrinsic steps of these processes, method, product or equipment or unit.
Referenced herein " embodiment " is it is meant that the special characteristic, structure or the characteristic that describe can wrap in conjunction with the embodiments In at least one embodiment of the present invention.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
Mobile terminal involved by the embodiment of the present invention can include the various handheld devices with radio communication function, Mobile unit, wearable device, computing device or other processing equipments for being connected to radio modem, and various forms User equipment (User Equipment, UE), mobile station (Mobile Station, MS), terminal device (terminal Device) etc..For convenience of description, apparatus mentioned above is referred to as mobile terminal.The embodiment of the present invention is carried out below detailed It is thin to introduce.
The embodiments of the invention provide a kind of note encryption method and Related product, the safety of note content information can be improved Property.
In a first aspect, the embodiment of the present invention provides a kind of note encryption method, specifically, as shown in figure 1, a kind of note adds Decryption method, including:
101:Obtain the note content information of target note.
In the present embodiment, note content information can be text, image or other annexes etc. form, not limit herein It is fixed.
102:The targeted security grade of target note is determined according to note content information.
In the present embodiment, P is the integer more than 1, and Q is the integer more than or equal to P, and P is prestored in mobile terminal Individual safe class, P safe class include Q descriptor, that is, at least one corresponding descriptor of each safe class.
For example, as shown in table 1, by the note on mobile terminal be divided into the first level of confidentiality, the second level of confidentiality, the 3rd level of confidentiality, 4th level of confidentiality and the 5th level of confidentiality totally five kinds of safe classes.Wherein, the relation of above-mentioned five kinds of level of securitys is respectively the from low to high One level of confidentiality, the second level of confidentiality, the 3rd level of confidentiality, the 4th level of confidentiality, the 5th level of confidentiality;And first the descriptor of level of confidentiality be associated person information;The The descriptor of two levels of confidentiality is that event is reminded and the birthday reminds;The descriptor of 3rd level of confidentiality is login password;The theme of 4th level of confidentiality Word is work plan;The descriptor of 5th level of confidentiality is payment cipher.
Table 1
Descriptor
First level of confidentiality Associated person information
Second level of confidentiality Event is reminded, the birthday reminds
3rd level of confidentiality Login password
4th level of confidentiality Work plan
5th level of confidentiality Payment cipher
Optionally, it is described the target note is determined according to the note content information targeted security grade be specially: The note content information is converted into text message;Keyword extraction is carried out to the text message and obtains N number of keyword;Root The targeted security grade is determined according to N number of keyword.
Wherein, N is positive integer.When the type of note content information is text, text message is converted directly into;In note When the type for holding information is non-textual, such as audio or video, speech recognition can be carried out so as to obtain text message, if Image can obtain text message of image event etc..That is, the pass in the text message according to corresponding to note content information Keyword determines targeted security grade, improves the accuracy of extraction note content information.
Optionally, described to carry out keyword extraction to the text message, obtaining N number of keyword is specially:To the text This information is split to obtain M sentence;Sentence is carried out to each sentence in the M sentence according to default syntactic-semantic model Method semantic analysis, obtain the semanteme in sentence where each vocabulary in L vocabulary and the L vocabulary;According to the L vocabulary In semanteme in sentence where each vocabulary N number of keyword is chosen from the L vocabulary.
Wherein, M is positive integer, and L is more than the integer between M and N.The present invention is based on natural language processing technique, with sentence Number, the symbol such as branch or newline be that cut-point is split to text message.Default syntactic-semantic model is to pass through statistics The model of a set of description syntactic-semantic structure is obtained, including lexical rule and the probability distribution of rule.Pass through default sentence The relation that French justice Model Identification goes out between the vocabulary that sentence is included, so that it is determined that in L vocabulary each vocabulary semanteme, and N number of keyword is extracted from L vocabulary.
Further, the name entity such as name, place name, mechanism name, password is paid close attention to, not only the key containing event is believed for they Breath, at the same also and Chinese word segmenting have close contact.And L vocabulary is classified, can be by the group of specific word in sentence Conjunction relation is abstracted into the syntagmatic between part of speech, and then may be easier to obtain the rule of syntax vocabulary, improves extraction text The accuracy of keyword in this information.
Optionally, it is described to determine that the targeted security grade is specially according to N number of keyword:From the Q theme Selected ci poem takes the descriptor with each Keywords matching in N number of keyword, obtains N number of descriptor;Obtain N number of descriptor Corresponding safe class, obtain N number of safe class;Highest safe class is chosen in N number of safe class as the target Safe class.
That is, mobile terminal, which is each safe class, is provided with corresponding descriptor, obtaining and N number of keyword After N number of descriptor of matching, safe class corresponding to N number of descriptor is obtained, and chooses highest safe class and pacifies as target Congruent level.
For example, the keyword of the note content information in target note includes:Login password and payment cipher, according to Table 1 is searched, and the safe class for obtaining main body word corresponding to login password is the 3rd level of confidentiality, and main body corresponding to payment cipher The safe class of word is the 5th level of confidentiality, and because the safe class of the 5th level of confidentiality is higher than the safe class of the 3rd level of confidentiality, then target is pacified Congruent level is the 5th level of confidentiality.
103:Obtain AES corresponding to targeted security grade.
In embodiments of the present invention, the corresponding AES of each safe class, encryption is searched according to safe class and calculated Method.Wherein the key of AES can be the default checking information of storage, also can be prompted user that input is tested according to AES Information is demonstrate,proved, the key that the checking information inputted using checking information as key or according to AES and user generates, herein not It is construed as limiting.
For example, as shown in table 2, by the note on mobile terminal be divided into the first level of confidentiality, the second level of confidentiality, the 3rd level of confidentiality, 4th level of confidentiality and the 5th level of confidentiality totally five kinds of safe classes, wherein, the relations of above-mentioned five kinds of level of securitys is respectively the from low to high One level of confidentiality, the second level of confidentiality, the 3rd level of confidentiality, the 4th level of confidentiality, the 5th level of confidentiality;And first the AES of level of confidentiality be password encryption, it is close Key can be with preset password;The AES of second level of confidentiality adds problem encryption on the basis of the first level of confidentiality, passes through mobile terminal Interface prompt user offering question and the answer of offering question are ejected, obtains the problem of user inputs and answer as key;The The AES of three levels of confidentiality adds checking code encryption on the basis of the first level of confidentiality, and the wherein key of identifying code is dynamic password, It can be the various forms such as numeral, word or image, enhance the level of security of the 3rd level of confidentiality;The AES of 4th level of confidentiality Using how biometric encrypted, you can including a variety of bio-identifications such as fingerprint recognition, iris recognition, recognition of face, hand vein recognition Pattern, how biometric encrypted key can be fingerprint template, iris templates, face template and vein templates to prestore etc. Deng, can also directly enter user more biological informations generation more bio-identification templates;The AES of 5th level of confidentiality is Keyword encryption is added on the basis of two levels of confidentiality, wherein, the key of keyword encryption is the keyword in note content information.
Table 2
AES
First level of confidentiality Password encryption
Second level of confidentiality Password encryption and problem encryption
3rd level of confidentiality Password encryption and checking code encryption
4th level of confidentiality It is more biometric encrypted
5th level of confidentiality Password encryption, problem encryption and keyword encryption
104:Target note is encrypted according to AES to obtain encryption note.
In note encryption method as shown in Figure 1, the note content information of target note is obtained, according to note content information The targeted security grade of above-mentioned target note is determined, target note is added according to AES corresponding to targeted security grade It is close to obtain encrypting note.I.e. different note content information corresponds to different safe classes, and adds corresponding to each safe class Close algorithm is different, that is to say, that different notes is encrypted using AES corresponding with its note content information, is improved The difficulty of decryption encryption note, so as to improving the security of note content information.
Optionally, the alternative checking information of input is received.
Wherein, alternative checking information is used to change AES or targeted security grade.That is, if user is applying When accessing encryption note, when detecting that the checking information of user's input fails for encrypting the decryption processing of note, or user thinks , can be by inputting alternative checking information modification encryption note, there is provided a kind of alternative side when changing the AES of encryption note Case, improve convenience and the flexibility of operation.
For example, the alternative checking information of user's input is received, wherein alternative checking information is finger print information, according to finger Line information generates fingerprint template.Assuming that the targeted security grade of encryption note is the first level of confidentiality, the first level of confidentiality is password encryption, and The key of first level of confidentiality is password 1236458.If user clicks on encryption, note application accesses, and inputs 1234567, then with first The key of level of confidentiality mismatches, and user can input finger print information, and when finger print information matches with fingerprint template, can be close by first The key of level is revised as 1234567, and AES can also be changed to problem encryption, can also will encrypt the targeted security of note Grade is revised as the second level of confidentiality, then target note is encrypted according to the AES of the second level of confidentiality.
Optionally, the encryption note is moved to the predeterminated position of the targeted security rank.That is, will be same close The note of level moves to same position, is easy to manage note, and user only needs to input in preset duration or when leaving note region Once during the checking information of AES matching corresponding with safe class, all notes of same rank can be unlocked, so as to Improve the convenience of operation.
Optionally, the modification checking information of input is received.That is, the note content information in note is repaiied , it is necessary to input the checking information matched with modification checking information when changing, otherwise can not modify, so as to further improve note The security of content information.
Optionally, it is described obtain encrypt note after, methods described also includes:Obtain mesh corresponding to the encryption note Mark checking information;Show the target verification information.
That is, after being completed to the encryption of target note, show and decrypt the target verification information for encrypting note to carry Show that user confirms key.User can be according to target verification validation of information key, and is confirmed whether to need to change, and improves operation Usability.
As an example it is assumed that the targeted security grade of target note is the first level of confidentiality, the first level of confidentiality is password encryption, and the The key of one level of confidentiality is password 1236458, and alternative checking information is fingerprint template.Target note is being carried out according to AES After encryption, it is 1236458 in the display screen display key of mobile terminal, if now user wants to change key, can inputs With finger print information, when finger print information matches with fingerprint template, key is revised as 1234567.
Fig. 2 is refer to, Fig. 2 is a kind of note decryption method provided in an embodiment of the present invention, specifically, as shown in Fig. 2 one Kind note decryption method, including:
201:Access request of the detection for encryption note.
In embodiments of the present invention, the access for encryption note that mobile terminal detection user inputs on mobile terminals Request, how to be that above-mentioned access request is not construed as limiting according to user's operation judges for mobile terminal.Such as:Click, double-click or Firmly choose encryption note etc..
202:Obtain decipherment algorithm corresponding to the targeted security grade for encrypting note and the targeted security grade.
In embodiments of the present invention, calculation is encrypted corresponding to decipherment algorithm corresponding to targeted security grade and targeted security grade Method is corresponding.For example, the decipherment algorithm of the first level of confidentiality as shown in table 2 is that password is decrypted, the decipherment algorithm of the second level of confidentiality is Password is decrypted and problem decryption, the decipherment algorithm of the 3rd level of confidentiality are decrypted for password and identifying code decryption, the decryption of the 4th level of confidentiality are calculated Method is more bio-identification decryption, the decipherment algorithm of the 5th level of confidentiality is password decryption, problem decryption and keyword decryption.
203:Receive the first checking information of input.
In embodiments of the present invention, user need to input the first checking information, first after application accesses encryption note After checking information is verified, encryption note that can be after access decryption decrypts note.For the form of the first checking information Do not limit, can be finger print information, acoustic information or verify character, gesture etc..
204:The first checking information is verified according to decipherment algorithm.
205:When the first checking information is proved to be successful, encryption note is decrypted to obtain target note.
In note decryption method as shown in Figure 2, detection obtains the mesh for encrypting note for the access request of encryption note Decipherment algorithm corresponding to marking safe class and targeted security grade, the first checking information of input is received, according to decipherment algorithm pair First checking information is verified, and when being proved to be successful, encryption note is decrypted to obtain target note, i.e. user can visit Ask target note.Because decipherment algorithm is corresponding with AES, and AES is corresponding with targeted security grade, and targeted security Grade is determined according to the note content information of target note, therefore the first checking letter only corresponding to input and target note Breath, can just be decrypted, so as to improve the security of note content information in target note.
As an example it is assumed that the targeted security grade of target note is the first level of confidentiality, the first level of confidentiality is password encryption, and the The key of one level of confidentiality is password 1236458.If user clicks on encryption note application access target note, and inputs the first checking letter Breath, the first checking information are 1234568, then are proved to be successful with the cipher key match of the first level of confidentiality, the first checking information, to encryption Note is decrypted to obtain target note, into target note.
Optionally, in the first checking information authentication failed or when detecting modification key request, the of input is received Two checking informations;When second checking information matches with alternative checking information, it is allowed to change corresponding to the decipherment algorithm AES or the targeted security grade.
Wherein, alternative checking information is used to change AES or targeted security grade.That is, in the first checking letter Breath authentication failed or the modification key request for detecting user's input, and the second checking information inputted and alternative checking information Timing, it is allowed to AES or targeted security grade corresponding to user's modification decipherment algorithm, one kind is provided for note decryption method Alternative, improve convenience and the flexibility of operation.
Fig. 3 is refer to, Fig. 3 is a kind of note encryption device provided in an embodiment of the present invention, specifically, on as shown in figure 3, Stating note encryption device 300 includes:
First acquisition unit 301, for obtaining the note content information of target note.
In the present embodiment, note content information can be text, image or other annexes etc. form, not limit herein It is fixed.
Determining unit 302, for determining the targeted security grade of the target note according to the note content information.
In the present embodiment, P is the integer more than 1, and Q is the integer more than or equal to P, and P is prestored in mobile terminal Individual safe class, P safe class include Q descriptor, that is, at least one corresponding descriptor of each safe class.
For example, as shown in table 1, by the note on mobile terminal be divided into the first level of confidentiality, the second level of confidentiality, the 3rd level of confidentiality, 4th level of confidentiality and the 5th level of confidentiality totally five kinds of safe classes.Wherein, the relation of above-mentioned five kinds of level of securitys is respectively the from low to high One level of confidentiality, the second level of confidentiality, the 3rd level of confidentiality, the 4th level of confidentiality, the 5th level of confidentiality;And first the descriptor of level of confidentiality be associated person information;The The descriptor of two levels of confidentiality is that event is reminded and the birthday reminds;The descriptor of 3rd level of confidentiality is login password;The theme of 4th level of confidentiality Word is work plan;The descriptor of 5th level of confidentiality is payment cipher.
Optionally, as shown in Figure 3A, the determining unit 302 includes:
Conversion subunit 3021, for the note content information to be converted into text message;
Subelement 3022 is extracted, for carrying out keyword extraction to the text message, obtains N number of keyword;
Determination subelement 3023, for determining the targeted security grade according to N number of keyword.
Wherein, N is positive integer.When the type of note content information is text, text message is converted directly into;In note When the type for holding information is non-textual, such as audio or video, speech recognition can be carried out so as to obtain text message, if Image can carry out image event acquisition etc..That is, the keyword in the text message according to corresponding to note content information is true Set the goal safe class, improves the accuracy of extraction note content information.
Optionally, as shown in Figure 3 B, the extraction subelement 3021 includes:
Module 30211 is split, for being split to the text message, obtains M sentence;
Analysis module 30212, for carrying out syntax-semantic parsing to each sentence in the M sentence, obtain L vocabulary With the semanteme in sentence where each vocabulary in the L vocabulary;
First chooses module 30213, for semantic from described in the sentence according to where each vocabulary in the L vocabulary N number of keyword is chosen in L vocabulary.
Wherein, M is positive integer, and L is more than the integer between M and N.The present invention is based on natural language processing technique, with sentence Number, the symbol such as branch or newline be that cut-point is split to note content information.Default syntactic-semantic model is to pass through Statistics obtains the model of a set of description syntactic-semantic structure, including lexical rule and the probability distribution of rule.By default The relation that goes out between the vocabulary that sentence is included of syntactic-semantic Model Identification, so that it is determined that in L vocabulary each vocabulary language Justice, and N number of keyword is extracted from L vocabulary.
Further, the name entity such as name, place name, mechanism name, password is paid close attention to, not only the key containing event is believed for they Breath, at the same also and Chinese word segmenting have close contact.And L vocabulary is classified, can be by the group of specific word in sentence Conjunction relation is abstracted into the syntagmatic between part of speech, and then may be easier to obtain the rule of syntax vocabulary, improves extraction just Sign the accuracy of keyword in content information.
Optionally, P safe class is prestored in mobile terminal, the P safe class includes Q descriptor, institute It is the integer more than 1 to state P, and the Q is the integer more than or equal to the P;As shown in Figure 3 C, the determination subelement 3022 is wrapped Include:
Second chooses module 30221, for being chosen and each keyword in N number of keyword from the Q descriptor The descriptor of matching, obtain N number of descriptor;
Acquisition module 30222, for safe class corresponding to obtaining N number of descriptor, obtain N number of safe class;
3rd chooses module 30223, for choosing the highest safe class in N number of safe class as the target Safe class.
That is, mobile terminal, which is each safe class, is provided with corresponding descriptor, obtaining and N number of keyword After N number of descriptor of matching, safe class corresponding to N number of descriptor is obtained, and chooses highest safe class and pacifies as target Congruent level.
In embodiments of the present invention, as shown in figure 3, second acquisition unit 303 is used to obtain the targeted security grade pair The AES answered.
Wherein, the corresponding AES of each safe class, AES is searched according to safe class.Wherein encryption is calculated The key of method can be the default checking information of storage, also can prompt user's validation information according to AES, will verify The key that the checking information that information inputs as key or according to AES and user generates, is not limited thereto.
In embodiments of the present invention, as shown in figure 3, ciphering unit 304, for according to the AES to the target Note is encrypted to obtain encryption note.
In note encryption device as shown in Figure 3, the note content information of target note is obtained, according to note content information The targeted security grade of above-mentioned target note is determined, target note is added according to AES corresponding to targeted security grade It is close to obtain encrypting note.I.e. different note content information corresponds to different safe classes, and adds corresponding to each safe class Close algorithm is different, that is to say, that different notes is encrypted using AES corresponding with its note content information, is improved The difficulty of decryption encryption note, so as to improving the security of note content information.
Optionally, as shown in figure 3, described device 300 also includes:
Receiving unit 305, for receiving the alternative checking information of input.
Wherein, alternative checking information is used to change AES or targeted security grade.That is, if user is applying When accessing encryption note, when detecting that the checking information of user's input fails for encrypting the decryption processing of note, or user thinks , can be by inputting alternative checking information modification encryption note, there is provided a kind of alternative side when changing the AES of encryption note Case, improve convenience and the flexibility of operation.
Optionally, described device 300 also includes:
Mobile unit, for the encryption note to be moved to the predeterminated position of the targeted security rank.
The note of same level of confidentiality is moved into same position, is easy to manage note, and user in preset duration or leaves just When signing region, when need to only input once the checking information of AES matching corresponding with safe class, same one-level can be unlocked Other all notes, so as to improve the convenience of operation.
Optionally, described device also includes:
First receiving unit, for receiving the modification checking information of input.
That is, when the note content information in note is modified, it is necessary to input and modification checking information The checking information matched somebody with somebody, otherwise it can not modify, so as to further improve the security of note content information.
Optionally, described device also includes:
3rd acquiring unit, for obtaining target verification information corresponding to the AES;
Display unit, for showing the target verification information.
That is, after being completed to the encryption of target note, show and decrypt the target verification information for encrypting note to carry Show that user confirms key.User can be according to target verification validation of information key, and is confirmed whether to need to change, and improves operation Usability.
Fig. 4 is refer to, Fig. 4 decrypts device for a kind of note provided in an embodiment of the present invention, specifically, on as shown in figure 4, Stating note decryption device 400 includes:
Detection unit 401, for detecting the access request for encryption note.
In embodiments of the present invention, the access for encryption note that mobile terminal detection user inputs on mobile terminals Request, how to be that above-mentioned access request is not construed as limiting according to user's operation judges for mobile terminal.Such as:Click, double-click or Firmly choose encryption note etc..
Acquiring unit 402, the targeted security grade and the targeted security grade for obtaining the encryption note are corresponding Decipherment algorithm.
In embodiments of the present invention, calculation is encrypted corresponding to decipherment algorithm corresponding to targeted security grade and targeted security grade Method is corresponding.For example, the decipherment algorithm of the first level of confidentiality as shown in table 2 is that password is decrypted, the decipherment algorithm of the second level of confidentiality is Password is decrypted and problem decryption, the decipherment algorithm of the 3rd level of confidentiality are decrypted for password and identifying code decryption, the decryption of the 4th level of confidentiality are calculated Method is more bio-identification decryption, the decipherment algorithm of the 5th level of confidentiality is password decryption, problem decryption and keyword decryption.
First receiving unit 403, for receiving the first checking information of input.
In embodiments of the present invention, user need to input the first checking information, first after application accesses encryption note After checking information is verified, encryption note that can be after access decryption decrypts note.For the form of the first checking information Do not limit, can be finger print information, acoustic information or verify character, gesture etc..
First authentication unit 404, for being verified according to the decipherment algorithm to first checking information.
Decryption unit 405, for when first checking information is proved to be successful, the encryption note to be decrypted To target note.
In note decryption device as shown in Figure 4, detection is for the access request of encryption note, the mesh of acquisition encryption note Decipherment algorithm corresponding to marking safe class and targeted security grade, the first checking information of input is received, according to decipherment algorithm pair First checking information is verified, and when being proved to be successful, encryption note is decrypted to obtain target note, i.e. user can visit Ask target note.Because decipherment algorithm is corresponding with AES, and AES is corresponding with targeted security grade, and targeted security Grade is determined according to the note content information of target note, therefore the first checking letter only corresponding to input and target note Breath, can just be decrypted, so as to improve the security of note content information in target note.
Optionally, as shown in figure 4, described device 400 also includes:
Second receiving unit 406, for the first checking information authentication failed or detect modification key request when, Receive the second checking information of input;
Allow unit 407, for when second checking information matches with alternative checking information, it is allowed to change the solution AES corresponding to close algorithm or the targeted security grade.
Wherein, alternative checking information is used to change AES or targeted security grade.That is, in the first checking letter Breath authentication failed or the modification key request for detecting user's input, and the second checking information inputted and alternative checking information Timing, it is allowed to AES or targeted security grade corresponding to user's modification decipherment algorithm, one kind is provided for note decryption method Alternative, improve convenience and the flexibility of operation.
It is consistent with Fig. 1 and Fig. 2 embodiment, Fig. 5 is refer to, Fig. 5 is a kind of mobile terminal provided in an embodiment of the present invention, As shown in figure 5, the mobile terminal 500 includes:Processor 510, memory 520, communication interface 530 and one or more programs 540, wherein, one or more programs 540 are stored in memory 520, and are configured to be performed by processor 510, program 540 include being used for the instruction for performing following steps:
Obtain the note content information of target note;
The targeted security grade of the target note is determined according to the note content information;
Obtain AES corresponding to the targeted security grade;
The target note is encrypted according to the AES, obtains encrypting note.
As an alternative embodiment, in the mesh that the target note is determined according to the note content information In terms of marking safe class, the instruction in said procedure 540 is specifically used for performing following steps:
The note content information is converted into text message;
Keyword extraction is carried out to the text message, obtains N number of keyword, the N is positive integer;
The targeted security grade is determined according to N number of keyword.
As an alternative embodiment, carrying out keyword extraction to the text message described, N number of key is obtained In terms of word, the instruction in said procedure 540 is specifically used for performing following steps:
The text message is split, obtains M sentence, the M is positive integer;
Syntax-semantic parsing is carried out to each sentence in the M sentence, obtained every in L vocabulary and the L vocabulary Semanteme in sentence where one vocabulary, the L are the integer more than the maximum between the M and the N;
Semanteme in sentence where each vocabulary in the L vocabulary chooses N number of pass from the L vocabulary Keyword.
As an alternative embodiment, P safe class is prestored in mobile terminal, the P safe class Including Q descriptor, the P is the integer more than 1, and the Q is the integer more than or equal to the P;Described according to the N In terms of individual keyword determines the targeted security grade, the instruction in said procedure 540 is specifically used for performing following steps:
The descriptor with each Keywords matching in N number of keyword is chosen from the Q descriptor, obtains N number of master Epigraph;
Safe class corresponding to obtaining N number of descriptor, obtains N number of safe class;
The highest safe class in N number of safe class is chosen as the targeted security grade.
As an alternative embodiment, it is described obtain encrypt note after, the instruction in said procedure 540 is also used In execution following steps:
The alternative checking information of input is received, the alternative checking information is used to change the AES or the target Safe class.
As an alternative embodiment, it is encrypted to the target note according to the AES described Afterwards, the instruction in said procedure 540 is additionally operable to perform following steps:
The encryption note is moved to the predeterminated position of the targeted security rank.
As an alternative embodiment, the instruction in said procedure 540 is additionally operable to perform following steps:
Receive the modification checking information of input.
As an alternative embodiment, it is described obtain encrypt note after, the instruction in said procedure 540 is also used In execution following steps:
Obtain target verification information corresponding to the encryption note;
Show the target verification information.
As an alternative embodiment, the instruction in said procedure 540 is additionally operable to perform following steps:
Access request of the detection for encryption note;
Obtain decipherment algorithm corresponding to the targeted security grade for encrypting note and the targeted security grade;
Receive the first checking information of input;
First checking information is verified according to the decipherment algorithm;
When first checking information is proved to be successful, the encryption note is decrypted to obtain target note.
As an alternative embodiment, the instruction in said procedure 540 is additionally operable to perform following steps:
In the first checking information authentication failed or detect that the second checking for receiving input is believed when changing key request Breath;
When second checking information matches with alternative checking information, it is allowed to change and encrypted corresponding to the decipherment algorithm Algorithm or the targeted security grade.
In mobile terminal as shown in Figure 5, the note content information of target note is obtained, is determined according to note content information The targeted security grade of above-mentioned target note, target note is encrypted according to AES corresponding to targeted security grade To encryption note, and after detecting for the access request of encryption note, the targeted security grade and mesh of encryption note are obtained Decipherment algorithm corresponding to marking safe class, receives the first checking information of input, the first checking information is entered according to decipherment algorithm Row checking, and when being proved to be successful, encryption note is decrypted to obtain target note, i.e. user-accessible target note.By It is corresponding with AES in decipherment algorithm, and AES is corresponding with targeted security grade, and targeted security grade is according to mesh The note content information determination of note, therefore the first checking information only corresponding to input and target note are marked, can just be carried out Decryption, so as to improve the security of note content information in target note.
The embodiment of the present invention also provides a kind of computer-readable storage medium, wherein, the computer-readable storage medium is stored for depositing Computer program is stored up, the computer program causes computer to perform the part or complete of the either method as described in embodiment of the method Portion's step, computer include mobile terminal.
The embodiment of the present invention also provides a kind of computer program product, and computer program product includes storing computer journey The non-transient computer-readable recording medium of sequence, computer program are operable to make computer perform as in embodiment of the method remembered The part or all of step of the either method of load.The computer program product can be a software installation bag, and computer includes Mobile terminal.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because According to the present invention, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know Know, embodiment described in this description belongs to preferred embodiment, and involved action and module are not necessarily of the invention It is necessary.
In embodiment, the description to each embodiment all emphasizes particularly on different fields, and does not have the part being described in detail in some embodiment, can With referring to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed device, can be by another way Realize.For example, device embodiment described above is only schematical, for example, the division of unit, only a kind of logic Function divides, and can have other dividing mode when actually realizing, such as multiple units or component can be combined or can collected Into to another system, or some features can be ignored, or not perform.Another, shown or discussed mutual coupling Close or direct-coupling or communication connection can be by some interfaces, the INDIRECT COUPLING or communication connection of device or unit, can be with It is electrical or other forms.
The unit illustrated as separating component can be or may not be physically separate, be shown as unit Part can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple networks On unit.Some or all of unit therein can be selected to realize the purpose of this embodiment scheme according to the actual needs.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Integrated unit was both It can be realized, can also be realized in the form of SFU software functional unit in the form of hardware.
If integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or in use, can To be stored in a computer-readable access to memory.Based on such understanding, technical scheme is substantially in other words The part to be contributed to prior art or all or part of the technical scheme can be embodied in the form of software product Come, the computer software product is stored in a memory, including some instructions are causing a computer equipment (can be Personal computer, server or network equipment etc.) perform all or part of step of each embodiment method of the present invention.It is and preceding The memory stated includes:USB flash disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can be with the medium of store program codes.
The embodiment of the present invention is described in detail above, specific case used herein to the principle of the present invention and Embodiment is set forth, and the explanation of above example is only intended to help the method and its core concept for understanding the present invention; Meanwhile for those of ordinary skill in the art, according to the thought of the present invention, can in specific embodiments and applications There is change part, to sum up, this specification content should not be construed as limiting the invention.

Claims (11)

  1. A kind of 1. note encryption method, it is characterised in that including:
    Obtain the note content information of target note;
    The targeted security grade of the target note is determined according to the note content information;
    Obtain AES corresponding to the targeted security grade;
    The target note is encrypted according to the AES, obtains encrypting note.
  2. 2. according to the method for claim 1, it is characterised in that described that the target is determined according to the note content information The targeted security grade of note, including:
    The note content information is converted into text message;
    Keyword extraction is carried out to the text message, obtains N number of keyword, the N is positive integer;
    The targeted security grade is determined according to N number of keyword.
  3. 3. according to the method for claim 2, it is characterised in that it is described that keyword extraction is carried out to the text message, obtain To N number of keyword, including:
    The text message is split, obtains M sentence, the M is positive integer;
    Syntax-semantic parsing is carried out to each sentence in the M sentence according to default syntactic-semantic model, obtains L vocabulary With the semanteme in sentence where each vocabulary in the L vocabulary, the L is more than the maximum between the M and the N Integer;
    Semanteme in sentence where each vocabulary in the L vocabulary chooses N number of key from the L vocabulary Word.
  4. 4. according to the method for claim 2, it is characterised in that P safe class, the P are prestored in mobile terminal Individual safe class includes Q descriptor, and the P is the integer more than 1, and the Q is the integer more than or equal to the P;
    It is described that the targeted security grade is determined according to N number of keyword, including:
    The descriptor with each Keywords matching in N number of keyword is chosen from the Q descriptor, obtains N number of descriptor;
    Safe class corresponding to obtaining N number of descriptor, obtains N number of safe class;
    The highest safe class in N number of safe class is chosen as the targeted security grade.
  5. 5. according to the method described in claim any one of 1-4, it is characterised in that it is described obtain encrypt note after, it is described Method also includes:
    The alternative checking information of input is received, the alternative checking information is used to change the AES or the targeted security Grade.
  6. A kind of 6. note decryption method, it is characterised in that including:
    Access request of the detection for encryption note;
    Obtain decipherment algorithm corresponding to the targeted security grade for encrypting note and the targeted security grade;
    Receive the first checking information of input;
    First checking information is verified according to the decipherment algorithm;
    When first checking information is proved to be successful, the encryption note is decrypted to obtain target note.
  7. 7. according to the method for claim 6, it is characterised in that methods described also includes:
    In the first checking information authentication failed or when detecting modification key request, the second checking information of input is received;
    When second checking information matches with alternative checking information, it is allowed to change AES corresponding to the decipherment algorithm Or the targeted security grade.
  8. A kind of 8. note encryption device, it is characterised in that including:
    First acquisition unit, for obtaining the note content information of target note;
    Determining unit, for determining the targeted security grade of the target note according to the note content information;
    Second acquisition unit, for obtaining AES corresponding to the targeted security grade;
    Ciphering unit, for the target note to be encrypted according to the AES, obtain the mesh of the target note Mark encryption information.
  9. 9. a kind of note decrypts device, it is characterised in that including:
    Detection unit, for detecting the access request for encryption note;
    Acquiring unit, calculated for obtaining to decrypt corresponding to the targeted security grade for encrypting note and the targeted security grade Method;
    First receiving unit, for receiving the first checking information of input;
    First authentication unit, for being verified according to the decipherment algorithm to first checking information;
    Decryption unit, for when first checking information is proved to be successful, being decrypted to obtain target to the encryption note Note.
  10. A kind of 10. mobile terminal, it is characterised in that including processor, memory, communication interface and one or more programs, Wherein, one or more of programs are stored in the memory, and are configured by the computing device, the journey Sequence includes being used for the instruction that perform claim requires the step in any one of 1-5,6 or 7 method.
  11. A kind of 11. computer-readable recording medium, it is characterised in that it is used to store computer program, wherein, the computer Program causes computer to perform the method as described in any one of claim 1-5,6 or 7.
CN201710778758.1A 2017-08-31 2017-08-31 Note encryption and decryption method and related product Pending CN107622208A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710778758.1A CN107622208A (en) 2017-08-31 2017-08-31 Note encryption and decryption method and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710778758.1A CN107622208A (en) 2017-08-31 2017-08-31 Note encryption and decryption method and related product

Publications (1)

Publication Number Publication Date
CN107622208A true CN107622208A (en) 2018-01-23

Family

ID=61089052

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710778758.1A Pending CN107622208A (en) 2017-08-31 2017-08-31 Note encryption and decryption method and related product

Country Status (1)

Country Link
CN (1) CN107622208A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111291363A (en) * 2020-01-19 2020-06-16 深圳信可通讯技术有限公司 Communication module operation processing method and device, communication module and computer readable medium
CN113326239A (en) * 2021-06-24 2021-08-31 长江存储科技有限责任公司 File management method, device, equipment and computer readable storage medium
CN113836558A (en) * 2021-09-27 2021-12-24 西安万像电子科技有限公司 File encryption method, device and file decryption method
CN115086062A (en) * 2022-06-30 2022-09-20 三一电动车科技有限公司 Remote safety control method, system, device and vehicle
CN116226886A (en) * 2023-03-22 2023-06-06 ***通信集团广东有限公司 Information security management method and system for software information system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006112899A1 (en) * 2005-04-13 2006-10-26 Oracle International Corporation Method and apparatus for encrypting and decrypting data in a database table
CN103092979A (en) * 2013-01-31 2013-05-08 中国科学院对地观测与数字地球科学中心 Processing method and device for searching of natural language by remote sensing data
CN103886263A (en) * 2014-03-19 2014-06-25 宇龙计算机通信科技(深圳)有限公司 Method and system for protecting data in mobile terminal
CN106372519A (en) * 2016-08-30 2017-02-01 江苏博智软件科技有限公司 Information encryption method and device
CN106791087A (en) * 2016-12-20 2017-05-31 北京小米移动软件有限公司 The storage method of information, device and equipment
CN106936771A (en) * 2015-12-29 2017-07-07 航天信息股份有限公司 A kind of secure cloud storage method and system based on graded encryption

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006112899A1 (en) * 2005-04-13 2006-10-26 Oracle International Corporation Method and apparatus for encrypting and decrypting data in a database table
CN103092979A (en) * 2013-01-31 2013-05-08 中国科学院对地观测与数字地球科学中心 Processing method and device for searching of natural language by remote sensing data
CN103886263A (en) * 2014-03-19 2014-06-25 宇龙计算机通信科技(深圳)有限公司 Method and system for protecting data in mobile terminal
CN106936771A (en) * 2015-12-29 2017-07-07 航天信息股份有限公司 A kind of secure cloud storage method and system based on graded encryption
CN106372519A (en) * 2016-08-30 2017-02-01 江苏博智软件科技有限公司 Information encryption method and device
CN106791087A (en) * 2016-12-20 2017-05-31 北京小米移动软件有限公司 The storage method of information, device and equipment

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111291363A (en) * 2020-01-19 2020-06-16 深圳信可通讯技术有限公司 Communication module operation processing method and device, communication module and computer readable medium
CN111291363B (en) * 2020-01-19 2022-02-15 深圳信可通讯技术有限公司 Communication module operation processing method and device, communication module and computer readable medium
CN113326239A (en) * 2021-06-24 2021-08-31 长江存储科技有限责任公司 File management method, device, equipment and computer readable storage medium
CN113836558A (en) * 2021-09-27 2021-12-24 西安万像电子科技有限公司 File encryption method, device and file decryption method
CN115086062A (en) * 2022-06-30 2022-09-20 三一电动车科技有限公司 Remote safety control method, system, device and vehicle
CN115086062B (en) * 2022-06-30 2023-08-11 三一电动车科技有限公司 Remote safety control method, system, device and vehicle
CN116226886A (en) * 2023-03-22 2023-06-06 ***通信集团广东有限公司 Information security management method and system for software information system
CN116226886B (en) * 2023-03-22 2024-02-09 ***通信集团广东有限公司 Information security management method and system for software information system

Similar Documents

Publication Publication Date Title
CN107622208A (en) Note encryption and decryption method and related product
Bojinov et al. Kamouflage: Loss-resistant password management
US20090276839A1 (en) Identity collection, verification and security access control system
CN108833093A (en) Determination method, apparatus, equipment and the storage medium of account key
WO2003003169A2 (en) Secure method and system for biometric verification
CN113452678A (en) Login information input method, login information storage method and related device
CN104158664A (en) Identity authentication method and system
CN106610995A (en) Ciphertext index creating method, device and system
KR102321608B1 (en) First copyright holder authentication system using blockchain and its method
CN105898054A (en) Verification-based message display method and communication terminal
CN106878275A (en) Auth method and device and server
CN110990811A (en) Identity authentication method and device
Kuvonchbek Method Authentication of Objects Information Communication
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
Gutmann et al. Zeta-zero-trust authentication: Relying on innate human ability, not technology
Juola Authorship attribution for electronic documents
CN105590044A (en) Information authentication method and apparatus
Crawford A framework for continuous, transparent authentication on mobile devices
Kannavara et al. Topics in biometric human-machine interaction security
CN107895114A (en) A kind of management method of encrypted message, electronic equipment and readable storage medium storing program for executing
CN113901821A (en) Entity naming identification method, device, equipment and storage medium
Yu et al. HoneyGAN: creating indistinguishable honeywords with improved generative adversarial networks
Jo et al. Vulnerability analysis on smartphone fingerprint templates
Fernando et al. Challenges and Opportunities in Password Management: A Review of Current Solutions
Raval et al. Security using 3D password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180123