Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Real-time encryption and decryption system and real-time encryption and decryption method for mobile products

A mobile product, encryption and decryption technology, applied in the field of data security, can solve the problems of complicated operation, low efficiency, no encryption and decryption process, etc., and achieve the effect of high security and high security

Inactive Publication Date: 2014-03-26
PHICOMM (SHANGHAI) CO LTD
View PDF1 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In fact, these methods are relatively simple at present, and are acceptable to general users at present, but for customers with relatively high security requirements, or with the further popularization of mobile phone functionality, these methods will not be able to meet our security requirements
[0006] 2) The operation is complicated, resulting in additional input and output data volume and low efficiency
This technology performs real-time processing of data encryption and decryption requirements in the user's normal artifacts, without explicit encryption and decryption processes, and does not generate temporary files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Real-time encryption and decryption system and real-time encryption and decryption method for mobile products
  • Real-time encryption and decryption system and real-time encryption and decryption method for mobile products
  • Real-time encryption and decryption system and real-time encryption and decryption method for mobile products

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] For portable mobile products, such as mobile phones, the present invention divides its data into common data and encrypted data. Save ordinary data on the user's mobile phone, while encrypted data is saved on the server side.

[0049] When the user connects to the encrypted data server and passes the identity verification and mobile phone certificate verification, the mobile phone will enter the encryption mode. In this mode, any document data operation (including creating, browsing, editing, changing, etc.) The client downloads the encrypted data, authorizes the mobile phone to decrypt and display it to the user in plain text, and any operation results of the user will be encrypted and stored on the server.

[0050] When the user exits the encryption mode, the mobile phone cannot access the encrypted data, and the user enters the normal mode, and the operation data is saved in the user's mobile phone at this time.

[0051] The real-time encryption and decryption devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a real-time encryption and decryption system and a real-time encryption and decryption method for mobile products. When a mobile terminal is in an encryption mode, any file data operation refers to downloading encrypted data from a server side and authorizing the mobile terminal to decrypt the encrypted data to display to a user in a clear text mode, and any user operation result is stored in the server side after being encrypted; after the user quits the encryption mode, the mobile terminal cannot contact with the encrypted data, the user enters a common mode, and operation data are stored in the mobile terminal at the moment. According to the real-time encryption and decryption system and the real-time encryption and decryption method, existing operation modes and use habits of the user are not changed, input and output data quantity is not increased, and high safety is achieved.

Description

technical field [0001] The invention relates to the field of data security, in particular to a real-time encryption and decryption system and method for mobile products. Background technique [0002] Mobile products such as mobile phones have become an indispensable part of our lives. With the rapid development of hardware, software and networks, mobile products will become more powerful and inevitably face threats to information security. [0003] At present, the main encryption methods used by mobile products such as mobile phones are: suffix name encryption, shift method, setting hidden attributes, mobile phone lock encryption, encryption software (Phone Wizard encryption, etc.) to encrypt files. [0004] It can be seen that the basic idea of ​​several encryption methods currently used by mobile phones is still the traditional "prevention and blocking" mode, and its main disadvantages are twofold: [0005] 1) The security is not high. At present, several encryption meth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 成崇鑫
Owner PHICOMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products