[go: up one dir, main page]

CN101646168B - Data encryption method, decryption method and mobile terminal - Google Patents

Data encryption method, decryption method and mobile terminal Download PDF

Info

Publication number
CN101646168B
CN101646168B CN2009101897206A CN200910189720A CN101646168B CN 101646168 B CN101646168 B CN 101646168B CN 2009101897206 A CN2009101897206 A CN 2009101897206A CN 200910189720 A CN200910189720 A CN 200910189720A CN 101646168 B CN101646168 B CN 101646168B
Authority
CN
China
Prior art keywords
data
selected data
operator
portable terminal
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2009101897206A
Other languages
Chinese (zh)
Other versions
CN101646168A (en
Inventor
严石
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Device Co Ltd
Original Assignee
Huawei Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Device Co Ltd filed Critical Huawei Device Co Ltd
Priority to CN2009101897206A priority Critical patent/CN101646168B/en
Publication of CN101646168A publication Critical patent/CN101646168A/en
Priority to PCT/CN2010/075538 priority patent/WO2011023051A1/en
Application granted granted Critical
Publication of CN101646168B publication Critical patent/CN101646168B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/48Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种数据加密方法,包括:获取合法的运营商相关信息;利用所述运营商相关信息,对移动终端中的选定数据进行加密并存储。相应的,本发明还提供一种数据解密方法,以及使用上述两个方法的移动终端。本发明提供的数据加密方法、解密方法和移动终端,使得只有使用运营商提供的合法SIM卡才能正常操作移动终端,有效的保护了运营商的权益。

The invention discloses a data encryption method, which includes: acquiring legal operator-related information; using the operator-related information to encrypt and store selected data in a mobile terminal. Correspondingly, the present invention also provides a data decryption method and a mobile terminal using the above two methods. The data encryption method, the decryption method and the mobile terminal provided by the invention enable the mobile terminal to be normally operated only by using the legal SIM card provided by the operator, effectively protecting the rights and interests of the operator.

Description

数据加密方法、解密方法及移动终端Data encryption method, decryption method and mobile terminal

技术领域 technical field

本发明涉及移动通信应用领域,特别涉及数据加密、解密方法及移动终端。The invention relates to the field of mobile communication applications, in particular to data encryption and decryption methods and a mobile terminal.

背景技术 Background technique

运营商为了保证只有自己发放的SIM(Subscriber Identity Module,用户标识模块)卡才能够接入运营商的网络,在SIM卡中采用了SIM Lock技术。现有的SIM Lock方法是通过读取SIM卡里的IMSI(International MobileSubscriber Identity,国际移动用户识别码)中当前运营商信息,并判断当该当前运营商是满足条件的运营商时,允许手机正常使用并注册网络,如果判断当前运营商不是满足条件的运营商,则不能注册网络。In order to ensure that only the SIM (Subscriber Identity Module) card issued by the operator can access the operator's network, the operator adopts the SIM Lock technology in the SIM card. The existing SIM Lock method is by reading the current operator information in the IMSI (International Mobile Subscriber Identity, International Mobile Subscriber Identity) in the SIM card, and judging that when the current operator is an operator that meets the conditions, the mobile phone is allowed to operate normally. Use and register the network. If it is judged that the current operator is not a qualified operator, the network cannot be registered.

然而,发明人在实现本发明的过程中发现:现有的SIM Lock技术容易通过判断SIM IMSI信息的部分加入跳转语句等手段破解,从而使SIM Lock功能失效,这样一来,运营商的权益就无法得到保证。However, the inventor found in the process of realizing the present invention that: the existing SIM Lock technology is easy to crack by judging the part of the SIM IMSI information and adding a jump statement, thereby making the SIM Lock function invalid. In this way, the rights and interests of the operator cannot be guaranteed.

发明内容 Contents of the invention

为了更好的保护运营商的权益,保证只有使用运营商提供的合法用户标识模块才能正常操作移动终端,本发明实施例提供一种数据加密方法,解密方法和移动终端。In order to better protect the rights and interests of the operator and ensure that only the legal user identification module provided by the operator can normally operate the mobile terminal, the embodiment of the present invention provides a data encryption method, a decryption method and a mobile terminal.

本发明实施例一方面提供一种数据加密方法,该方法包括,获取合法的运营商相关信息;利用所述运营商相关信息,对移动终端中的选定数据进行加密并存储;所述选定数据为对操作界面正常显示有影响的数据。On the one hand, an embodiment of the present invention provides a data encryption method, the method includes: obtaining legal operator-related information; using the operator-related information to encrypt and store selected data in a mobile terminal; The data is the data that affects the normal display of the operation interface.

本发明实施例另一方面提供一种数据解密方法,该方法包括,获取已利用合法的运营商相关信息加密的移动终端中的选定数据;利用移动终端中的运营商相关信息,对所述加密的选定数据进行解密;所述选定数据为对操作界面正常显示有影响的数据。Another aspect of the embodiments of the present invention provides a data decryption method, the method includes: obtaining the selected data in the mobile terminal that has been encrypted with legal operator-related information; using the operator-related information in the mobile terminal to decrypt the The encrypted selected data is decrypted; the selected data is data that affects the normal display of the operation interface.

本发明实施例另一方面提供一种移动终端,包括,第一获取单元,用于获取合法的运营商相关信息;加密单元,用于利用所述运营商相关信息,对移动终端中的选定数据进行加密并存储;所述选定数据为对操作界面正常显示有影响的数据。Another aspect of the embodiments of the present invention provides a mobile terminal, including a first obtaining unit, used to obtain legal operator-related information; an encryption unit, used to use the operator-related information to select The data is encrypted and stored; the selected data is data that affects the normal display of the operation interface.

本发明实施例还提供一种移动终端,包括,存储单元,用于存储已利用合法的运营商相关信息加密的移动终端中的选定数据;解密单元,用于利用移动终端中的运营商相关信息,对所述加密的选定数据进行解密;所述选定数据为对操作界面正常显示有影响的数据。An embodiment of the present invention also provides a mobile terminal, including a storage unit for storing selected data in the mobile terminal that has been encrypted using legal operator-related information; a decryption unit for using the operator-related information in the mobile terminal to Information, to decrypt the encrypted selected data; the selected data is data that affects the normal display of the operation interface.

由上述方案可以看出,本发明实施例通过将合法用户标识模块的运营商相关信息作为加密因子,对移动终端的选定数据进行管理,使得只有使用合法用户标识模块时,移动终端的选定数据才能正常显示和操作。因此,本发明实施例更好得保护了运营商权益,同时节省了移动终端存储资源。It can be seen from the above scheme that the embodiment of the present invention manages the selected data of the mobile terminal by using the relevant information of the operator of the legal subscriber identity module as an encryption factor, so that only when the legitimate subscriber identity module is used, the selected data of the mobile terminal The data can be displayed and operated normally. Therefore, the embodiments of the present invention better protect the operator's rights and interests, and save storage resources of the mobile terminal at the same time.

附图说明 Description of drawings

图1为本发明实施例一数据加密方法的流程示意图;FIG. 1 is a schematic flow diagram of a data encryption method according to an embodiment of the present invention;

图2为本发明实施例二数据解密方法的流程示意图;FIG. 2 is a schematic flow diagram of a data decryption method according to Embodiment 2 of the present invention;

图3为本发明实施例二数据解密后终端界面非正常显示的示意图;3 is a schematic diagram of abnormal display of the terminal interface after data decryption in Embodiment 2 of the present invention;

图4为本发明实施例三移动终端结构示意图;FIG. 4 is a schematic structural diagram of a mobile terminal according to Embodiment 3 of the present invention;

图5为本发明实施例三另一移动终端结构示意图;FIG. 5 is a schematic structural diagram of another mobile terminal according to Embodiment 3 of the present invention;

图6为本发明实施例四移动终端结构示意图;FIG. 6 is a schematic structural diagram of a mobile terminal according to Embodiment 4 of the present invention;

图7为本发明实施例四另一移动终端结构示意图。FIG. 7 is a schematic structural diagram of another mobile terminal according to Embodiment 4 of the present invention.

具体实施方式 Detailed ways

本发明实施例提供一种数据加密方法、解密方法和移动终端,保证只有使用运营商提供的合法用户标识模块才能正常操作移动终端,更好的保护了运营商的权益,以下结合附图对具体实施方式加以说明。。The embodiment of the present invention provides a data encryption method, a decryption method, and a mobile terminal, which ensure that only the legal user identification module provided by the operator can operate the mobile terminal normally, and better protect the rights and interests of the operator. The embodiment will be described. .

图1为本发明实施例一数据加密方法的流程示意图,该方法主要包括,Fig. 1 is a schematic flow chart of a data encryption method according to an embodiment of the present invention, the method mainly includes,

101、获取合法的运营商相关信息;101. Obtain relevant information about legal operators;

需要说明的是,由于运营商有时希望提供给用户的移动终端只能使用自己提供的SIM卡或其它身份标识模块,因此移动终端制造商需要对提供给用户的移动终端采用本实施例中的加密方法处理,然后再将处理过的移动终端交付运营商销售。此处的“合法的运营商相关信息”,是指满足定制移动终端的运营商要求的运营商身份信息,该身份信息可以是定制运营商本身的身份信息,也可以是与定制运营商签订了某种使用协议的其它运营商的身份信息。It should be noted that the mobile terminal manufacturer needs to use the encryption in this embodiment for the mobile terminal provided to the user because the operator sometimes wishes to provide the mobile terminal to the user with only the SIM card or other identification module provided by the operator. method, and then deliver the processed mobile terminal to the operator for sale. The "legal operator-related information" here refers to the identity information of the operator that meets the requirements of the operator of the customized mobile terminal. Identity information of other operators of a certain usage agreement.

可以理解,该合法的运营商相关信息可以选用用户标识模块SIM卡中的国际移动用户识别码IMSI,或者其它可以标识运营商身份的信息。It can be understood that the legitimate operator-related information can be the International Mobile Subscriber Identity (IMSI) in the SIM card of the subscriber identity module, or other information that can identify the identity of the operator.

102、利用所述运营商相关信息,对移动终端中的选定数据进行加密并存储。102. Using the operator-related information, encrypt and store selected data in the mobile terminal.

具体的,获取合法的运营商相关信息后,对选定数据利用该运营商相关信息进行加密,例如使用二进制异或运算,以实现加密,然后存储加密后的选定数据。此处的选定数据是对移动终端操作界面正常显示有影响的数据,例如可以是操作系统文件中除代码以外的数据部分,具体可以是操作界面的图形数据和/或字体数据。Specifically, after obtaining legal operator-related information, the selected data is encrypted using the operator-related information, for example, by using a binary XOR operation to implement encryption, and then the encrypted selected data is stored. The selected data here is the data that affects the normal display of the operation interface of the mobile terminal, for example, it may be the data part in the operating system file except the code, specifically, it may be the graphic data and/or font data of the operation interface.

需要说明的是,本实施例一般是在运营商定制了移动终端后,终端设备厂商利用运营商提供的合法运营商信息对操作系统文件中的选定数据进行加密处理,并将加密处理后的操作系统连同其他软件等交给制造商烧制在移动终端中。加密后的选定数据的操作系统应该代替现有技术中的操作系统存储于移动终端中,后续只有正确的解密才能获得原始的选定数据,实现操作系统的正常显示。如果加密的只是操作系统中的图形数据,那么错误的解密后整个操作界面都不能正常显示;如果加密的只是操作系统中的字体数据,那么错误的解密后只能看到正常的图形,所有的文字都不能正常显示;若同时加密操作界面的图形数据和字体数据,则错误的解密后整个操作界面都不能正常显示。从而达到控制移动终端只能选用定制移动终端的运营商允许的用户识别模块的目的。It should be noted that in this embodiment, after the operator customizes the mobile terminal, the terminal equipment manufacturer uses the legal operator information provided by the operator to encrypt the selected data in the operating system file, and encrypt the encrypted data The operating system and other software are handed over to the manufacturer to be burned in the mobile terminal. The operating system of the encrypted selected data should be stored in the mobile terminal instead of the operating system in the prior art, and only after correct decryption can the original selected data be obtained to realize the normal display of the operating system. If only the graphic data in the operating system is encrypted, the entire operation interface cannot be displayed normally after wrong decryption; if only the font data in the operating system is encrypted, then only normal graphics can be seen after wrong decryption, and all Words cannot be displayed normally; if the graphic data and font data of the operation interface are encrypted at the same time, the entire operation interface cannot be displayed normally after the wrong decryption. In this way, the purpose of controlling the mobile terminal to only select the user identification module allowed by the operator of the customized mobile terminal is achieved.

本实施例提供的数据加密方法,将合法用户标识模块的运营商相关信息作为加密因子,对移动终端的选定数据进行管理,使得只有使用合法用户标识模块时,移动终端的选定数据才能正常显示和操作,从而达到了保护运营商合法利益的目的。The data encryption method provided by this embodiment uses the operator-related information of the legal subscriber identity module as an encryption factor to manage the selected data of the mobile terminal, so that only when the legitimate subscriber identity module is used, the selected data of the mobile terminal can be normal Display and operation, so as to achieve the purpose of protecting the legitimate interests of operators.

可选的,在实施例一的基础上,在对选定数据进行加密处理之前,还可以包括,利用压缩算法对移动终端中的选定数据进行压缩。此时,步骤102具体为,对利用压缩算法压缩后的选定数据利用IMSI进行加密运算。Optionally, on the basis of Embodiment 1, before encrypting the selected data, it may further include, using a compression algorithm to compress the selected data in the mobile terminal. At this time, step 102 is specifically to perform encryption operation on the selected data compressed by the compression algorithm by using the IMSI.

由于压缩处理后的数据所占用的空间明显小于压缩处理前,因此本实施例还可节省移动终端的存储空间。Since the space occupied by the compressed data is significantly smaller than that before the compression, this embodiment can also save the storage space of the mobile terminal.

相应的,本发明实施例二还提供了一种数据解密的方法,参见图2,该方法的前提是,移动终端中的选定数据已经被加密,其具体实施过程与前一实施例相同,此处不再赘述。Correspondingly, Embodiment 2 of the present invention also provides a method for decrypting data, as shown in FIG. 2 , the premise of this method is that the selected data in the mobile terminal has been encrypted, and its specific implementation process is the same as that of the previous embodiment. I won't repeat them here.

本实施例提供的数据解密方法包括:The data decryption method provided in this embodiment includes:

201、获取已利用合法的运营商相关信息加密的移动终端中的选定数据。201. Acquire selected data in the mobile terminal that has been encrypted using legal operator-related information.

本步骤的执行主体是移动终端,该选定数据采用的加密算法是利用合法的运营商相关信息作为加密因子。其中的合法的运营商相关信息的含义与前一实施例相同。此处的选定数据是对移动终端操作界面正常显示有影响的数据,例如可以是操作系统文件中除代码以外的数据部分,具体可以是操作界面的图形数据和/或字体数据。The subject of execution of this step is the mobile terminal, and the encryption algorithm adopted by the selected data uses legal operator-related information as an encryption factor. The legal operator-related information has the same meaning as that in the previous embodiment. The selected data here is the data that affects the normal display of the operation interface of the mobile terminal, for example, it may be the data part in the operating system file except the code, specifically, it may be the graphic data and/or font data of the operation interface.

202、利用移动终端中的运营商相关信息,对所述加密的选定数据进行解密。202. Decrypt the encrypted selected data by using operator-related information in the mobile terminal.

本步骤中,移动终端首先将移动终端本地的运营商相关信息提取出来,并作为解密因子对以加密的选定数据进行解密运算(例如二进制的异或运算),以便后续对选定数据进行操作。In this step, the mobile terminal first extracts the relevant information of the local operator of the mobile terminal, and uses it as a decryption factor to perform a decryption operation on the encrypted selected data (for example, a binary XOR operation), so that the selected data can be subsequently operated .

若选定数据不仅被加密,而且在加密之前还进行了压缩,则本步骤202之后还包括:If the selected data is not only encrypted, but also compressed before encryption, after this step 202, it also includes:

203、利用解压缩算法对解密后的数据进行解压缩。203. Use a decompression algorithm to decompress the decrypted data.

具体的,解密和解压缩的处理过程包括:先利用移动终端本地的运营商相关信息对压缩和加密的选定数据进行解密运算,对应于前一实施例的解密运算为二进制的异或运算,然后对解密后的数据进行解压缩,采用的解压缩算法对应于前一实施例的压缩算法(如LZSS)。如果移动终端本地的运营商相关信息与合法的运营商相关信息相同,则选定数据可以正常解密和解压缩,反之,则选定数据不能被正常解密和解压缩。Specifically, the process of decrypting and decompressing includes: first, using the relevant information of the local operator of the mobile terminal to perform a decryption operation on the compressed and encrypted selected data, the decryption operation corresponding to the previous embodiment is a binary XOR operation, and then The decrypted data is decompressed, and the decompression algorithm adopted corresponds to the compression algorithm (such as LZSS) of the previous embodiment. If the local carrier-related information of the mobile terminal is the same as the legitimate carrier-related information, the selected data can be decrypted and decompressed normally, otherwise, the selected data cannot be decrypted and decompressed normally.

可选的,若选定数据只被加密,步骤202之后还包括步骤204;若选定数据被加密和压缩,步骤203之后还包括步骤204。步骤204具体如下:Optionally, if the selected data is only encrypted, step 204 is also included after step 202; if the selected data is encrypted and compressed, step 204 is also included after step 203. Step 204 is specifically as follows:

204、读取并使用处理后的选定数据。204. Read and use the processed selected data.

由于选定数据是影响移动终端操作系统正常显示的图片或文字等数据,此处的读取并使用是移动终端正常使用会涉及的。若移动终端本地的运营商相关信息是合法的,且选定数据仅被加密,那么只要加密算法和解密算法对应,解密处理后的选定数据就与原始的加密前的数据一样,移动终端的界面可正常显示并操作。若移动终端本地的运营商相关信息是合法的,选定数据同时被压缩和加密,只要加密算法和解密算法对应、解压缩算法与压缩算法对应,则解密和解压缩处理后的选定数据与原始的处理前的数据一样,移动终端的界面可正常显示并操作。Since the selected data is data such as pictures or texts that affect the normal display of the operating system of the mobile terminal, the reading and use here are involved in the normal use of the mobile terminal. If the local operator-related information of the mobile terminal is legal and the selected data is only encrypted, then as long as the encryption algorithm corresponds to the decryption algorithm, the selected data after decryption is the same as the original data before encryption. The interface can be displayed and operated normally. If the relevant information of the local operator of the mobile terminal is legal, the selected data is compressed and encrypted at the same time, as long as the encryption algorithm corresponds to the decryption algorithm, and the decompression algorithm corresponds to the compression algorithm, the selected data after decryption and decompression processing is the same as the original The data before processing is the same, and the interface of the mobile terminal can be displayed and operated normally.

若移动终端本地的运营商相关信息是不合法的,即使加密算法与解密算法对应,解压缩算法与压缩算法对应,解密和解压缩处理后的选定数据也不能正常使用,如果选定数据只是操作系统中的图形数据,那么错误的解密解压缩后整个操作界面都不能正常显示;如果选定数据是操作系统中的字体数据,那么错误的解密解压缩后只能看到正常的图形,所有的文字都不能正常显示;若选定数据同时包括操作界面的图形数据和字体数据,则错误的解密解压缩后整个操作界面都不能正常显示。选定数据包括操作系统图形数据时,错误解密后移动终端的界面显示为图3所示的样子。If the local operator-related information of the mobile terminal is illegal, even if the encryption algorithm corresponds to the decryption algorithm, and the decompression algorithm corresponds to the compression algorithm, the selected data after decryption and decompression processing cannot be used normally. Graphics data in the system, the entire operation interface cannot be displayed normally after wrong decryption and decompression; if the selected data is font data in the operating system, then only normal graphics can be seen after wrong decryption and decompression, all The text cannot be displayed normally; if the selected data includes the graphic data and font data of the operation interface at the same time, the entire operation interface cannot be displayed normally after the wrong decryption and decompression. When the selected data includes the graphics data of the operating system, the interface of the mobile terminal is displayed as shown in FIG. 3 after being wrongly decrypted.

本实施例提供的解压缩处理方法,对于利用合法用户标识模块的运营商相关信息作为加密因子进行加密的选定数据,加入移动终端本地的运营商相关信息进行解密处理,使得只有使用合法运营商相关信息时,移动终端的选定数据才能正常显示和操作。In the decompression processing method provided by this embodiment, for the selected data encrypted using the operator-related information of the legal user identification module as an encryption factor, the local operator-related information of the mobile terminal is added to decrypt the data, so that only the legal operator Only when relevant information is displayed, the selected data of the mobile terminal can be displayed and operated normally.

为实施之前的方法,本发明实施例三和实施例四还提供采用上述方法的移动终端。In order to implement the previous method, Embodiment 3 and Embodiment 4 of the present invention also provide a mobile terminal adopting the above method.

本发明实施例三提供的移动终端,如图4所示。需要说明的是,虽然实施例一中加密方法的实现,一般在运营商定制了移动终端后,终端设备厂商利用运营商提供的合法运营商信息对操作系统文件中的选定数据进行加密处理,并将加密处理后的操作系统连同其他软件等交给制造商烧制在移动终端中。但是该加密方法也可以在每个终端中分别实现。此时,该移动终端包括:第一获取单元,用于获取合法的运营商相关信息;加密单元,用于利用所述运营商相关信息,对移动终端中的选定数据进行加密并存储。The mobile terminal provided by Embodiment 3 of the present invention is shown in FIG. 4 . It should be noted that although the encryption method in Embodiment 1 is implemented, generally after the operator customizes the mobile terminal, the terminal equipment manufacturer uses the legal operator information provided by the operator to encrypt the selected data in the operating system file. And hand over the encrypted operating system together with other software to the manufacturer to burn in the mobile terminal. However, this encryption method can also be implemented separately in each terminal. At this time, the mobile terminal includes: a first acquiring unit, configured to acquire legitimate operator-related information; an encryption unit, configured to use the operator-related information to encrypt and store selected data in the mobile terminal.

可选的,所述运营商相关信息具体为用户标识模块SIM卡中的国际移动用户识别码IMSI。Optionally, the operator-related information is specifically the International Mobile Subscriber Identity (IMSI) in the SIM card of the Subscriber Identity Module.

可选的,如图5所示,所述移动终端还包括,压缩单元,用于利用压缩算法对移动终端中的选定数据进行压缩。此时,所述加密单元具体用于对压缩后的选定数据利用IMSI进行加密运算,然后存储。Optionally, as shown in FIG. 5 , the mobile terminal further includes a compression unit, configured to compress selected data in the mobile terminal by using a compression algorithm. At this time, the encryption unit is specifically configured to perform an encryption operation on the compressed selected data using the IMSI, and then store it.

本实施例提供的移动终端,将合法用户标识模块的运营商相关信息作为加密因子,对移动终端的选定数据进行管理,使得只有使用合法用户标识模块时,移动终端的选定数据才能正常显示和操作,从而达到了保护运营商合法利益的目的,另一方面由于压缩处理后的数据所占用的空间明显小于压缩处理前,因此本实施例还可节省移动终端的存储空间。The mobile terminal provided by this embodiment uses the operator-related information of the legal subscriber identity module as an encryption factor to manage the selected data of the mobile terminal, so that only when the legitimate subscriber identity module is used, the selected data of the mobile terminal can be displayed normally and operation, so as to achieve the purpose of protecting the legitimate interests of the operator. On the other hand, since the space occupied by the compressed data is significantly smaller than that before the compression, this embodiment can also save the storage space of the mobile terminal.

本发明实施例四提供一种移动终端,如图6所示,该移动终端包括,存储单元,用于存储已利用合法的运营商相关信息加密的移动终端中的选定数据;解密单元,用于利用移动终端中的运营商相关信息,对所述加密的选定数据进行解密。Embodiment 4 of the present invention provides a mobile terminal, as shown in FIG. 6 , the mobile terminal includes a storage unit for storing selected data in the mobile terminal that has been encrypted using legal operator-related information; a decryption unit for The encrypted selected data is decrypted by using the operator-related information in the mobile terminal.

优选的,如图7所示,所述移动终端还包括,解压缩单元,用于在解密单元解密所述选定数据后,利用解压缩算法对解密后的数据进行解压缩。Preferably, as shown in FIG. 7 , the mobile terminal further includes a decompression unit, configured to use a decompression algorithm to decompress the decrypted data after the decryption unit decrypts the selected data.

优选的,如图7所示,所述移动终端还包括,执行单元,用于读取并使用所述解压缩处理后的移动终端数据。Preferably, as shown in FIG. 7 , the mobile terminal further includes an execution unit, configured to read and use the decompressed mobile terminal data.

优选的,所述这营商相关信息具体为用户标识模块SIM卡中的国际移动用户识别码IMSIPreferably, the business-related information is specifically the International Mobile Subscriber Identity (IMSI) in the Subscriber Identity Module SIM card.

由于选定数据是影响移动终端操作系统正常显示的图片或文字等数据,此处的读取并使用是移动终端正常使用会涉及的。若移动终端本地的运营商相关信息是合法的,且选定数据仅被加密,那么只要加密算法和解密算法对应,解密处理后的选定数据就与原始的加密前的数据一样,移动终端的界面可正常显示并操作。若移动终端本地的运营商相关信息是合法的,选定数据同时被加密和压缩,只要加密算法和解密算法对应、解压缩算法与压缩算法对应,则解密和解压缩处理后的选定数据与原始的处理前的数据一样,移动终端的界面可正常显示并操作。Since the selected data is data such as pictures or texts that affect the normal display of the operating system of the mobile terminal, the reading and use here are involved in the normal use of the mobile terminal. If the local operator-related information of the mobile terminal is legal and the selected data is only encrypted, then as long as the encryption algorithm corresponds to the decryption algorithm, the selected data after decryption is the same as the original data before encryption. The interface can be displayed and operated normally. If the relevant information of the local operator of the mobile terminal is legal, the selected data is encrypted and compressed at the same time, as long as the encryption algorithm corresponds to the decryption algorithm, and the decompression algorithm corresponds to the compression algorithm, the selected data after decryption and decompression processing is the same as the original The data before processing is the same, and the interface of the mobile terminal can be displayed and operated normally.

若移动终端本地的运营商相关信息是不合法的,即使加密算法与解密算法对应,解压缩算法与压缩算法对应,解密和解压缩处理后的选定数据也不能正常使用,如果选定数据只是操作系统中的图形数据,那么错误的解密解压缩后整个操作界面都不能正常显示;如果选定数据是操作系统中的字体数据,那么错误的解密解压缩后只能看到正常的图形,所有的文字都不能正常显示;若选定数据同时包括操作界面的图形数据和字体数据,则错误的解密解压缩后整个操作界面都不能正常显示。选定数据包括操作系统图形数据时,错误解密后移动终端的界面显示为图3所示的样子。If the local operator-related information of the mobile terminal is illegal, even if the encryption algorithm corresponds to the decryption algorithm, and the decompression algorithm corresponds to the compression algorithm, the selected data after decryption and decompression processing cannot be used normally. Graphics data in the system, the entire operation interface cannot be displayed normally after wrong decryption and decompression; if the selected data is font data in the operating system, then only normal graphics can be seen after wrong decryption and decompression, all The text cannot be displayed normally; if the selected data includes the graphic data and font data of the operation interface at the same time, the entire operation interface cannot be displayed normally after the wrong decryption and decompression. When the selected data includes the graphics data of the operating system, the interface of the mobile terminal is displayed as shown in FIG. 3 after being wrongly decrypted.

本实施例提供的移动终端,对于利用合法用户标识模块的运营商相关信息作为加密因子,加入移动终端本地的运营商相关信息进行解密处理,使得只有使用合法运营商相关信息时,移动终端的选定数据才能正常显示和操作。For the mobile terminal provided in this embodiment, the operator-related information of the legal user identification module is used as an encryption factor, and the local operator-related information of the mobile terminal is added to perform decryption processing, so that only when the legal operator-related information is used, the selection of the mobile terminal Only certain data can be displayed and operated normally.

本发明实施例提供的压缩方法、解密方法和相应的移动终端,实现了保证只有使用运营商提供的合法用户标识模块才能正常操作移动终端,同时由于压缩后的数据所占用的存储空间比未压缩前要小,因此也实现了节省存储资源的效果。The compression method, the decryption method and the corresponding mobile terminal provided by the embodiment of the present invention ensure that only the legal user identification module provided by the operator can operate the mobile terminal normally. The front is smaller, so the effect of saving storage resources is also achieved.

本领域普通技术人员可以理解实现上述实施例方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,所述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,实施的步骤与方法相同,所述的存储介质,如:ROM/RAM、磁碟、光盘等。Those of ordinary skill in the art can understand that all or part of the steps in the method of the above-mentioned embodiments can be completed by instructing related hardware through a program, and the program can be stored in a computer-readable storage medium, and the program can be executed during execution When, the implementation steps are the same as the method, the storage medium, such as: ROM/RAM, magnetic disk, optical disk, etc.

以上是对本发明具体实施例的说明,在具体的实施过程中可对本发明的方法进行适当的改进,以适应具体情况的具体需要。因此可以理解,根据本发明的具体实施方式只是起示范作用,并不用以限制本发明的保护范围。The above is the description of the specific embodiments of the present invention, and the method of the present invention can be appropriately improved during the specific implementation process to meet the specific needs of specific situations. Therefore, it can be understood that the specific implementation manners according to the present invention are only exemplary, and are not intended to limit the protection scope of the present invention.

Claims (14)

1. a data ciphering method is characterized in that, this method comprises:
Obtain legal operator's relevant information;
Utilize said operator relevant information, the selected data in the portable terminal is encrypted and stored;
Said selected data is to the influential data of the normal demonstration of operation interface.
2. data ciphering method as claimed in claim 1 is characterized in that, said operator relevant information is specially the international mobile subscriber identity IMSI in the Subscriber Identity Module SIM.
3. data ciphering method as claimed in claim 2 is characterized in that, also comprises before the said encryption, utilizes compression algorithm that the selected data in the portable terminal is compressed;
Said selected data in the portable terminal is encrypted is specially, and utilizes IMSI to carry out cryptographic calculation to utilizing the selected data after compression algorithm is compressed.
4. a data decryption method is characterized in that, comprising:
Obtain the selected data in the portable terminal that utilizes legal operator's relevant information encryption;
Utilize the operator's relevant information in the portable terminal, the selected data of said encryption is deciphered;
Said selected data is to the influential data of the normal demonstration of operation interface.
5. data decryption method as claimed in claim 4 is characterized in that the selected data of said encryption also passes through the compression of compression algorithm;
Said selected data to said encryption also comprises after deciphering, and utilizes decompression algorithm that the data after deciphering are decompressed.
6. data decryption method as claimed in claim 5 is characterized in that, also comprises after the decompression, reads and use the selected data after said decompression is accomplished.
7. like each described data decryption method of claim 4 to 6, it is characterized in that said operator relevant information is specially the international mobile subscriber identity IMSI in the Subscriber Identity Module SIM.
8. a portable terminal is characterized in that, comprising:
First acquiring unit is used to obtain legal operator's relevant information;
Ciphering unit is used to utilize said operator relevant information, and the selected data in the portable terminal is encrypted and stored;
Said selected data is to the influential data of the normal demonstration of operation interface.
9. portable terminal as claimed in claim 8 is characterized in that, said operator relevant information is specially the international mobile subscriber identity IMSI in the Subscriber Identity Module SIM.
10. portable terminal as claimed in claim 9 is characterized in that said portable terminal also comprises, compression unit is used for utilizing compression algorithm that the selected data of portable terminal is compressed;
Said ciphering unit specifically is used for utilizing IMSI to carry out cryptographic calculation to the selected data after the compression, then storage.
11. a portable terminal is characterized in that, comprising:
Memory cell is used for storing the selected data that has utilized the portable terminal that legal operator relevant information encrypts;
Decryption unit is used for utilizing operator's relevant information of portable terminal, and the selected data of said encryption is deciphered;
Said selected data is to the influential data of the normal demonstration of operation interface.
12. portable terminal as claimed in claim 11 is characterized in that, said portable terminal also comprises, decompression unit is used for after decryption unit is deciphered said selected data, utilizes decompression algorithm that the data after deciphering are decompressed.
13. portable terminal as claimed in claim 12 is characterized in that, said portable terminal also comprises, performance element is used to read and use the mobile terminal data after the said decompression.
14., it is characterized in that said operator relevant information is specially the international mobile subscriber identity IMSI in the Subscriber Identity Module SIM like each described portable terminal of claim 11 to 13.
CN2009101897206A 2009-08-24 2009-08-24 Data encryption method, decryption method and mobile terminal Expired - Fee Related CN101646168B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2009101897206A CN101646168B (en) 2009-08-24 2009-08-24 Data encryption method, decryption method and mobile terminal
PCT/CN2010/075538 WO2011023051A1 (en) 2009-08-24 2010-07-29 Data encryption method, data decryption method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009101897206A CN101646168B (en) 2009-08-24 2009-08-24 Data encryption method, decryption method and mobile terminal

Publications (2)

Publication Number Publication Date
CN101646168A CN101646168A (en) 2010-02-10
CN101646168B true CN101646168B (en) 2012-01-25

Family

ID=41657833

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009101897206A Expired - Fee Related CN101646168B (en) 2009-08-24 2009-08-24 Data encryption method, decryption method and mobile terminal

Country Status (2)

Country Link
CN (1) CN101646168B (en)
WO (1) WO2011023051A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101646168B (en) * 2009-08-24 2012-01-25 华为终端有限公司 Data encryption method, decryption method and mobile terminal
LT2725908T (en) * 2011-06-29 2017-09-11 Alkermes, Inc. Peripherally acting opioid compounds
CN103856938B (en) * 2012-12-04 2017-07-28 中兴通讯股份有限公司 A kind of method of encrypting and decrypting, system and equipment
CN105101188B (en) * 2015-06-30 2020-02-11 上海方鹊网络科技有限公司 Method, system and device for preventing information leakage
CN105530637A (en) * 2015-12-11 2016-04-27 北京元心科技有限公司 Method for protecting subscriber privacy of intelligent terminal and intelligent terminal
CN108153557A (en) * 2016-12-02 2018-06-12 北大方正集团有限公司 Font transmission method and device
CN110568992A (en) * 2018-06-06 2019-12-13 华为技术有限公司 A data processing device and method
CN108920573A (en) * 2018-06-22 2018-11-30 北京奇艺世纪科技有限公司 A kind of data buffer storage processing method, device and terminal device
CN109784080A (en) * 2019-02-11 2019-05-21 广东省城乡规划设计研究院 Method for managing security, system and readable storage medium storing program for executing based on GIS data

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7177425B2 (en) * 2002-07-10 2007-02-13 Benq Corporation Device and method for securing information associated with a subscriber in a communication apparatus
CN101026834A (en) * 2007-01-17 2007-08-29 中兴通讯股份有限公司 Locking method and unlocking method
CN101098540A (en) * 2006-06-27 2008-01-02 深圳市中兴集成电路设计有限责任公司 Encrypting chip based mobile terminal network-locking device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW591630B (en) * 2002-06-04 2004-06-11 Key Technology Corp Data security device of storage medium and data security method
CN101646168B (en) * 2009-08-24 2012-01-25 华为终端有限公司 Data encryption method, decryption method and mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7177425B2 (en) * 2002-07-10 2007-02-13 Benq Corporation Device and method for securing information associated with a subscriber in a communication apparatus
CN101098540A (en) * 2006-06-27 2008-01-02 深圳市中兴集成电路设计有限责任公司 Encrypting chip based mobile terminal network-locking device
CN101026834A (en) * 2007-01-17 2007-08-29 中兴通讯股份有限公司 Locking method and unlocking method

Also Published As

Publication number Publication date
WO2011023051A1 (en) 2011-03-03
CN101646168A (en) 2010-02-10

Similar Documents

Publication Publication Date Title
CN101646168B (en) Data encryption method, decryption method and mobile terminal
CN100542085C (en) System and method for secure executable code
US20160117518A1 (en) File Encryption/Decryption Device And File Encryption/Decryption Method
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN105005731A (en) A data encryption and decryption method and mobile terminal
US10341305B2 (en) Encrypted communications method and communications terminal, and computer storage medium
CN104573551A (en) File processing method and mobile terminal
US9276748B2 (en) Data-encrypting method and decrypting method for a mobile phone
CN101795450A (en) Method and device for carrying out security protection on mobile phone data
CN103258167A (en) Method for protecting png picture in handheld device
US20170091483A1 (en) Method and Device for Protecting Address Book, and Communication System
KR101625785B1 (en) Method and device for information security management of mobile terminal, and mobile terminal
CN103929312A (en) Mobile terminal and method and system for protecting individual information of mobile terminal
CN102752751B (en) The guard method of application and device
CN102572750A (en) Method and terminal for protecting short messages
CN102142072A (en) Encryption processing and decryption processing method and device of electronic files
CN104092680A (en) Coding and decoding method, device and system for audio signal
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN103605927A (en) Encryption and decryption method based on embedded Linux system
CN104866738A (en) Program code protection method and device
CN103491384B (en) Encrypting method and device of video and decrypting method and device of video
US20210143978A1 (en) Method to secure a software code performing accesses to look-up tables
CN105451201A (en) Mobile terminal, remote control method of mobile terminal, remote control device of mobile terminal and remote control system of mobile terminal
CN107889102B (en) Method and device for encrypting and decrypting information in short message
CN104363584B (en) A kind of method, apparatus and terminal of short message Encrypt and Decrypt

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20171121

Address after: Metro Songshan Lake high tech Industrial Development Zone, Guangdong Province, Dongguan City Road 523808 No. 2 South Factory (1) project B2 -5 production workshop

Patentee after: Huawei terminal (Dongguan) Co.,Ltd.

Address before: 518129 Longgang District, Guangdong, Bantian HUAWEI base B District, building 2, building No.

Patentee before: HUAWEI DEVICE Co.,Ltd.

CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 523808 Southern Factory Building (Phase I) Project B2 Production Plant-5, New Town Avenue, Songshan Lake High-tech Industrial Development Zone, Dongguan City, Guangdong Province

Patentee after: HUAWEI DEVICE Co.,Ltd.

Address before: 523808 Southern Factory Building (Phase I) Project B2 Production Plant-5, New Town Avenue, Songshan Lake High-tech Industrial Development Zone, Dongguan City, Guangdong Province

Patentee before: Huawei terminal (Dongguan) Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120125