Transmit the encryption and decryption approaches and encryption and decryption devices of fileThe application is submission on October 28th, 2015 Patent Office of the People's Republic of China, application No. is 201510719602.7, denominations of inventionFor the divisional application of " encryption and decryption approaches and encryption and decryption devices of transmission file ", entire contents are incorporated by referenceIn this application.
Technical field
The present invention relates to encryption and decryption technology field more particularly to it is a kind of transmit file encryption and decryption approaches and encryption andDecrypt device.
Background technology
With the development of society, internet and mobile Internet have become in people's life, inseparable onePoint, brought in internet various convenience with it is quick while, the leakage of individual subscriber privacy also becomes focus of attention.ExistingHave in technology, instant chat software or even if communication tool does not all add file content when file transmits in itselfIt is close, that is to say, that any other people can normally open as long as this file is got and check, obtain content therein.In this waySafety is very poor, transmits some classified papers if necessary by instant chat software or computer is invaded by others, then oneA little valuable individual privacies or classified papers may just be easy to reveal.
Therefore, using the secret file of Internet user, there are larger safety problems in the related art.
Invention content
In view of this, the purpose of the present invention is to provide a kind of encryption and decryption approaches for transmitting file and encryptions and decryptionDevice, it is intended to which there are larger safety problems using the secret file of Internet user in the prior art for solution.
In order to solve the above technical problems, an embodiment of the present invention provides following technical schemes:
The present invention provides a kind of encryption method for transmitting file, the encryption method of the transmission file includes following stepSuddenly:
Sender mobile terminal receives file and file transmission instruction to be transmitted, is carried in the file transmission instructionThere is key target user mark;
Sender mobile terminal is identified according to the key target user, opens the video window of sender mobile terminal;The eyeball information of recipient mobile terminal user is acquired by the video window;
Sender mobile terminal uses the eyeball information of collected recipient mobile terminal user, to described to be transmittedFile is encrypted;
Sender mobile terminal is transmitted according to the file and is instructed, and the encrypted file to be transmitted is transmitted to and is connectDebit's mobile terminal;
Recipient's mobile terminal receives encryption file and the decryption designated user's mark that sender mobile terminal is sent;
According to the decryption designated user mark, recipient's mobile terminal opens the acquisition recipient's movement of eyeball acquisition moduleThe eyeball information of terminal user;
Recipient's mobile terminal uses the eyeball information of collected recipient mobile terminal user, to the encryption fileIt is decrypted;
Successful decryption, then recipient's mobile terminal open the file.
The present invention also provides a kind of encryption method for transmitting file, the encryption method of the transmission file includes following stepSuddenly:
File and file transmission instruction to be transmitted is received, key target user is carried in the file transmission instructionMark;
It is identified according to the key target user, obtains the key that the file to be transmitted is encrypted;
It is encrypted using file to be transmitted described in the key pair;
It is transmitted and instructed according to the file, the encrypted file to be transmitted is transmitted to recipient's mobile terminal.
The present invention also provides a kind of decryption method for transmitting file, the decryption method of the transmission file includes following stepSuddenly:
Receive encryption file and the decryption designated user's mark that sender mobile terminal is sent;
According to the decryption designated user mark, the key that the encryption file is decrypted is obtained;
Using the key of the decryption, the encryption file is decrypted;
Successful decryption then opens the file.
The present invention also provides a kind of encryption device for transmitting file, the encryption device of the transmission file includes:
Receiving module for receiving file and file transmission instruction to be transmitted, carries in the file transmission instructionThere is key target user mark;
Key Acquisition Module for being identified according to the key target user, obtains and the file to be transmitted is carried outEncrypted key;
Encrypting module, for being encrypted using file to be transmitted described in the key pair;
Transmission module instructs for being transmitted according to the file, the encrypted file to be transmitted is transmitted to and is connectDebit's mobile terminal.
The present invention also provides a kind of decryption device for transmitting file, the decryption device of the transmission file includes:
Receiving module, for receiving the encryption file of sender mobile terminal transmission and decryption designated user's mark;
Key Acquisition Module, for according to the decryption designated user mark, obtaining and the encryption file being decryptedKey;
Deciphering module, for using the key of the decryption, the encryption file to be decrypted;
File Open module for successful decryption, then opens the file.
Relative to the prior art, the encryption and decryption approaches and encryption and decryption devices of transmission file of the invention pass throughWhen transmitting file, the file is encrypted according to specified eyeball information, recipient is then forwarded to after encryption and is moved eventuallyEnd, the eyeball information that recipient's acquisition for mobile terminal is specified the encryption file received to be decrypted, are only decrypted intoWork(could open file and be checked.Therefore, the present invention can ensure that the safety of network transmission file, not only facilitate but also quick, poleThe usage experience of big raising user.
Description of the drawings
Fig. 1 is the realization flow diagram of the encryption method of transmission file that the embodiment of the present invention one provides;
Fig. 2 is the realization flow diagram of the encryption method of transmission file provided by Embodiment 2 of the present invention;
Fig. 3 is the realization flow diagram of the encryption method of transmission file that the embodiment of the present invention three provides;
Fig. 4 is the realization flow diagram of the decryption method of transmission file that the embodiment of the present invention four provides;
Fig. 5 is the realization flow diagram of the decryption method of transmission file that the embodiment of the present invention five provides;
Fig. 6 is the realization flow diagram of the decryption method of transmission file that the embodiment of the present invention six provides;
Fig. 7 is the structure diagram of the encryption device of transmission file that the embodiment of the present invention seven provides;
Fig. 8 is the structure diagram of the encryption device of transmission file that the embodiment of the present invention eight provides;
Fig. 9 is the structure diagram of the encryption device of transmission file that the embodiment of the present invention nine provides;
Figure 10 is the structure diagram of the decryption device for the transmission file that the embodiment of the present invention ten provides;
Figure 11 is the structure diagram of the decryption device for the transmission file that the embodiment of the present invention 11 provides;
Figure 12 is the structure diagram of the decryption device for the transmission file that the embodiment of the present invention 12 provides.
Specific embodiment
Please refer to the schema in attached drawing, wherein identical element numbers represent identical component, the principle of the present invention be withImplement to illustrate in an appropriate computing environment.The following description is the specific implementation based on the exemplified present inventionExample is not construed as the limitation present invention other specific embodiments not detailed herein.
The principle of the invention illustrates that be not represented as a kind of limitation, those skilled in the art can with above-mentioned wordIt solves plurality of step as described below and operation also may be implemented in hardware.The principle of the present invention uses many other wide usagesOr specific purpose operation, communication environment or configuration are operated.
The encryption and decryption approaches and encryption and decryption devices of transmission file provided by the invention, are mainly used in terminal and setIt is standby, such as:Mobile phone, computer, personal digital assistant (Personal Digital Assistant, PDA) etc..
It will be described in detail respectively below.
Embodiment one
Referring to Fig. 1, it show the encryption method of transmission file provided in an embodiment of the present invention.
The encryption method of the transmission file, applied in mobile terminal device, specifically comprises the following steps:
In step S101, file and file transmission instruction to be transmitted is received, is carried in the file transmission instructionThere is key target user mark;
In embodiments of the present invention, it after the step of receiving file to be transmitted, further includes:Judge described to be transmittedFile whether include preset keyword;If it is judged that the file to be transmitted includes preset keyword, institute is determinedFile to be transmitted is stated to need encrypted file, then performs step S102.
It is understood, however, that keyword can be " contract ", " agreement ", " important " etc., can be required according to userSets itself.
For example, after file to be transmitted is received, judge whether to include in the file content " contract " twoWord, if including " contract ", it is determined that the file to be transmitted is needs encrypted file.At this moment, according to designated userInformation obtains the eyeball information of the designated user as the key that the file to be transmitted is encrypted.
It is understood, however, that if it is judged that " contract " two words are not included in the file content, then without addingIt is close, file is directly transmitted to recipient's mobile terminal.
In step s 102, it is identified according to the key target user, obtains and the file to be transmitted is encryptedKey;
In embodiments of the present invention, according to designated user's information, the eyeball information for obtaining the designated user is used as to instituteState the key that file to be transmitted is encrypted.For example, eyeball information includes but not limited to;Iris information, sclera information etc..
In step s 103, it is encrypted using file to be transmitted described in the key pair;
In embodiments of the present invention, using the eyeball information of designated user, the file to be transmitted is encrypted.
In step S104, transmitted and instructed according to the file, the encrypted file to be transmitted is transmitted to and is connectDebit's mobile terminal.
From the foregoing, it will be observed that the present embodiment is by when transmitting file, adding the file according to specified eyeball informationIt is close, recipient's mobile terminal is then forwarded to after encryption.Therefore, the present invention can ensure that the safety of network transmission file, both facilitateIt is again quick, greatly improve the usage experience of user.
Embodiment two
Referring to Fig. 2, it show the encryption method of transmission file provided in an embodiment of the present invention.
The encryption method of the transmission file, applied in mobile terminal device, specifically comprises the following steps:
In step s 201, file and file transmission instruction to be transmitted is received, is carried in the file transmission instructionThere is key target user mark;
In embodiments of the present invention, it after the step of receiving file to be transmitted, further includes:Judge described to be transmittedFile whether include preset keyword;If it is judged that the file to be transmitted includes preset keyword, institute is determinedFile to be transmitted is stated to need encrypted file, then performs step S202.
It is understood, however, that if it is judged that the file to be transmitted does not have to then not including preset keywordEncryption, is directly transmitted to recipient's mobile terminal by file.
It in step S202, is identified according to the key target user, opens the eyeball acquisition mould of sender mobile terminalBlock;
In embodiments of the present invention, according to designated user's information, the user such as specified is local terminal mobile phone user, then, it opensOpen the eyeball acquisition module of local terminal mobile phone (sender mobile terminal).
In step S203, by the eyeball acquisition module, the eyeball information of sender mobile terminal user is acquired;
In step S204, using the eyeball information of collected sender mobile terminal user, to described to be transmittedFile is encrypted.
In embodiments of the present invention, using the eyeball information of local terminal mobile phone user, the file to be transmitted is addedIt is close.
In step S205, transmitted and instructed according to the file, the encrypted file to be transmitted is transmitted to and is connectDebit's mobile terminal.
It is understood, however, that if the user information specified pre-saves in the terminal, then, according to instituteIt states key target user and identifies (user information specified), the eyeball information that designated user is directly read from mobile terminal is madeFor the key that the file to be transmitted is encrypted, using the eyeball information of the designated user, to the text to be transmittedPart is encrypted.
From the foregoing, it will be observed that the present embodiment is by when transmitting file, opening local terminal eyeball acquisition module, acquiring this mobile terminalThe eyeball information of user;The file is encrypted according to the eyeball information, recipient's mobile terminal is then forwarded to after encryption.Therefore, the present invention can ensure that the safety of network transmission file, has not only facilitated but also quick, has greatly improved the usage experience of user.
Embodiment three
Referring to Fig. 3, it show the encryption method of transmission file provided in an embodiment of the present invention.
The encryption method of the transmission file, applied in mobile terminal device, specifically comprises the following steps:
In step S301, file and file transmission instruction to be transmitted is received, is carried in the file transmission instructionThere is key target user mark;
In embodiments of the present invention, it after the step of receiving file to be transmitted, further includes:Judge described to be transmittedFile whether include preset keyword;If it is judged that the file to be transmitted includes preset keyword, institute is determinedFile to be transmitted is stated to need encrypted file, then performs step S302.
It is understood, however, that if it is judged that the file to be transmitted does not have to then not including preset keywordEncryption, is directly transmitted to recipient's mobile terminal by file.
In step s 302, it is identified according to the key target user, opens the video window of sender mobile terminal;
In embodiments of the present invention, when key target user is recipient mobile terminal user, then pass through senderThe video window of mobile terminal, to acquire the eyeball information of recipient mobile terminal user.
In step S303, the eyeball information of recipient mobile terminal user is acquired by the video window;
In embodiments of the present invention, for example, eyeball information includes but not limited to;Iris information, sclera information etc..
In step s 304, using the eyeball information of collected recipient mobile terminal user, to described to be transmittedFile is encrypted.
In step S305, transmitted and instructed according to the file, the encrypted file to be transmitted is transmitted to and is connectDebit's mobile terminal.
From the foregoing, it will be observed that the present embodiment acquires recipient mobile terminal user by when transmitting file, opening video windowEyeball information as encryption key;The file is encrypted according to the eyeball information, recipient is then forwarded to after encryptionMobile terminal.Therefore, the present invention can ensure that the safety of network transmission file, not only facilitate but also quick, greatly improve user'sUsage experience.
Example IV
Referring to Fig. 4, it show the decryption method of transmission file provided in an embodiment of the present invention.
The decryption method of the transmission file, applied in mobile terminal device, specifically comprises the following steps:
In step S401, encryption file and decryption designated user's mark that sender mobile terminal is sent are received;
In embodiments of the present invention, the encryption file received is encrypted using the encryption method of above-mentioned transmission fileObtained file.
In step S402, according to it is described decryption designated user mark, obtain to it is described encryption file be decrypted it is closeKey;
In step S403, using the key of the decryption, the encryption file is decrypted;
In embodiments of the present invention, using the key of the decryption, after the step of encryption file is decrypted,It further includes:Judge within the preset time, whether the number for decrypting failure is more than preset threshold value;If decrypt the number of failureMore than preset threshold value, then the encryption file is deleted.
In step s 404, successful decryption then opens the file.
In embodiments of the present invention, it after successful decryption, opens the file and is checked for recipient user;It is changed when receivingDuring instruction, the corresponding modification operation of the modification instruction is not performed.
It is understood, however, that if decryption failure, can not open the file.
Further, if decryption failure, can not open the file, and delete the encryption file.
From the foregoing, it will be observed that the present embodiment recipient mobile terminal is according to the eyeball information specified, come to the encryption received textPart is decrypted, only successful decryption, could open file and be checked;If decryption failure, can not open the file,And delete the encryption file.Therefore, the present invention can ensure that the safety of network transmission file, not only facilitate but also quick, greatlyRaising user usage experience.
Embodiment five
Referring to Fig. 5, it show the decryption method of transmission file provided in an embodiment of the present invention.
The decryption method of the transmission file, applied in mobile terminal device, specifically comprises the following steps:
In step S501, encryption file and decryption designated user's mark that sender mobile terminal is sent are received;
In embodiments of the present invention, the encryption file received is encrypted using the encryption method of above-mentioned transmission fileObtained file.
In step S502, according to the decryption designated user mark, the eyeball acquisition mould of recipient's mobile terminal is openedBlock;
In embodiments of the present invention, when the decryption designated user is identified as the user information of recipient's mobile terminal,According to the user information, the eyeball acquisition module of recipient's mobile terminal is opened, acquires the eyeball of recipient mobile terminal userInformation, using the key as decryption.
In step S503, by the eyeball acquisition module, the eyeball information of recipient mobile terminal user is acquired;
In step S504, using the eyeball information of collected recipient mobile terminal user, to the encryption fileIt is decrypted.
In embodiments of the present invention, it after the step of encryption file being decrypted, further includes:Judge presetIn time, whether the number for decrypting failure is more than preset threshold value;If the number of decryption failure is more than preset threshold value, deleteExcept the encryption file.
In step S505, successful decryption then opens the file.
In embodiments of the present invention, it after successful decryption, opens the file and is checked for recipient user;It is changed when receivingDuring instruction, the corresponding modification operation of the modification instruction is not performed.
It is understood, however, that if decryption failure, can not open the file.
Further, if decryption failure, can not open the file, and delete the encryption file.
From the foregoing, it will be observed that the present embodiment recipient mobile terminal is according to the eyeball information specified, come to the encryption received textPart is decrypted, only successful decryption, could open file and be checked;If decryption failure, can not open the file,And delete the encryption file.Therefore, the present invention can ensure that the safety of network transmission file, not only facilitate but also quick, greatlyRaising user usage experience.
Embodiment six
Referring to Fig. 6, it show the decryption method of transmission file provided in an embodiment of the present invention.
The decryption method of the transmission file, applied in mobile terminal device, specifically comprises the following steps:
In step s 601, encryption file and the decryption designated user's mark that sender mobile terminal is sent are received;
In embodiments of the present invention, the encryption file received is encrypted using the encryption method of above-mentioned transmission fileObtained file.
In step S602, the eyeball information that sender mobile terminal is sent is received, and according to decryption designated user's markEyeball information is obtained, wherein, the eyeball information is the eyeball information of sender mobile terminal user;
In embodiments of the present invention, when decryption designated user is identified as the user information of sender mobile terminal, then obtainThe eyeball information of sender mobile terminal user is taken, using the key as decryption.
In step S603, using the eyeball information of the sender mobile terminal user got, to the encryption fileIt is decrypted.
In embodiments of the present invention, it after the step of encryption file being decrypted, further includes:Judge presetIn time, whether the number for decrypting failure is more than preset threshold value;If the number of decryption failure is more than preset threshold value, deleteExcept the encryption file.
In step s 604, successful decryption then opens the file.
In embodiments of the present invention, it after successful decryption, opens the file and is checked for recipient user;It is changed when receivingDuring instruction, the corresponding modification operation of the modification instruction is not performed.
It is understood, however, that if decryption failure, can not open the file.
Further, if decryption failure, can not open the file, and delete the encryption file.
From the foregoing, it will be observed that the present embodiment recipient mobile terminal is according to the eyeball information specified, come to the encryption received textPart is decrypted, only successful decryption, could open file and be checked;If decryption failure, can not open the file,And delete the encryption file.Therefore, the present invention can ensure that the safety of network transmission file, not only facilitate but also quick, greatlyRaising user usage experience.
Embodiment seven
Referring to Fig. 7, the structure diagram of the encryption device of transmission file provided for the embodiment of the present invention seven;In order to justIn explanation, illustrate only and the relevant part of the embodiment of the present invention.The encryption device of the transmission file includes:Receiving module101st, Key Acquisition Module 102, encrypting module 103 and transmission module 104.It is described transmission file encryption device can beIt is built in the unit of software unit in mobile terminal, hardware cell either software and hardware combining.
Receiving module 101 for receiving file and file transmission instruction to be transmitted, is taken in the file transmission instructionIt is identified with key target user;
Key Acquisition Module 102, for according to the key target user identify, obtain to the file to be transmitted intoThe encrypted key of row;
Encrypting module 103, for being encrypted using file to be transmitted described in the key pair;
Transmission module 104 instructs for being transmitted according to the file, the encrypted file to be transmitted is transmitted toRecipient's mobile terminal.
In embodiments of the present invention, the encryption device of the transmission file further includes:Judgment module.
File and file transmission instruction to be transmitted is received in receiving module 101, is taken in the file transmission instructionAfter being identified with key target user, judge whether the file to be transmitted includes preset key by judgment moduleWord;Key Acquisition Module, if judging that the file to be transmitted includes preset key specifically for the judgment moduleWord determines that the file to be transmitted to need encrypted file, performs and obtains what the file to be transmitted was encryptedKey.
Embodiment eight
Referring to Fig. 8, the structure diagram of the encryption device of transmission file provided for the embodiment of the present invention eight;In order to justIn explanation, illustrate only and the relevant part of the embodiment of the present invention.The encryption device of the transmission file includes:Receiving module201st, opening module 202, eyeball acquisition module 203, encrypting module 204 and transmission module 205.The transmission file addsClose device can be the unit of the software unit being built in mobile terminal, hardware cell either software and hardware combining.
Receiving module 201 for receiving file and file transmission instruction to be transmitted, is taken in the file transmission instructionIt is identified with key target user;
Opening module 202 for being identified according to the key target user, opens the eyeball acquisition of sender mobile terminalModule;
Eyeball acquisition module 203, for acquiring the eyeball information of sender mobile terminal user;
Encrypting module 204 specifically for the eyeball information using collected sender mobile terminal user, is treated to describedThe file of transmission is encrypted.
Transmission module 205 instructs for being transmitted according to the file, the encrypted file to be transmitted is transmitted toRecipient's mobile terminal.
Embodiment nine
Referring to Fig. 9, the structure diagram of the encryption device of transmission file provided for the embodiment of the present invention nine;In order to justIn explanation, illustrate only and the relevant part of the embodiment of the present invention.The encryption device of the transmission file includes:Receiving module301st, video window opening module 302, video acquisition module 303, encrypting module 304 and transmission module 305.The transmissionThe encryption device of file can be the list of the software unit being built in mobile terminal, hardware cell either software and hardware combiningMember.
Receiving module 301 for receiving file and file transmission instruction to be transmitted, is taken in the file transmission instructionIt is identified with key target user;
Video window opening module 302 for being identified according to the key target user, opens sender mobile terminalVideo window;
Video acquisition module 303, for acquiring the eyeball information of recipient mobile terminal user by the video window;
Encrypting module 304 specifically for the eyeball information using collected recipient mobile terminal user, is treated to describedThe file of transmission is encrypted.
Transmission module 305 instructs for being transmitted according to the file, the encrypted file to be transmitted is transmitted toRecipient's mobile terminal.
Embodiment ten
Referring to Fig. 10, the structure diagram of the encryption device of transmission file provided for the embodiment of the present invention ten;In order toConvenient for explanation, illustrate only and the relevant part of the embodiment of the present invention.The encryption device of the transmission file includes:Receiving module401st, Key Acquisition Module 402, deciphering module 403 and File Open module 404.The encryption device of the transmission file canBe built in mobile terminal software unit, hardware cell either software and hardware combining unit.
Receiving module 401, for receiving the encryption file of sender mobile terminal transmission and decryption designated user's mark;
Key Acquisition Module 402, for according to the decryption designated user mark, obtaining and being solved to the encryption fileClose key;
Deciphering module 403, for using the key of the decryption, the encryption file to be decrypted;
File Open module 404 for successful decryption, then opens the file.
In embodiments of the present invention, the decryption device of the transmission file further includes:Number judgment module.
I.e. when deciphering module 403 is decrypted using encryption file described in the key pair of the decryption;Number judgment module,For judging within the preset time, whether the number for decrypting failure is more than preset threshold value;File removing module, for describedNumber judgment module judges that the number of decryption failure is more than preset threshold value, then deletes the encryption file.
In embodiments of the present invention, the decryption device of the transmission file further includes:Control module;
File Open module after successful decryption, is opened the file and is checked for recipient user;
Control module, for when receiving modification instruction, control not to perform the corresponding modification operation of the modification instruction.
Embodiment 11
1 is please referred to Fig.1, the structure diagram of the encryption device of transmission file provided for the embodiment of the present invention 11;ForConvenient for explanation, illustrate only and the relevant part of the embodiment of the present invention.The encryption device of the transmission file includes:Receive mouldBlock 501, opening module 502, eyeball acquisition module 503, deciphering module 504 and File Open module 505.The transmission textThe encryption device of part can be the unit of the software unit being built in mobile terminal, hardware cell either software and hardware combining.
Receiving module 501, for receiving the encryption file of sender mobile terminal transmission and decryption designated user's mark;
Opening module 502, for according to the decryption designated user mark, opening the eyeball acquisition of recipient's mobile terminalModule;
Eyeball acquisition module 503, for acquiring the eyeball information of recipient mobile terminal user;
Deciphering module 504 specifically for the eyeball information using collected recipient mobile terminal user, adds to describedCiphertext part is decrypted.
File Open module 505 for successful decryption, then opens the file.
In embodiments of the present invention, the decryption device of the transmission file further includes:Number judgment module.
I.e. when deciphering module is decrypted using encryption file described in the key pair of the decryption;Number judgment module is usedIn judging within the preset time, whether the number for decrypting failure is more than preset threshold value;File removing module, for described timeNumber judgment module judges that the number of decryption failure is more than preset threshold value, then deletes the encryption file.
In embodiments of the present invention, the decryption device of the transmission file further includes:Control module;
File Open module after successful decryption, is opened the file and is checked for recipient user;
Control module, for when receiving modification instruction, control not to perform the corresponding modification operation of the modification instruction.
Embodiment 12
2 are please referred to Fig.1, the structure diagram of the encryption device of transmission file provided for the embodiment of the present invention 12;ForConvenient for explanation, illustrate only and the relevant part of the embodiment of the present invention.The encryption device of the transmission file includes:Receive mouldBlock 601, Key Acquisition Module 602, deciphering module 603 and File Open module 604.The encryption device of the transmission fileIt can be the unit of the software unit being built in mobile terminal, hardware cell either software and hardware combining.
Receiving module 601, for receiving the encryption file of sender mobile terminal transmission and decryption designated user's mark;
Key Acquisition Module 602, specifically for according to the decryption designated user mark, receiving and obtaining sender's movementThe eyeball information that terminal is sent, wherein, the eyeball information is the eyeball information of sender mobile terminal user;
Deciphering module 603, specifically for using the eyeball information of sender mobile terminal user got, adding to describedCiphertext part is decrypted.
File Open module 604 for successful decryption, then opens the file.
In embodiments of the present invention, the decryption device of the transmission file further includes:Number judgment module.
I.e. when deciphering module is decrypted using encryption file described in the key pair of the decryption;Number judgment module is usedIn judging within the preset time, whether the number for decrypting failure is more than preset threshold value;File removing module, for described timeNumber judgment module judges that the number of decryption failure is more than preset threshold value, then deletes the encryption file.
In embodiments of the present invention, the decryption device of the transmission file further includes:Control module;
File Open module after successful decryption, is opened the file and is checked for recipient user;
Control module, for when receiving modification instruction, control not to perform the corresponding modification operation of the modification instruction.
The encryption and decryption approaches and encryption and decryption devices of the transmission file of the present invention, by when transmitting file, rootThe file is encrypted according to specified eyeball information, recipient's mobile terminal is then forwarded to after encryption, recipient moves eventuallyEnd obtains the eyeball information specified, the encryption file received to be decrypted, only successful decryption, could open file intoRow is checked.Therefore, the present invention can ensure that the safety of network transmission file, has not only facilitated but also quick, has greatly improved making for userWith experience.
The encryption and decryption approaches and encryption and decryption devices of transmission file provided in an embodiment of the present invention belong to same structureThink, specific implementation process refers to specification full text, and details are not described herein again.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is canIt is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storageMedium can include:Read-only memory (ROM, Read Only Memory), random access memory (RAM, RandomAccess Memory), disk or CD etc..
In conclusion although the present invention is disclosed above with preferred embodiment, above preferred embodiment is not to limitThe system present invention, those of ordinary skill in the art without departing from the spirit and scope of the present invention, can make various changes and profitDecorations, therefore protection scope of the present invention is subject to the range that claim defines.