CN104850801A - File encryption method and file encryption device - Google Patents
File encryption method and file encryption device Download PDFInfo
- Publication number
- CN104850801A CN104850801A CN201510313639.XA CN201510313639A CN104850801A CN 104850801 A CN104850801 A CN 104850801A CN 201510313639 A CN201510313639 A CN 201510313639A CN 104850801 A CN104850801 A CN 104850801A
- Authority
- CN
- China
- Prior art keywords
- encryption
- file
- instruction
- receiving
- key input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000001514 detection method Methods 0.000 claims description 24
- 238000003860 storage Methods 0.000 claims description 6
- 230000008569 process Effects 0.000 description 7
- 230000006870 function Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 230000008859 change Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000012163 sequencing technique Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
- Document Processing Apparatus (AREA)
Abstract
The invention is applicable to the field of information security, and provides a file encryption method and a file encryption device. The file encryption method comprises the steps of detecting whether a file encryption instruction is received or not; displaying secret key input dialog boxes when the file encryption instruction is received, wherein the number of the secrete key input dialog boxes is at least two; receiving a selection instruction of the secrete key input dialog boxes; and encrypting a selected file according to a secrete key received by the secrete key input dialog box. A file protection ability can be improved according to the embodiment of the invention.
Description
Technical field
The embodiment of the present invention belongs to information security field, particularly relates to a kind of file encrypting method and device.
Background technology
At present, life and the various terminal of people are closely bound up, and such as, user pays various expense by the terminal of interconnection network, record the dribs and drabs of life, stores various files etc.But the various information of user just may be revealed once terminal loss.
In order to the information protecting user to be stored in terminal; existing method is generally: be encrypted the file at the information place of user; such as; the various ways such as key, portrait of employing fingerprint, palmmprint, input is encrypted file; but because these cipher modes are all more single; therefore be probably cracked, thus still make the information of user there is larger disclosure risk.
Summary of the invention
Embodiments provide a kind of file encrypting method and device, the cipher mode being intended to solve the employing of existing method is too single, thus still makes the information of user there is the problem of larger disclosure risk.
The embodiment of the present invention is achieved in that a kind of file encrypting method, and described method comprises:
Detect and whether receive file encryption instruction;
When receiving file encryption instruction, display key input dialogue frame, described key input dialogue frame has 2 at least;
Receive the selection instruction of key input dialogue frame;
According to the file of the secret key encryption selection that key input dialogue frame receives.
Another object of the embodiment of the present invention is to provide a kind of document encrypting apparatus, and described device comprises:
File encryption instruction detection unit, for detecting whether receive file encryption instruction;
Key input dialogue frame display unit, for when receiving file encryption instruction, display key input dialogue frame, described key input dialogue frame has 2 at least;
Dialog box selection instruction receiving element, for receiving the selection instruction of key input dialogue frame;
File encryption unit, the file that the secret key encryption for receiving according to key input dialogue frame is selected.
In embodiments of the present invention, because described key input dialogue frame has 2 at least, therefore, the file at least 2 different secret key encryption files or briefcase can be adopted, thus reduce the risk of the information revealing user, improve the security of file.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of a kind of file encrypting method that first embodiment of the invention provides;
Fig. 2 is the structural drawing of the schematic diagram of display 2 key input dialogue frames that first embodiment of the invention provides;
Fig. 3 is the schematic diagram that display that first embodiment of the invention provides can adopt the All Files of the secret key encryption of first key input dialogue frame input;
Fig. 4 is the structural drawing of a kind of document encrypting apparatus that second embodiment of the invention provides.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
In the embodiment of the present invention, detect whether receive file encryption instruction, when receiving file encryption instruction, display key input dialogue frame, receives the selection instruction of key input dialogue frame, according to the file of the secret key encryption selection that key input dialogue frame receives.
In order to technical solutions according to the invention are described, be described below by specific embodiment.
embodiment one:
Fig. 1 shows the process flow diagram of a kind of file encrypting method that first embodiment of the invention provides, and details are as follows:
Step S11, detects whether receive file encryption instruction.
In this step, file encryption instruction sends by mouse or keyboard etc., or is sent by the touch-screen that user clicks terminal, or sends file encryption instruction by voice, is not construed as limiting herein.
Alternatively, whether described detection receives file encryption instruction, specifically comprises:
Whether A1, detection receive length by instruction.
A2, receive long by instruction time, display encryption editing options.
Whether A3, detection receive the selection instruction of encrypting editing options, when receiving the selection instruction of encryption editing options, judging to receive file encryption instruction, when not receiving the selection instruction of encryption editing options, judging not receive file encryption instruction.
In above-mentioned A1 ~ A3, whether terminal detects file or briefcase etc. and receives long by instruction, if receive long by instruction, then show encryption editing options, when user clicks encryption editing options, when sending the selection instruction of encryption editing options, terminal judges to receive file encryption instruction.Certainly, except display encryption editing options, the editing options deleted and wait other can also be shown, be not construed as limiting herein.
Alternatively, except pressing instruction triggers file encryption function by long, can also trigger by other means, now, whether described detection receives file encryption instruction, specifically comprises:
Whether B1, detection receive right click instruction.
B2, when receiving right click instruction, display encryption editing options.
Whether B3, detection receive the selection instruction of encrypting editing options, when receiving the selection instruction of encryption editing options, judging to receive file encryption instruction, when not receiving the selection instruction of encryption editing options, judging not receive file encryption instruction.
In above-mentioned B1 ~ B3, terminal detects file or briefcase etc. and whether receives right click instruction, if receive right click instruction, then show encryption editing options, when user clicks encryption editing options, when sending the selection instruction of encryption editing options, terminal judges to receive file encryption instruction.Certainly, except display encryption editing options, the editing options deleted and wait other can also be shown, be not construed as limiting herein.
Step S12, when receiving file encryption instruction, display key input dialogue frame, described key input dialogue frame has 2 at least.
Fig. 2 is terminal when receiving file encryption instruction, shows the schematic diagram of 2 key input dialogue frames.Certainly, in a practical situation, also can show 3 or 4 key input dialogue frames, be not construed as limiting herein.
Step S13, receives the selection instruction of key input dialogue frame.
Because the key input dialogue frame of display has 2 at least, therefore, terminal determines according to the selection instruction of the key input dialogue frame received the key input dialogue frame that user selects.After user have selected certain key input dialogue frame, this key input dialogue frame presents selected state, such as, the color burn of the frame of key input dialogue frame, or key input dialogue frame presents suspended state etc., to make the key input dialogue frame chosen and not have selected key input dialogue frame distinct, be convenient to user's identification.
Step S14, according to the file of the secret key encryption selection that key input dialogue frame receives.
In this step, after user have selected certain key input dialogue frame, in this key input dialogue frame, input the key of a string character as encrypt file, this character such as numeral and/or letter and/or symbol etc.After terminal receives key, resolve this key, and according to the file that analysis result encrypting user is selected.Wherein, the file that user selects can be one, also can be multiple.
Alternatively, the file that the described secret key encryption received according to key input dialogue frame is selected, specifically comprises:
C1, dir, described listed files comprises the file of the secret key encryption that the key input dialogue frame of selection can be adopted to input.
C2, reception file selection instruction, and according to the file that the secret key encryption that key input dialogue frame receives is selected.
In above-mentioned C1 ~ C2, when user have selected certain key input dialogue frame, the file in display file folder or briefcase, the file of display shows with the form of listed files.Certainly, in a practical situation, also can after user inputs key dir again, be not construed as limiting herein.As shown in Figure 3, after user have selected first key input dialogue frame (key 1 dialog box), terminal demonstration can adopt the All Files (supposing to only have 6 files) of the secret key encryption of this first key input dialogue frame input.The file needing encryption is selected for the ease of user, then at each file side correspondence display selectable symbol of display, when user clicks this selectable symbol (being equivalent to the file selecting this symbol corresponding), this selectable symbol will change color, or fill new color, to distinguish not by the symbol selected.Certainly, also at each file side correspondence display selectable symbol of display, now, after user clicks certain file, can not no longer show this certain file, selected to identify this file.
Alternatively, described dir, specifically comprises:
D1, search the file of storage.
D2, shown with the form of listed files by the file searched, described listed files arranges according to the file arrangements mode preset.
In above-mentioned D1 ~ D2, terminal searches the file that stores in the file or briefcase that user selects, and the file searched is shown according to the file arrangements mode preset, such as, show according to file name, or show etc. according to the sequencing of the Time Created of file.If it is pointed out that, user has adopted some file in key 1 pair of file to be encrypted, then, when user clicks the dialog box of key 2, terminal no longer shows the file having adopted key 1 to encrypt.Alternatively, if user needs the file encryption adopting the different same contents of double secret key, then by changing the title of file, or the type changing file realizes, such as, the file (content identical) different to title adopts different secret key encryptions, or the file (content identical) different to file type adopts different secret key encryptions.
In the first embodiment of the invention, detect and whether receive file encryption instruction, when receiving file encryption instruction, display key input dialogue frame, receive the selection instruction of key input dialogue frame, according to the file of the secret key encryption selection that key input dialogue frame receives.Because described key input dialogue frame has 2 at least, therefore, the file at least 2 different secret key encryption files or briefcase can be adopted, thus reduce the risk of the information revealing user, improve the security of file.Such as, after a key in file or briefcase is broken, also has the file of another this another secret key encryption of cryptographic key protection.In addition, due to after a key is broken, display is adopted the file of this secret key encryption, therefore, the file of display can confuse assailant, thus effectively promotes the protective capability of file.
Should be understood that in embodiments of the present invention, the size of the sequence number of above-mentioned each process does not also mean that the priority of execution sequence, and the execution sequence of each process should be determined with its function and internal logic, and should not form any restriction to the implementation process of the embodiment of the present invention.
embodiment two:
Fig. 4 shows the structural drawing of a kind of document encrypting apparatus that second embodiment of the invention provides, this document encrypting apparatus can be applicable in terminal, this terminal can comprise carries out through wireless access network RAN and one or more core net the subscriber equipment that communicates, this subscriber equipment can be mobile phone (or being called " honeycomb " phone), have the computing machine etc. of mobile device, such as, subscriber equipment can also be portable, pocket, hand-held, built-in computer or vehicle-mounted mobile device, they and wireless access network switched voice and/or data.Again such as, this mobile device can comprise smart mobile phone, panel computer, personal digital assistant PDA, point-of-sale terminal POS or vehicle-mounted computer etc.For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.
This document encrypting apparatus comprises: file encryption instruction detection unit 41, key input dialogue frame display unit 42, dialog box selection instruction receiving element 43, file encryption unit 44.Wherein:
File encryption instruction detection unit 41, for detecting whether receive file encryption instruction.
Wherein, file encryption instruction sends by mouse or keyboard etc., or is sent by the touch-screen that user clicks terminal, or sends file encryption instruction by voice, is not construed as limiting herein.
Alternatively, described file encryption instruction detection unit 41 comprises:
Long by command detection module, whether receive length by instruction for detecting.
First encryption editing options display module, for when receiving length by instruction, display encryption editing options.
The selection instruction detection module of the first encryption editing options, for detecting the selection instruction whether receiving encryption editing options, when receiving the selection instruction of encryption editing options, judge to receive file encryption instruction, when not receiving the selection instruction of encryption editing options, judge not receive file encryption instruction.
Particularly, detect file or briefcase etc. and whether receive long by instruction, if receive long by instruction, then show encryption editing options, when user clicks encryption editing options, when sending the selection instruction of encryption editing options, terminal judges to receive file encryption instruction.Certainly, except display encryption editing options, the editing options deleted and wait other can also be shown, be not construed as limiting herein.
Alternatively, described file encryption instruction detection unit 41 comprises:
Right click command detection module, for detecting whether receive right click instruction.
Second encryption editing options display module, for when receiving right click instruction, display encryption editing options.
The selection instruction detection module of the second encryption editing options, for detecting the selection instruction whether receiving encryption editing options, when receiving the selection instruction of encryption editing options, judge to receive file encryption instruction, when not receiving the selection instruction of encryption editing options, judge not receive file encryption instruction.
Particularly, detect file or briefcase etc. and whether receive right click instruction, if receive right click instruction, then show encryption editing options, when user clicks encryption editing options, when sending the selection instruction of encryption editing options, terminal judges to receive file encryption instruction.Certainly, except display encryption editing options, the editing options deleted and wait other can also be shown, be not construed as limiting herein.
Key input dialogue frame display unit 42, for when receiving file encryption instruction, display key input dialogue frame, described key input dialogue frame has 2 at least.
Dialog box selection instruction receiving element 43, for receiving the selection instruction of key input dialogue frame.
Particularly, after user have selected certain key input dialogue frame, this key input dialogue frame presents selected state, such as, the color burn of the frame of key input dialogue frame, or key input dialogue frame presents suspended state etc., to make the key input dialogue frame chosen and not have selected key input dialogue frame distinct, be convenient to user's identification.
File encryption unit 44, the file that the secret key encryption for receiving according to key input dialogue frame is selected.
Particularly, after user have selected certain key input dialogue frame, in this key input dialogue frame, input the key of a string character as encrypt file, this character such as numeral and/or letter and/or symbol etc.
Alternatively, described file encryption unit 44 comprises:
File display module, for dir, described listed files comprises the file of the secret key encryption that the key input dialogue frame of selection can be adopted to input.
File selection module, for receiving file selection instruction, and according to the file that the secret key encryption that key input dialogue frame receives is selected.
Particularly, when user have selected certain key input dialogue frame, the file in display file folder or briefcase, the file of display shows with the form of listed files.Certainly, in a practical situation, also can after user inputs key dir again, be not construed as limiting herein.The file needing encryption is selected for the ease of user, then at each file side correspondence display selectable symbol of display, when user clicks this selectable symbol (being equivalent to the file selecting this symbol corresponding), this selectable symbol will change color, or fill new color, to distinguish not by the symbol selected.Certainly, also at each file side correspondence display selectable symbol of display, now, after user clicks certain file, can not no longer show this certain file, selected to identify this file.
Alternatively, described file display module comprises:
Ff module, for searching the file of storage.
File arrangements module, shows with the form of listed files for the file that will search, and described listed files arranges according to the file arrangements mode preset.
Search the file that stores in the file or briefcase that user selects, and the file searched is shown according to the file arrangements mode preset, such as, show according to file name, or show etc. according to the sequencing of the Time Created of file.If it is pointed out that, user has adopted some file in key 1 pair of file to be encrypted, then, when user clicks the dialog box of key 2, terminal no longer shows the file having adopted key 1 to encrypt.
Those of ordinary skill in the art can recognize, in conjunction with unit and the algorithm steps of each example of embodiment disclosed herein description, can realize with the combination of electronic hardware or computer software and electronic hardware.These functions perform with hardware or software mode actually, depend on application-specific and the design constraint of technical scheme.Professional and technical personnel can use distinct methods to realize described function to each specifically should being used for, but this realization should not thought and exceeds scope of the present invention.
Those skilled in the art can be well understood to, and for convenience and simplicity of description, the specific works process of the system of foregoing description, device and unit, with reference to the corresponding process in preceding method embodiment, can not repeat them here.
In several embodiments that the application provides, should be understood that disclosed system, apparatus and method can realize by another way.Such as, device embodiment described above is only schematic, such as, the division of described unit, be only a kind of logic function to divide, actual can have other dividing mode when realizing, such as multiple unit or assembly can in conjunction with or another system can be integrated into, or some features can be ignored, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of device or unit or communication connection can be electrical, machinery or other form.
The described unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, also can be that the independent physics of unit exists, also can two or more unit in a unit integrated.
If described function using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computer read/write memory medium.Based on such understanding, the part of the part that technical scheme of the present invention contributes to prior art in essence in other words or this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) perform all or part of step of method described in each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, portable hard drive, ROM (read-only memory) (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. various can be program code stored medium.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should described be as the criterion with the protection domain of claim.
Claims (10)
1. a file encrypting method, is characterized in that, described method comprises:
Detect and whether receive file encryption instruction;
When receiving file encryption instruction, display key input dialogue frame, described key input dialogue frame has 2 at least;
Receive the selection instruction of key input dialogue frame;
According to the file of the secret key encryption selection that key input dialogue frame receives.
2. method according to claim 1, is characterized in that, the file that the described secret key encryption received according to key input dialogue frame is selected, and specifically comprises:
Dir, described listed files comprises the file of the secret key encryption that the key input dialogue frame of selection can be adopted to input;
Receive file selection instruction, and according to the file that the secret key encryption that key input dialogue frame receives is selected.
3. method according to claim 2, is characterized in that, described dir, specifically comprises:
Search the file of storage;
Shown with the form of listed files by the file searched, described listed files arranges according to the file arrangements mode preset.
4. method according to claim 1, is characterized in that, whether described detection receives file encryption instruction, specifically comprises:
Detect and whether receive length by instruction;
When receiving length by instruction, display encryption editing options;
Detecting the selection instruction whether receiving encryption editing options, when receiving the selection instruction of encryption editing options, judging to receive file encryption instruction, when not receiving the selection instruction of encryption editing options, judging not receive file encryption instruction.
5. method according to claim 1, is characterized in that, whether described detection receives file encryption instruction, specifically comprises:
Detect and whether receive right click instruction;
When receiving right click instruction, display encryption editing options;
Detecting the selection instruction whether receiving encryption editing options, when receiving the selection instruction of encryption editing options, judging to receive file encryption instruction, when not receiving the selection instruction of encryption editing options, judging not receive file encryption instruction.
6. a document encrypting apparatus, is characterized in that, described device comprises:
File encryption instruction detection unit, for detecting whether receive file encryption instruction;
Key input dialogue frame display unit, for when receiving file encryption instruction, display key input dialogue frame, described key input dialogue frame has 2 at least;
Dialog box selection instruction receiving element, for receiving the selection instruction of key input dialogue frame;
File encryption unit, the file that the secret key encryption for receiving according to key input dialogue frame is selected.
7. device according to claim 6, is characterized in that, described file encryption unit comprises:
File display module, for dir, described listed files comprises the file of the secret key encryption that the key input dialogue frame of selection can be adopted to input;
File selection module, for receiving file selection instruction, and according to the file that the secret key encryption that key input dialogue frame receives is selected.
8. device according to claim 7, is characterized in that, described file display module comprises:
Ff module, for searching the file of storage;
File arrangements module, shows with the form of listed files for the file that will search, and described listed files arranges according to the file arrangements mode preset.
9. device according to claim 6, is characterized in that, described file encryption instruction detection unit comprises:
Long by command detection module, whether receive length by instruction for detecting;
First encryption editing options display module, for when receiving length by instruction, display encryption editing options;
The selection instruction detection module of the first encryption editing options, for detecting the selection instruction whether receiving encryption editing options, when receiving the selection instruction of encryption editing options, judge to receive file encryption instruction, when not receiving the selection instruction of encryption editing options, judge not receive file encryption instruction.
10. device according to claim 6, is characterized in that, described file encryption instruction detection unit comprises:
Right click command detection module, for detecting whether receive right click instruction;
Second encryption editing options display module, for when receiving right click instruction, display encryption editing options;
The selection instruction detection module of the second encryption editing options, for detecting the selection instruction whether receiving encryption editing options, when receiving the selection instruction of encryption editing options, judge to receive file encryption instruction, when not receiving the selection instruction of encryption editing options, judge not receive file encryption instruction.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510313639.XA CN104850801B (en) | 2015-06-09 | 2015-06-09 | File encrypting method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510313639.XA CN104850801B (en) | 2015-06-09 | 2015-06-09 | File encrypting method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104850801A true CN104850801A (en) | 2015-08-19 |
CN104850801B CN104850801B (en) | 2018-03-13 |
Family
ID=53850438
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510313639.XA Expired - Fee Related CN104850801B (en) | 2015-06-09 | 2015-06-09 | File encrypting method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104850801B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105184176A (en) * | 2015-08-27 | 2015-12-23 | 安一恒通(北京)科技有限公司 | File processing method and apparatus for electronic device |
CN106067875A (en) * | 2016-05-24 | 2016-11-02 | 珠海市魅族科技有限公司 | Intelligent terminal's encryption method and system |
CN106203176A (en) * | 2016-07-29 | 2016-12-07 | 乐视控股(北京)有限公司 | A kind of application encryption method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080022131A1 (en) * | 2005-02-25 | 2008-01-24 | Sony Corporation | Information processing apparatus, information recording medium manufacturing method, and computer program |
CN101166088A (en) * | 2007-09-27 | 2008-04-23 | 航天信息股份有限公司 | Encryption and decryption method based on user identity identifier |
CN101364984B (en) * | 2008-08-13 | 2011-10-05 | 西安鼎蓝通信技术有限公司 | Method for guarantee safety of electronic file |
-
2015
- 2015-06-09 CN CN201510313639.XA patent/CN104850801B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080022131A1 (en) * | 2005-02-25 | 2008-01-24 | Sony Corporation | Information processing apparatus, information recording medium manufacturing method, and computer program |
CN101166088A (en) * | 2007-09-27 | 2008-04-23 | 航天信息股份有限公司 | Encryption and decryption method based on user identity identifier |
CN101364984B (en) * | 2008-08-13 | 2011-10-05 | 西安鼎蓝通信技术有限公司 | Method for guarantee safety of electronic file |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105184176A (en) * | 2015-08-27 | 2015-12-23 | 安一恒通(北京)科技有限公司 | File processing method and apparatus for electronic device |
WO2017031903A1 (en) * | 2015-08-27 | 2017-03-02 | 安一恒通(北京)科技有限公司 | File processing method and apparatus for electronic device |
CN106067875A (en) * | 2016-05-24 | 2016-11-02 | 珠海市魅族科技有限公司 | Intelligent terminal's encryption method and system |
CN106067875B (en) * | 2016-05-24 | 2020-04-17 | 珠海市魅族科技有限公司 | Intelligent terminal encryption method and system |
CN106203176A (en) * | 2016-07-29 | 2016-12-07 | 乐视控股(北京)有限公司 | A kind of application encryption method and device |
Also Published As
Publication number | Publication date |
---|---|
CN104850801B (en) | 2018-03-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101436175B (en) | System and method for controlling comments in a collaborative document | |
CN103780622B (en) | A kind of data classification encryption method of facing cloud storage | |
CN100464313C (en) | Mobile memory device and method for accessing encrypted data in mobile memory device | |
CN104834449A (en) | Mobile terminal icon managing method and device | |
CN105574418A (en) | Data encryption method and apparatus | |
CN103778380A (en) | Data desensitization method and device and data anti-desensitization method and device | |
CN104731468A (en) | Application icon sorting method and device | |
CN101499027A (en) | Intelligent memory system based on independent kernel and distributed architecture | |
CN105827582A (en) | Communication encryption method, device and system | |
CN105808583A (en) | File type identification method and device | |
CN103399865A (en) | Method and device for multi-media file generation | |
CN105898054A (en) | Verification-based message display method and communication terminal | |
CN103019608A (en) | Unlocking method of touch screen terminal and touch screen terminal | |
CN104850801A (en) | File encryption method and file encryption device | |
CN102118503B (en) | Data protection method, device and terminal | |
CN104915588A (en) | Privacy protection method and device for electronic equipment | |
CN106484691A (en) | The date storage method of mobile terminal and device | |
CN104636059B (en) | The searching method and its system of account project | |
CN103324587A (en) | Nandflash equipment encryption and decryption implementation method and system | |
CN106951790A (en) | USB storage medium transparent encryption methods | |
CN107609422B (en) | A kind of file management method and mobile terminal | |
CN103838990A (en) | Data processing method and browser | |
CN114625756A (en) | Data query method and device and server | |
CN105138236A (en) | Electronic reading device and book shelf interface electronic book concealment control method | |
CN105989105B (en) | A kind of management method and device for collecting data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523841 usha Beach Road No. 18 Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CP03 | Change of name, title or address | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180313 |