CN104850801A - File encryption method and file encryption device - Google Patents

File encryption method and file encryption device Download PDF

Info

Publication number
CN104850801A
CN104850801A CN201510313639.XA CN201510313639A CN104850801A CN 104850801 A CN104850801 A CN 104850801A CN 201510313639 A CN201510313639 A CN 201510313639A CN 104850801 A CN104850801 A CN 104850801A
Authority
CN
China
Prior art keywords
encryption
file
instruction
receiving
key input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510313639.XA
Other languages
Chinese (zh)
Other versions
CN104850801B (en
Inventor
巫国平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510313639.XA priority Critical patent/CN104850801B/en
Publication of CN104850801A publication Critical patent/CN104850801A/en
Application granted granted Critical
Publication of CN104850801B publication Critical patent/CN104850801B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention is applicable to the field of information security, and provides a file encryption method and a file encryption device. The file encryption method comprises the steps of detecting whether a file encryption instruction is received or not; displaying secret key input dialog boxes when the file encryption instruction is received, wherein the number of the secrete key input dialog boxes is at least two; receiving a selection instruction of the secrete key input dialog boxes; and encrypting a selected file according to a secrete key received by the secrete key input dialog box. A file protection ability can be improved according to the embodiment of the invention.

Description

File encrypting method and device
Technical field
The embodiment of the present invention belongs to information security field, particularly relates to a kind of file encrypting method and device.
Background technology
At present, life and the various terminal of people are closely bound up, and such as, user pays various expense by the terminal of interconnection network, record the dribs and drabs of life, stores various files etc.But the various information of user just may be revealed once terminal loss.
In order to the information protecting user to be stored in terminal; existing method is generally: be encrypted the file at the information place of user; such as; the various ways such as key, portrait of employing fingerprint, palmmprint, input is encrypted file; but because these cipher modes are all more single; therefore be probably cracked, thus still make the information of user there is larger disclosure risk.
Summary of the invention
Embodiments provide a kind of file encrypting method and device, the cipher mode being intended to solve the employing of existing method is too single, thus still makes the information of user there is the problem of larger disclosure risk.
The embodiment of the present invention is achieved in that a kind of file encrypting method, and described method comprises:
Detect and whether receive file encryption instruction;
When receiving file encryption instruction, display key input dialogue frame, described key input dialogue frame has 2 at least;
Receive the selection instruction of key input dialogue frame;
According to the file of the secret key encryption selection that key input dialogue frame receives.
Another object of the embodiment of the present invention is to provide a kind of document encrypting apparatus, and described device comprises:
File encryption instruction detection unit, for detecting whether receive file encryption instruction;
Key input dialogue frame display unit, for when receiving file encryption instruction, display key input dialogue frame, described key input dialogue frame has 2 at least;
Dialog box selection instruction receiving element, for receiving the selection instruction of key input dialogue frame;
File encryption unit, the file that the secret key encryption for receiving according to key input dialogue frame is selected.
In embodiments of the present invention, because described key input dialogue frame has 2 at least, therefore, the file at least 2 different secret key encryption files or briefcase can be adopted, thus reduce the risk of the information revealing user, improve the security of file.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of a kind of file encrypting method that first embodiment of the invention provides;
Fig. 2 is the structural drawing of the schematic diagram of display 2 key input dialogue frames that first embodiment of the invention provides;
Fig. 3 is the schematic diagram that display that first embodiment of the invention provides can adopt the All Files of the secret key encryption of first key input dialogue frame input;
Fig. 4 is the structural drawing of a kind of document encrypting apparatus that second embodiment of the invention provides.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
In the embodiment of the present invention, detect whether receive file encryption instruction, when receiving file encryption instruction, display key input dialogue frame, receives the selection instruction of key input dialogue frame, according to the file of the secret key encryption selection that key input dialogue frame receives.
In order to technical solutions according to the invention are described, be described below by specific embodiment.
embodiment one:
Fig. 1 shows the process flow diagram of a kind of file encrypting method that first embodiment of the invention provides, and details are as follows:
Step S11, detects whether receive file encryption instruction.
In this step, file encryption instruction sends by mouse or keyboard etc., or is sent by the touch-screen that user clicks terminal, or sends file encryption instruction by voice, is not construed as limiting herein.
Alternatively, whether described detection receives file encryption instruction, specifically comprises:
Whether A1, detection receive length by instruction.
A2, receive long by instruction time, display encryption editing options.
Whether A3, detection receive the selection instruction of encrypting editing options, when receiving the selection instruction of encryption editing options, judging to receive file encryption instruction, when not receiving the selection instruction of encryption editing options, judging not receive file encryption instruction.
In above-mentioned A1 ~ A3, whether terminal detects file or briefcase etc. and receives long by instruction, if receive long by instruction, then show encryption editing options, when user clicks encryption editing options, when sending the selection instruction of encryption editing options, terminal judges to receive file encryption instruction.Certainly, except display encryption editing options, the editing options deleted and wait other can also be shown, be not construed as limiting herein.
Alternatively, except pressing instruction triggers file encryption function by long, can also trigger by other means, now, whether described detection receives file encryption instruction, specifically comprises:
Whether B1, detection receive right click instruction.
B2, when receiving right click instruction, display encryption editing options.
Whether B3, detection receive the selection instruction of encrypting editing options, when receiving the selection instruction of encryption editing options, judging to receive file encryption instruction, when not receiving the selection instruction of encryption editing options, judging not receive file encryption instruction.
In above-mentioned B1 ~ B3, terminal detects file or briefcase etc. and whether receives right click instruction, if receive right click instruction, then show encryption editing options, when user clicks encryption editing options, when sending the selection instruction of encryption editing options, terminal judges to receive file encryption instruction.Certainly, except display encryption editing options, the editing options deleted and wait other can also be shown, be not construed as limiting herein.
Step S12, when receiving file encryption instruction, display key input dialogue frame, described key input dialogue frame has 2 at least.
Fig. 2 is terminal when receiving file encryption instruction, shows the schematic diagram of 2 key input dialogue frames.Certainly, in a practical situation, also can show 3 or 4 key input dialogue frames, be not construed as limiting herein.
Step S13, receives the selection instruction of key input dialogue frame.
Because the key input dialogue frame of display has 2 at least, therefore, terminal determines according to the selection instruction of the key input dialogue frame received the key input dialogue frame that user selects.After user have selected certain key input dialogue frame, this key input dialogue frame presents selected state, such as, the color burn of the frame of key input dialogue frame, or key input dialogue frame presents suspended state etc., to make the key input dialogue frame chosen and not have selected key input dialogue frame distinct, be convenient to user's identification.
Step S14, according to the file of the secret key encryption selection that key input dialogue frame receives.
In this step, after user have selected certain key input dialogue frame, in this key input dialogue frame, input the key of a string character as encrypt file, this character such as numeral and/or letter and/or symbol etc.After terminal receives key, resolve this key, and according to the file that analysis result encrypting user is selected.Wherein, the file that user selects can be one, also can be multiple.
Alternatively, the file that the described secret key encryption received according to key input dialogue frame is selected, specifically comprises:
C1, dir, described listed files comprises the file of the secret key encryption that the key input dialogue frame of selection can be adopted to input.
C2, reception file selection instruction, and according to the file that the secret key encryption that key input dialogue frame receives is selected.
In above-mentioned C1 ~ C2, when user have selected certain key input dialogue frame, the file in display file folder or briefcase, the file of display shows with the form of listed files.Certainly, in a practical situation, also can after user inputs key dir again, be not construed as limiting herein.As shown in Figure 3, after user have selected first key input dialogue frame (key 1 dialog box), terminal demonstration can adopt the All Files (supposing to only have 6 files) of the secret key encryption of this first key input dialogue frame input.The file needing encryption is selected for the ease of user, then at each file side correspondence display selectable symbol of display, when user clicks this selectable symbol (being equivalent to the file selecting this symbol corresponding), this selectable symbol will change color, or fill new color, to distinguish not by the symbol selected.Certainly, also at each file side correspondence display selectable symbol of display, now, after user clicks certain file, can not no longer show this certain file, selected to identify this file.
Alternatively, described dir, specifically comprises:
D1, search the file of storage.
D2, shown with the form of listed files by the file searched, described listed files arranges according to the file arrangements mode preset.
In above-mentioned D1 ~ D2, terminal searches the file that stores in the file or briefcase that user selects, and the file searched is shown according to the file arrangements mode preset, such as, show according to file name, or show etc. according to the sequencing of the Time Created of file.If it is pointed out that, user has adopted some file in key 1 pair of file to be encrypted, then, when user clicks the dialog box of key 2, terminal no longer shows the file having adopted key 1 to encrypt.Alternatively, if user needs the file encryption adopting the different same contents of double secret key, then by changing the title of file, or the type changing file realizes, such as, the file (content identical) different to title adopts different secret key encryptions, or the file (content identical) different to file type adopts different secret key encryptions.
In the first embodiment of the invention, detect and whether receive file encryption instruction, when receiving file encryption instruction, display key input dialogue frame, receive the selection instruction of key input dialogue frame, according to the file of the secret key encryption selection that key input dialogue frame receives.Because described key input dialogue frame has 2 at least, therefore, the file at least 2 different secret key encryption files or briefcase can be adopted, thus reduce the risk of the information revealing user, improve the security of file.Such as, after a key in file or briefcase is broken, also has the file of another this another secret key encryption of cryptographic key protection.In addition, due to after a key is broken, display is adopted the file of this secret key encryption, therefore, the file of display can confuse assailant, thus effectively promotes the protective capability of file.
Should be understood that in embodiments of the present invention, the size of the sequence number of above-mentioned each process does not also mean that the priority of execution sequence, and the execution sequence of each process should be determined with its function and internal logic, and should not form any restriction to the implementation process of the embodiment of the present invention.
embodiment two:
Fig. 4 shows the structural drawing of a kind of document encrypting apparatus that second embodiment of the invention provides, this document encrypting apparatus can be applicable in terminal, this terminal can comprise carries out through wireless access network RAN and one or more core net the subscriber equipment that communicates, this subscriber equipment can be mobile phone (or being called " honeycomb " phone), have the computing machine etc. of mobile device, such as, subscriber equipment can also be portable, pocket, hand-held, built-in computer or vehicle-mounted mobile device, they and wireless access network switched voice and/or data.Again such as, this mobile device can comprise smart mobile phone, panel computer, personal digital assistant PDA, point-of-sale terminal POS or vehicle-mounted computer etc.For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.
This document encrypting apparatus comprises: file encryption instruction detection unit 41, key input dialogue frame display unit 42, dialog box selection instruction receiving element 43, file encryption unit 44.Wherein:
File encryption instruction detection unit 41, for detecting whether receive file encryption instruction.
Wherein, file encryption instruction sends by mouse or keyboard etc., or is sent by the touch-screen that user clicks terminal, or sends file encryption instruction by voice, is not construed as limiting herein.
Alternatively, described file encryption instruction detection unit 41 comprises:
Long by command detection module, whether receive length by instruction for detecting.
First encryption editing options display module, for when receiving length by instruction, display encryption editing options.
The selection instruction detection module of the first encryption editing options, for detecting the selection instruction whether receiving encryption editing options, when receiving the selection instruction of encryption editing options, judge to receive file encryption instruction, when not receiving the selection instruction of encryption editing options, judge not receive file encryption instruction.
Particularly, detect file or briefcase etc. and whether receive long by instruction, if receive long by instruction, then show encryption editing options, when user clicks encryption editing options, when sending the selection instruction of encryption editing options, terminal judges to receive file encryption instruction.Certainly, except display encryption editing options, the editing options deleted and wait other can also be shown, be not construed as limiting herein.
Alternatively, described file encryption instruction detection unit 41 comprises:
Right click command detection module, for detecting whether receive right click instruction.
Second encryption editing options display module, for when receiving right click instruction, display encryption editing options.
The selection instruction detection module of the second encryption editing options, for detecting the selection instruction whether receiving encryption editing options, when receiving the selection instruction of encryption editing options, judge to receive file encryption instruction, when not receiving the selection instruction of encryption editing options, judge not receive file encryption instruction.
Particularly, detect file or briefcase etc. and whether receive right click instruction, if receive right click instruction, then show encryption editing options, when user clicks encryption editing options, when sending the selection instruction of encryption editing options, terminal judges to receive file encryption instruction.Certainly, except display encryption editing options, the editing options deleted and wait other can also be shown, be not construed as limiting herein.
Key input dialogue frame display unit 42, for when receiving file encryption instruction, display key input dialogue frame, described key input dialogue frame has 2 at least.
Dialog box selection instruction receiving element 43, for receiving the selection instruction of key input dialogue frame.
Particularly, after user have selected certain key input dialogue frame, this key input dialogue frame presents selected state, such as, the color burn of the frame of key input dialogue frame, or key input dialogue frame presents suspended state etc., to make the key input dialogue frame chosen and not have selected key input dialogue frame distinct, be convenient to user's identification.
File encryption unit 44, the file that the secret key encryption for receiving according to key input dialogue frame is selected.
Particularly, after user have selected certain key input dialogue frame, in this key input dialogue frame, input the key of a string character as encrypt file, this character such as numeral and/or letter and/or symbol etc.
Alternatively, described file encryption unit 44 comprises:
File display module, for dir, described listed files comprises the file of the secret key encryption that the key input dialogue frame of selection can be adopted to input.
File selection module, for receiving file selection instruction, and according to the file that the secret key encryption that key input dialogue frame receives is selected.
Particularly, when user have selected certain key input dialogue frame, the file in display file folder or briefcase, the file of display shows with the form of listed files.Certainly, in a practical situation, also can after user inputs key dir again, be not construed as limiting herein.The file needing encryption is selected for the ease of user, then at each file side correspondence display selectable symbol of display, when user clicks this selectable symbol (being equivalent to the file selecting this symbol corresponding), this selectable symbol will change color, or fill new color, to distinguish not by the symbol selected.Certainly, also at each file side correspondence display selectable symbol of display, now, after user clicks certain file, can not no longer show this certain file, selected to identify this file.
Alternatively, described file display module comprises:
Ff module, for searching the file of storage.
File arrangements module, shows with the form of listed files for the file that will search, and described listed files arranges according to the file arrangements mode preset.
Search the file that stores in the file or briefcase that user selects, and the file searched is shown according to the file arrangements mode preset, such as, show according to file name, or show etc. according to the sequencing of the Time Created of file.If it is pointed out that, user has adopted some file in key 1 pair of file to be encrypted, then, when user clicks the dialog box of key 2, terminal no longer shows the file having adopted key 1 to encrypt.
Those of ordinary skill in the art can recognize, in conjunction with unit and the algorithm steps of each example of embodiment disclosed herein description, can realize with the combination of electronic hardware or computer software and electronic hardware.These functions perform with hardware or software mode actually, depend on application-specific and the design constraint of technical scheme.Professional and technical personnel can use distinct methods to realize described function to each specifically should being used for, but this realization should not thought and exceeds scope of the present invention.
Those skilled in the art can be well understood to, and for convenience and simplicity of description, the specific works process of the system of foregoing description, device and unit, with reference to the corresponding process in preceding method embodiment, can not repeat them here.
In several embodiments that the application provides, should be understood that disclosed system, apparatus and method can realize by another way.Such as, device embodiment described above is only schematic, such as, the division of described unit, be only a kind of logic function to divide, actual can have other dividing mode when realizing, such as multiple unit or assembly can in conjunction with or another system can be integrated into, or some features can be ignored, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of device or unit or communication connection can be electrical, machinery or other form.
The described unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, also can be that the independent physics of unit exists, also can two or more unit in a unit integrated.
If described function using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computer read/write memory medium.Based on such understanding, the part of the part that technical scheme of the present invention contributes to prior art in essence in other words or this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) perform all or part of step of method described in each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, portable hard drive, ROM (read-only memory) (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. various can be program code stored medium.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should described be as the criterion with the protection domain of claim.

Claims (10)

1. a file encrypting method, is characterized in that, described method comprises:
Detect and whether receive file encryption instruction;
When receiving file encryption instruction, display key input dialogue frame, described key input dialogue frame has 2 at least;
Receive the selection instruction of key input dialogue frame;
According to the file of the secret key encryption selection that key input dialogue frame receives.
2. method according to claim 1, is characterized in that, the file that the described secret key encryption received according to key input dialogue frame is selected, and specifically comprises:
Dir, described listed files comprises the file of the secret key encryption that the key input dialogue frame of selection can be adopted to input;
Receive file selection instruction, and according to the file that the secret key encryption that key input dialogue frame receives is selected.
3. method according to claim 2, is characterized in that, described dir, specifically comprises:
Search the file of storage;
Shown with the form of listed files by the file searched, described listed files arranges according to the file arrangements mode preset.
4. method according to claim 1, is characterized in that, whether described detection receives file encryption instruction, specifically comprises:
Detect and whether receive length by instruction;
When receiving length by instruction, display encryption editing options;
Detecting the selection instruction whether receiving encryption editing options, when receiving the selection instruction of encryption editing options, judging to receive file encryption instruction, when not receiving the selection instruction of encryption editing options, judging not receive file encryption instruction.
5. method according to claim 1, is characterized in that, whether described detection receives file encryption instruction, specifically comprises:
Detect and whether receive right click instruction;
When receiving right click instruction, display encryption editing options;
Detecting the selection instruction whether receiving encryption editing options, when receiving the selection instruction of encryption editing options, judging to receive file encryption instruction, when not receiving the selection instruction of encryption editing options, judging not receive file encryption instruction.
6. a document encrypting apparatus, is characterized in that, described device comprises:
File encryption instruction detection unit, for detecting whether receive file encryption instruction;
Key input dialogue frame display unit, for when receiving file encryption instruction, display key input dialogue frame, described key input dialogue frame has 2 at least;
Dialog box selection instruction receiving element, for receiving the selection instruction of key input dialogue frame;
File encryption unit, the file that the secret key encryption for receiving according to key input dialogue frame is selected.
7. device according to claim 6, is characterized in that, described file encryption unit comprises:
File display module, for dir, described listed files comprises the file of the secret key encryption that the key input dialogue frame of selection can be adopted to input;
File selection module, for receiving file selection instruction, and according to the file that the secret key encryption that key input dialogue frame receives is selected.
8. device according to claim 7, is characterized in that, described file display module comprises:
Ff module, for searching the file of storage;
File arrangements module, shows with the form of listed files for the file that will search, and described listed files arranges according to the file arrangements mode preset.
9. device according to claim 6, is characterized in that, described file encryption instruction detection unit comprises:
Long by command detection module, whether receive length by instruction for detecting;
First encryption editing options display module, for when receiving length by instruction, display encryption editing options;
The selection instruction detection module of the first encryption editing options, for detecting the selection instruction whether receiving encryption editing options, when receiving the selection instruction of encryption editing options, judge to receive file encryption instruction, when not receiving the selection instruction of encryption editing options, judge not receive file encryption instruction.
10. device according to claim 6, is characterized in that, described file encryption instruction detection unit comprises:
Right click command detection module, for detecting whether receive right click instruction;
Second encryption editing options display module, for when receiving right click instruction, display encryption editing options;
The selection instruction detection module of the second encryption editing options, for detecting the selection instruction whether receiving encryption editing options, when receiving the selection instruction of encryption editing options, judge to receive file encryption instruction, when not receiving the selection instruction of encryption editing options, judge not receive file encryption instruction.
CN201510313639.XA 2015-06-09 2015-06-09 File encrypting method and device Expired - Fee Related CN104850801B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510313639.XA CN104850801B (en) 2015-06-09 2015-06-09 File encrypting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510313639.XA CN104850801B (en) 2015-06-09 2015-06-09 File encrypting method and device

Publications (2)

Publication Number Publication Date
CN104850801A true CN104850801A (en) 2015-08-19
CN104850801B CN104850801B (en) 2018-03-13

Family

ID=53850438

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510313639.XA Expired - Fee Related CN104850801B (en) 2015-06-09 2015-06-09 File encrypting method and device

Country Status (1)

Country Link
CN (1) CN104850801B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105184176A (en) * 2015-08-27 2015-12-23 安一恒通(北京)科技有限公司 File processing method and apparatus for electronic device
CN106067875A (en) * 2016-05-24 2016-11-02 珠海市魅族科技有限公司 Intelligent terminal's encryption method and system
CN106203176A (en) * 2016-07-29 2016-12-07 乐视控股(北京)有限公司 A kind of application encryption method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080022131A1 (en) * 2005-02-25 2008-01-24 Sony Corporation Information processing apparatus, information recording medium manufacturing method, and computer program
CN101166088A (en) * 2007-09-27 2008-04-23 航天信息股份有限公司 Encryption and decryption method based on user identity identifier
CN101364984B (en) * 2008-08-13 2011-10-05 西安鼎蓝通信技术有限公司 Method for guarantee safety of electronic file

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080022131A1 (en) * 2005-02-25 2008-01-24 Sony Corporation Information processing apparatus, information recording medium manufacturing method, and computer program
CN101166088A (en) * 2007-09-27 2008-04-23 航天信息股份有限公司 Encryption and decryption method based on user identity identifier
CN101364984B (en) * 2008-08-13 2011-10-05 西安鼎蓝通信技术有限公司 Method for guarantee safety of electronic file

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105184176A (en) * 2015-08-27 2015-12-23 安一恒通(北京)科技有限公司 File processing method and apparatus for electronic device
WO2017031903A1 (en) * 2015-08-27 2017-03-02 安一恒通(北京)科技有限公司 File processing method and apparatus for electronic device
CN106067875A (en) * 2016-05-24 2016-11-02 珠海市魅族科技有限公司 Intelligent terminal's encryption method and system
CN106067875B (en) * 2016-05-24 2020-04-17 珠海市魅族科技有限公司 Intelligent terminal encryption method and system
CN106203176A (en) * 2016-07-29 2016-12-07 乐视控股(北京)有限公司 A kind of application encryption method and device

Also Published As

Publication number Publication date
CN104850801B (en) 2018-03-13

Similar Documents

Publication Publication Date Title
CN101436175B (en) System and method for controlling comments in a collaborative document
CN103780622B (en) A kind of data classification encryption method of facing cloud storage
CN100464313C (en) Mobile memory device and method for accessing encrypted data in mobile memory device
CN104834449A (en) Mobile terminal icon managing method and device
CN105574418A (en) Data encryption method and apparatus
CN103778380A (en) Data desensitization method and device and data anti-desensitization method and device
CN104731468A (en) Application icon sorting method and device
CN101499027A (en) Intelligent memory system based on independent kernel and distributed architecture
CN105827582A (en) Communication encryption method, device and system
CN105808583A (en) File type identification method and device
CN103399865A (en) Method and device for multi-media file generation
CN105898054A (en) Verification-based message display method and communication terminal
CN103019608A (en) Unlocking method of touch screen terminal and touch screen terminal
CN104850801A (en) File encryption method and file encryption device
CN102118503B (en) Data protection method, device and terminal
CN104915588A (en) Privacy protection method and device for electronic equipment
CN106484691A (en) The date storage method of mobile terminal and device
CN104636059B (en) The searching method and its system of account project
CN103324587A (en) Nandflash equipment encryption and decryption implementation method and system
CN106951790A (en) USB storage medium transparent encryption methods
CN107609422B (en) A kind of file management method and mobile terminal
CN103838990A (en) Data processing method and browser
CN114625756A (en) Data query method and device and server
CN105138236A (en) Electronic reading device and book shelf interface electronic book concealment control method
CN105989105B (en) A kind of management method and device for collecting data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523841 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CP03 Change of name, title or address
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180313