CN105893854A - Encryption and decryption method and device - Google Patents
Encryption and decryption method and device Download PDFInfo
- Publication number
- CN105893854A CN105893854A CN201610190772.5A CN201610190772A CN105893854A CN 105893854 A CN105893854 A CN 105893854A CN 201610190772 A CN201610190772 A CN 201610190772A CN 105893854 A CN105893854 A CN 105893854A
- Authority
- CN
- China
- Prior art keywords
- object content
- described object
- user
- encrypted
- drag operation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention relates to an encryption and decryption method and device, and belongs to the technical field of computers. The method includes the steps that dragging operation on target content on a terminal desktop by a user is detected, when it is determined that the dragged target content crosses a display interface of a terminal screen, if the target content is not encrypted, the technical scheme for encrypting the target content is carried out, the target content (like a certain APP, file, folder, picture or audio/video ) can be encrypted fast through the dragging operation, and the operation mode is simple, visual and convenient.
Description
Technical field
It relates to field of computer technology, particularly to a kind of encryption and decryption method and device.
Background technology
Along with the fast development of mobile terminal technology, user can use installation on mobile terminal whenever and wherever possible
Application program is such as taken pictures, reads, watches video, is played game or communication etc..Along with mobile whole
The reinforcement of end storage capacity, increasing user can store the information of some individuals in terminal, with convenient
Oneself can inquire about use at any time.So, the security of the information of user's storage just becomes critically important.Existing
It is: whole mobile terminal is encrypted that user is by deciphering to the security setting mode of mobile terminal content
Display desktop could be entered and carry out consulting of information.Or, use third party's encryption software or setting option
Certain application in terminal is encrypted, to protect the safety of information.
Summary of the invention
Disclosure embodiment provides a kind of encryption and decryption method and device.Described technical scheme is as follows:
First aspect according to disclosure embodiment, it is provided that a kind of encipher-decipher method, for terminal, the party
Method includes:
User is for the drag operation of object content on terminal desktop in detection;
Determine whether described drag operation drags described object content and cross the display interface of terminal screen;
When determining that dragging described object content has crossed the display interface of terminal screen, it is determined that in described target
Hold the most encrypted;
If described object content is the most encrypted, then described object content is encrypted;
If described object content is encrypted, then described object content is decrypted process.
Optionally, described object content includes: file, file, application program, picture or audio frequency and video.
Optionally, described described object content is encrypted, including:
Detect whether described user keeps the drag operation to described object content;
When described user keeps the drag operation to described object content, described object content is encrypted
Process;
After described object content is encrypted, detect whether described user decontrols described target
The drag operation of content;
If described user has decontroled the drag operation to described object content, then store described user to described
The Crypted password of object content, completes the encryption to described object content.
Optionally, described be encrypted described object content includes:
Prompt the user whether to use biological characteristic to be encrypted;
It is encrypted if user selects to carry out biological characteristic, then starts the bio-identification template in terminal, connect
Receive the input information of the biological characteristic of described user, according to the biological characteristic received, described object content is entered
Row encryption.
Optionally, the described storage described user Crypted password to described object content, complete described target
After the encryption of content, including:
Control the original position that described object content returns to before drag operation on described terminal desktop.
Optionally, described described object content is decrypted process, including:
Detect whether described user keeps the drag operation to described object content;
When described user keeps the drag operation to described object content, described object content is decrypted
Process.
Optionally, described described object content is decrypted process, including:
Point out described user to input encrypted message, and determine that the encrypted message that described user inputs is the most correct;
If the encrypted message of described user input is correct, then described object content is decrypted, shows institute
State object content to user.
Second aspect according to disclosure embodiment, it is provided that a kind of ciphering and deciphering device, for terminal, this dress
Put and include:
Detection module, is configured to detect user for the drag operation of object content on terminal desktop;
First determines module, is configured to determine that whether described drag operation drags described object content and cross end
The display interface of end screen;
Second determines module, is configured as determining that dragging described object content has crossed the display of terminal screen
Interface, it is determined that described object content is the most encrypted;
First performs processing module, if it is the most encrypted to be configured to described object content, then to described target
Content is encrypted;
Second performs processing module, encrypts if being configured to described object content, then in described target
Hold and be decrypted process.
Optionally, described object content includes: file, file, application program, picture or audio frequency and video.
Optionally, described first execution processing module includes:
First detector unit, is configured to detect whether described user keeps the dragging to described object content to grasp
Make;
Cryptographic processing unit, when being configured as the drag operation that described user keeps described object content,
Described object content is encrypted;
Second detector unit, after being configured as being encrypted described object content, detection is described
Whether user decontrols the drag operation to described object content;
Password memory cell, if being configured to described user to have decontroled the drag operation to described object content,
Then store the described user Crypted password to described object content, complete the encryption to described object content.
Optionally, described first performs processing module, or described cryptographic processing unit is configured to: prompting
Whether user uses biological characteristic to be encrypted;It is encrypted if user selects to carry out biological characteristic, then opens
Bio-identification template in dynamic terminal, receives the input information of the biological characteristic of described user, according to being received
Biological characteristic described object content is encrypted.
Optionally, described device also includes:
Control module, is configured to control described object content and returns to before drag operation on described terminal desktop
Original position.
Optionally, described second execution processing module includes:
Detector unit, is configured to detect whether described user keeps the drag operation to described object content;
Decryption processing unit, when being configured as the drag operation that described user keeps described object content,
Described object content is decrypted process.
Optionally, described second performs processing module, or decryption processing unit is configured to point out described use
Family input encrypted message, and determine that the encrypted message that described user inputs is the most correct;If described user is defeated
The encrypted message entered is correct, then be decrypted described object content, show that described object content is to user.
The third aspect according to disclosure embodiment, it is provided that a kind of ciphering and deciphering device, for terminal, including:
Processor;
For storing the memory of the executable instruction of processor;
Wherein, processor is configured to:
User is for the drag operation of object content on terminal desktop in detection;
Determine whether described drag operation drags described object content and cross the display interface of terminal screen;
When determining that dragging described object content has crossed the display interface of terminal screen, it is determined that in described target
Hold the most encrypted;
If described object content is the most encrypted, then described object content is encrypted;
If described object content is encrypted, then described object content is decrypted process.
The technical scheme that disclosure embodiment provides can include following beneficial effect:
The technical program, and is being determined for the drag operation of object content on terminal desktop by detection user
Drag target content has crossed the display interface of terminal screen, if described object content is the most encrypted, the most right
The realization of the technical scheme that described object content is encrypted, quickly can be realized by drag operation
At encryption to object content (such as certain APP, certain file or file, picture or audio frequency and video)
Reason, mode of operation is simple, directly perceived, convenient.
It should be appreciated that it is only exemplary and explanatory that above general description and details hereinafter describe,
The disclosure can not be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in specification and constitutes the part of this specification, it is shown that meet the disclosure
Embodiment, and for explaining the principle of the disclosure together with specification.
Fig. 1 is the flow chart according to a kind of encipher-decipher method shown in an exemplary embodiment;
Fig. 2 to Fig. 5 is to carry out object content according to the drag target content shown in an exemplary embodiment
The process schematic of encryption;
Fig. 6 is the block diagram according to a kind of ciphering and deciphering device shown in an exemplary embodiment;
Fig. 7 is the block diagram according to a kind of ciphering and deciphering device shown in an exemplary embodiment;
Fig. 8 is to perform processing module according to as shown in Figure 7 a kind of first shown in an exemplary embodiment
Block diagram;
Fig. 9 is to perform processing module according to as shown in Figure 7 a kind of second shown in an exemplary embodiment
Block diagram;
Figure 10 is the block diagram according to a kind of ciphering and deciphering device shown in an exemplary embodiment.
By above-mentioned accompanying drawing, it has been shown that the embodiment that the disclosure is clear and definite, hereinafter will be described in more detail.
These accompanying drawings and word describe the scope being not intended to be limited disclosure design by any mode, but logical
Crossing with reference to specific embodiment is the concept that those skilled in the art illustrate the disclosure.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Following retouches
Stating when relating to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.
Embodiment described in following exemplary embodiment does not represent all embodiment party consistent with the disclosure
Formula.On the contrary, they only with describe in detail in appended claims, the disclosure some in terms of mutually one
The example of the apparatus and method caused.
The technical scheme that disclosure embodiment provides is applied to terminal, and this terminal can be to have screen display merit
Can electronic equipment, such as the equipment such as mobile phone or panel computer, but be not limited to this, those skilled in the art
Easy to understand, the embodiment of the present invention applies also for any mobile end with processor and display output device
In end, it is particularly suited for having in the terminal of the display output device that multipoint-touch-technology realizes.It addition, should
Bio-identification module it is provided with, if fingerprint identification module, voiceprint identification module are or/and image recognition mould in terminal
Block etc., it is possible to be identified processing to the biological characteristic of electronic equipment holder input.It addition, this electronics sets
Standby built-in processor, can process fast and effectively information, such as, carry out information at encryption and decryption
The ability of reason.
Disclosure embodiment provides a kind of encipher-decipher method of application in terminal, can store in terminal
File, file, picture or audio frequency and video and terminal on install application program carry out encryption and decryption process,
Example, a kind of encryption and decryption technology scheme described by the disclosure can be: user is for terminal desktop in detection
The drag operation of upper object content;Determine whether described drag operation drags described object content and cross end panel
The display interface of curtain;When determining that dragging described object content has crossed the display interface of terminal screen, it is determined that
Described object content is the most encrypted;If described object content is the most encrypted, then described object content is entered
Row encryption;If described object content is encrypted, then described object content is decrypted process.Logical
Cross and pull object content and just can realize the encryption and decryption to object content so that can be the most square in the operation of user
Just the encryption and decryption to object content that completes processes.
Fig. 1 is the flow chart according to a kind of encipher-decipher method shown in an exemplary embodiment, this encryption and decryption side
Method can apply in above-mentioned terminal.Seeing Fig. 1, this encipher-decipher method can include following several step:
In a step 101, detection user is for the drag operation of object content on terminal desktop;
Wherein, described object content includes: file, file, application program, picture or audio frequency and video.
In order to be more fully understood that the embodiment of the present invention, the touch screen technology to terminal realizes principle and carries out letter below
Single introduction.Touch-screen, by touching detection part and touch screen controller forms, touches detection part and is arranged on aobvious
Showing device screen front, (human body touch is similar to the touch-screen of electrostatic induction thin slice to be used for detecting user touch location
Time, current sensing signal can be produced, touching detection part can be learnt by this current sensing signal of perception
The contact of user), then associated touch information is sent to touch screen controller, touch screen controller receives
After touching the touch information that transmitted of detection part, convert thereof into contact coordinate, then send to CPU (in
Central Processing Unit) process, touch screen controller also can receive order that CPU sends and perform simultaneously.
Realizing principle based on above touch screen technology, detection user is in the target of display on terminal desktop
The drag operation held can be just: user can be come the object content on terminal desktop by touch operation
Display mark operates, and when user carries out touch control operation to terminal desktop, touch-screen will produce electric current sense
Induction signal, touch detection part be may determine that by sensor current signal and detects the presence of operating of contacts, now,
Touching detection part and send relevant touch information to touch screen controller, touch screen controller is according to reception
To touch information determine that whether coordinate that operating of contacts is corresponding is the seat at the display mark place of object content
Mark, when the coordinate at display mark place that the coordinate that the operating of contacts of user is corresponding is object content, determines
User clicks on the display mark of the object content that have selected on terminal desktop, afterwards, determines the click behaviour of user
Whether continue for scheduled duration, if continue for scheduled duration, then confirming that this object content to be entered by user
Row drag operation.
Here, user by the display mark of display object content on a terminal screen is operated thus
Realize the operation to object content, such as mobile object content, open the behaviour such as object content, delete target content
Make.Wherein, when object content is file, picture or audio frequency and video, the display of object content is designated literary composition
Part mark, picture identification or audio frequency and video mark, during object content during file, the display mark of object content
Knowing is folder identifier, and when object content is application program, the display of object content is designated application program
Icon.
In a step 102, determine whether described drag operation drags described object content and cross terminal screen
Display interface;
When detecting that user to carry out drag operation to object content, then monitor the moving rail of this drag operation
Mark, here, terminal can be come this dragging by the current sensing signal produced because of drag operation on touch-screen
The track of operation detects, and judges whether this drag operation crosses end according to the motion track detected
The display interface of end screen, when final on trajectory drag operation being detected exceedes the border of terminal display,
Determine that described object content is the most encrypted.
In step 103, when determining that dragging described object content has crossed the display interface of terminal screen, then
Determine that described object content is the most encrypted;
If described object content is the most encrypted, then perform step 104;
If described object content is encrypted, then perform step 105;
At step 104, described object content is encrypted;
In disclosure embodiment, described described object content is encrypted, may include that
Detect whether described user keeps the drag operation to described object content;
When described user keeps the drag operation to described object content, described object content is encrypted
Process;
After described object content is encrypted, detect whether described user decontrols described target
The drag operation of content;
If described user has decontroled the drag operation to described object content, then store described user to described
The Crypted password of object content, completes the encryption to described object content.
Here it is possible to object content on terminal screen is shown what the touch control operation of mark produced by user
Electric current determines whether user keeps the drag operation to object content or decontroled the dragging to object content
Operation, when there being the electric current that object content shows the touch control operation marked on terminal screen, then confirms
User keeps the drag operation to object content, when the display to object content produced on terminal screen marks
Touch control operation current vanishes, then confirm user decontroled the drag operation to object content.
In disclosure embodiment, described be encrypted described object content may include that
Prompt the user whether to use biological characteristic to be encrypted;
It is encrypted if user selects to carry out biological characteristic, then starts the bio-identification template in terminal, connect
Receive the input information of the biological characteristic of described user, according to the biological characteristic received, described object content is entered
Row encryption.Here it is possible to by the bio-identification module arranged in terminal, such as fingerprint identification module, vocal print
Identification module, or/and picture recognition module etc., gathers the biological characteristic of user's input and is identified.
In another embodiment, object content is encrypted and can also include: prompting user's input
Object content is encrypted by numeral or graphical passwords information.
In disclosure embodiment, the described storage described user Crypted password to described object content, it is right to complete
After the encryption of described object content, including:
Control the original position that described object content returns to before drag operation on described terminal desktop.Here,
After detecting that user has decontroled the drag operation to object content, control object content return to before drag operation
Original position on described terminal desktop.
In step 105, described object content is decrypted process.
In disclosure embodiment, described described object content is decrypted process, may include that
Detect whether described user keeps the drag operation to described object content;
When described user keeps the drag operation to described object content, described object content is decrypted
Process.
In disclosure embodiment, described described object content is decrypted process, may include that
Point out described user to input encrypted message, and determine that the encrypted message that described user inputs is the most correct;
If the encrypted message of described user input is correct, then described object content is decrypted, shows institute
State object content to user.
Seeing Fig. 2 to Fig. 5, giving of example is encrypted place by drag target content to object content
The process of reason.User's drag target content A crosses the display border of terminal screen, and user is in target in prompting
Appearance is encrypted, and user places a digit on the fingerprint identification module of terminal, and fingerprint identification module is to user
The fingerprint of input is acquired and identifies, and is encrypted object content according to the finger print information collected,
User unclamps the drag operation to object content, controls position on a terminal screen before object content returns to drag
Put place.
In sum, the technical program by detection user for the drag operation of object content on terminal desktop,
And determining that drag target content has crossed the display interface of terminal screen, if described object content is not added
Close, then the realization to the technical scheme that described object content is encrypted, can be fast by drag operation
The realization of speed is to object content (such as certain APP, certain file or file, picture or audio frequency and video)
Encryption, mode of operation is simple, directly perceived, convenient.
Following for disclosure device embodiment, may be used for performing method of disclosure embodiment.For the disclosure
The details not disclosed in device embodiment, refer to method of disclosure embodiment.
Fig. 6 is the block diagram according to a kind of ciphering and deciphering device 200 shown in an exemplary embodiment, this encryption and decryption
Device 200 can pass through software, hardware or both be implemented in combination with become the some or all of of terminal,
This terminal can be the electronic display unit such as mobile phone or panel computer.This ciphering and deciphering device 200 may include that
Detection module 201, can be configured to detect user for the dragging behaviour of object content on terminal desktop
Make;
First determines module 202, can be configured to determine that whether described drag operation drags described object content
Cross the display interface of terminal screen;
Second determines module 203, can be configured as determining that the described object content of dragging has crossed terminal screen
Display interface, it is determined that described object content is the most encrypted;
First performs processing module 204, if it is the most encrypted to be configured to described object content, then to institute
State object content to be encrypted;
Second performs processing module 205, encrypts if described object content can be configured to, then to described
Object content is decrypted process.
In sum, the technical program by detection user for the drag operation of object content on terminal desktop,
And determining that drag target content has crossed the display interface of terminal screen, if described object content is not added
Close, then the realization to the technical scheme that described object content is encrypted, can be fast by drag operation
The realization of speed is to object content (such as certain APP, certain file or file, picture or audio frequency and video)
Encryption, mode of operation is simple, directly perceived, convenient.
Fig. 7 is the block diagram according to a kind of ciphering and deciphering device 300 shown in an exemplary embodiment, this encryption and decryption
Device 300 can pass through software, hardware or both be implemented in combination with become the some or all of of terminal,
This terminal can be the electronic display unit such as mobile phone or panel computer.This ciphering and deciphering device 300 may include that
Detection module 301, can be configured to detect user for the dragging behaviour of object content on terminal desktop
Make;
First determines module 302, can be configured to determine that whether described drag operation drags described object content
Cross the display interface of terminal screen;
Second determines module 303, can be configured as determining that the described object content of dragging has crossed terminal screen
Display interface, it is determined that described object content is the most encrypted;
First performs processing module 304, if it is the most encrypted to be configured to described object content, then to institute
State object content to be encrypted;
Second performs processing module 305, encrypts if described object content can be configured to, then to described
Object content is decrypted process;
Control module 306, can be configured to control described object content and return to before drag operation in described terminal
Original position on desktop.
Wherein, object content includes: file, file, application program, picture or audio frequency and video.
Seeing Fig. 8, the first execution processing module 304 as shown in Figure 7 may include that
First detector unit 3041, can be configured to detect whether described user keeps described object content
Drag operation;
Cryptographic processing unit 3042, can be configured as described user and keep the dragging to described object content
During operation, described object content is encrypted;
Second detector unit 3043, after can being configured as described object content is encrypted,
Detect whether described user decontrols the drag operation to described object content;
Password memory cell 3044, has decontroled described object content if described user can be configured to
Drag operation, then store the described user Crypted password to described object content, complete described object content
Encryption.
Wherein, first performs processing module 304, or cryptographic processing unit 3042 can be configured to: carry
Show whether user uses biological characteristic to be encrypted;It is encrypted, then if user selects to carry out biological characteristic
Start the bio-identification template in terminal, receive the input information of the biological characteristic of described user, according to being connect
Described object content is encrypted by the biological characteristic received.
Seeing Fig. 9, the second execution processing module 305 as shown in Figure 7 may include that
Detector unit 3051, can be configured to detect whether described user keeps dragging described object content
Dynamic operation;
Decryption processing unit 3052, can be configured as described user and keep the dragging to described object content
During operation, described object content is decrypted process.
Wherein, second performs processing module 305, or decryption processing unit 3052 can be additionally configured to carry
Show that described user inputs encrypted message, and determine that the encrypted message that described user inputs is the most correct;If institute
The encrypted message stating user's input is correct, then be decrypted described object content, show described object content
To user.
In sum, the technical program by detection user for the drag operation of object content on terminal desktop,
And determining that drag target content has crossed the display interface of terminal screen, if described object content is not added
Close, then the realization to the technical scheme that described object content is encrypted, can be fast by drag operation
The realization of speed is to object content (such as certain APP, certain file or file, picture or audio frequency and video)
Encryption, mode of operation is simple, directly perceived, convenient.
About the device in above-described embodiment, wherein modules performs the concrete mode of operation relevant
The embodiment of the method is described in detail, explanation will be not set forth in detail herein.
Refer to Figure 10, it illustrates a kind of shown in an exemplary embodiment for ciphering and deciphering device 400
Block diagram.Such as, device 400 can be the electronic display unit such as mobile phone or panel computer.
With reference to Figure 10, device 400 can include following one or more assembly: processes assembly 402, storage
Device 404, power supply module 406, multimedia groupware 408, audio-frequency assembly 410, input/output (I/O) interface
412, sensor cluster 414, and communications component 416.
Process assembly 402 and generally control the integrated operation of device 400, such as with display, call, number
The operation being associated according to communication, camera operation and record operation.Process assembly 402 and can include one or many
Individual processor 420 performs instruction, to complete all or part of step of above-mentioned encipher-decipher method.Additionally,
Process assembly 402 and can include one or more module, it is simple to process between assembly 402 and other assemblies
Alternately.Such as, process assembly 402 and can include multi-media module, to facilitate multimedia groupware 408 and place
Reason assembly 402 between mutual.
Memory 404 is configured to store various types of data to support the operation on device 400.This
The example of a little data includes any application for operation on device 400 or the instruction of method, contacts number
According to, telephone book data, message, picture, video etc..Memory 404 can be by any kind of volatibility
Or non-volatile memory device or combinations thereof realize, such as static RAM (SRAM),
Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM),
Programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash memory,
Disk or CD.
The various assemblies that power supply module 406 is device 400 provide electric power.Power supply module 406 can include electricity
Management system, one or more power supplys, and other generate, manage and distribute electric power phase with for device 400
The assembly of association.
The screen of one output interface of offer that multimedia groupware 408 is included between device 400 and user.
In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If
Screen includes that touch panel, screen may be implemented as touch-screen, to receive the input signal from user.
Touch panel includes that one or more touch sensor is with the gesture on sensing touch, slip and touch panel.
Touch sensor can not only sense touch or the border of sliding action, but also detect and touch or slide behaviour
Make relevant duration and pressure.In certain embodiments, multimedia groupware 308 includes that one preposition is taken the photograph
As head and/or post-positioned pick-up head.When device 400 is in operator scheme, during such as screening-mode or video mode,
Front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each front-facing camera and after
Put camera can be a fixing optical lens system or there is focal length and optical zoom ability.
Audio-frequency assembly 410 is configured to output and/or input audio signal.Such as, audio-frequency assembly 410 includes
One microphone (MIC), when device 400 is in operator scheme, such as call model, logging mode and voice
During recognition mode, microphone is configured to receive external audio signal.The audio signal received can be entered
One step is stored in memory 404 or sends via communications component 416.In certain embodiments, audio-frequency assembly
410 also include a loudspeaker, are used for exporting audio signal.
I/O interface 412 provides interface, above-mentioned peripheral interface for processing between assembly 402 and peripheral interface module
Module can be keyboard, puts striking wheel, button etc..These buttons may include but be not limited to: home button, sound
Amount button, start button and locking press button.
Sensor cluster 414 includes one or more sensor, for providing various aspects for device 400
State estimation.Such as, what sensor cluster 414 can detect device 400 opens/closed mode, assembly
Relative positioning, such as assembly is display and the keypad of device 400, and sensor cluster 414 is all right
The position of detection device 400 or 400 1 assemblies of device changes, existence that user contacts with device 400 or
Do not exist, device 400 orientation or acceleration/deceleration and the temperature change of device 400.Sensor cluster 414 can
To include proximity transducer, it is configured to when there is no any physical contact object near detecting.
Sensor cluster 414 can also include optical sensor, such as CMOS or ccd image sensor, is used for becoming
Use as in application.In certain embodiments, this sensor cluster 414 can also include acceleration transducer,
Gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communications component 416 is configured to facilitate the logical of wired or wireless mode between device 400 and other equipment
Letter.Device 400 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or they
Combination.In one exemplary embodiment, communications component 416 receives wide from outside via broadcast channel
The broadcast singal of broadcast management system or broadcast related information.In one exemplary embodiment, communications component 416
Also include near-field communication (NFC) module, to promote junction service.Such as, can be based on penetrating in NFC module
Frequency identifies (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, indigo plant
Tooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 400 can by one or more application specific integrated circuits (ASIC),
Digital signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD),
Field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are real
Existing, for the method performing the switching of above-mentioned display interface.
In the exemplary embodiment, a kind of non-transitory computer-readable storage medium including instruction is additionally provided
Matter, such as, include the memory 304 of instruction, and above-mentioned instruction can be performed by the processor 420 of device 400 with complete
Become above-mentioned encipher-decipher method.Such as, non-transitory computer-readable recording medium can be ROM, deposit at random
Access to memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
A kind of non-transitory computer-readable recording medium, when the instruction in storage medium is by device 400
When reason device performs so that device 400 is able to carry out above-mentioned encipher-decipher method.
It should be appreciated that the disclosure is not limited to accurate knot described above and illustrated in the accompanying drawings
Structure, and various modifications and changes can carried out without departing from the scope.The scope of the present disclosure is only by appended
Claim limits.
Claims (15)
1. an encipher-decipher method, it is characterised in that for terminal, described method includes:
User is for the drag operation of object content on terminal desktop in detection;
Determine whether described drag operation drags described object content and cross the display interface of terminal screen;
When determining that dragging described object content has crossed the display interface of terminal screen, it is determined that in described target
Hold the most encrypted;
If described object content is the most encrypted, then described object content is encrypted;
If described object content is encrypted, then described object content is decrypted process.
Method the most according to claim 1, it is characterised in that described object content includes: file,
File, application program, picture or audio frequency and video.
Method the most according to claim 1, it is characterised in that described described object content is added
Close process, including:
Detect whether described user keeps the drag operation to described object content;
When described user keeps the drag operation to described object content, described object content is encrypted
Process;
After described object content is encrypted, detect whether described user decontrols described target
The drag operation of content;
If described user has decontroled the drag operation to described object content, then store described user to described
The Crypted password of object content, completes the encryption to described object content.
4. according to the method described in claim 1 or 3, it is characterised in that described described object content is entered
Row encryption includes:
Prompt the user whether to use biological characteristic to be encrypted;
It is encrypted if user selects to carry out biological characteristic, then starts the bio-identification template in terminal, connect
Receive the input information of the biological characteristic of described user, according to the biological characteristic received, described object content is entered
Row encryption.
Method the most according to claim 3, it is characterised in that the described user of described storage is to described mesh
The Crypted password of mark content, after completing the encryption to described object content, including:
Control the original position that described object content returns to before drag operation on described terminal desktop.
Method the most according to claim 1, it is characterised in that described described object content is solved
Close process, including:
Detect whether described user keeps the drag operation to described object content;
When described user keeps the drag operation to described object content, described object content is decrypted
Process.
7. according to the method described in claim 1 or 6, it is characterised in that described described object content is entered
Row decryption processing, including:
Point out described user to input encrypted message, and determine that the encrypted message that described user inputs is the most correct;
If the encrypted message of described user input is correct, then described object content is decrypted, shows institute
State object content to user.
8. a ciphering and deciphering device, it is characterised in that for terminal, described device includes:
Detection module, is configured to detect user for the drag operation of object content on terminal desktop;
First determines module, is configured to determine that whether described drag operation drags described object content and cross end
The display interface of end screen;
Second determines module, is configured as determining that dragging described object content has crossed the display of terminal screen
Interface, it is determined that described object content is the most encrypted;
First performs processing module, if it is the most encrypted to be configured to described object content, then to described target
Content is encrypted;
Second performs processing module, encrypts if being configured to described object content, then in described target
Hold and be decrypted process.
Device the most according to claim 8, it is characterised in that described object content includes: file,
File, application program, picture or audio frequency and video.
Device the most according to claim 8, it is characterised in that described first performs processing module bag
Include:
First detector unit, is configured to detect whether described user keeps the dragging to described object content to grasp
Make;
Cryptographic processing unit, when being configured as the drag operation that described user keeps described object content,
Described object content is encrypted;
Second detector unit, after being configured as being encrypted described object content, detection is described
Whether user decontrols the drag operation to described object content;
Password memory cell, if being configured to described user to have decontroled the drag operation to described object content,
Then store the described user Crypted password to described object content, complete the encryption to described object content.
Device described in 11. according to Claim 8 or 10, it is characterised in that described first execution processes mould
Block, or described cryptographic processing unit is configured to: prompt the user whether to use biological characteristic to be encrypted;
It is encrypted if user selects to carry out biological characteristic, then starts the bio-identification template in terminal, receive institute
State the input information of the biological characteristic of user, according to the biological characteristic received, described object content is added
Close.
12. devices according to claim 10, it is characterised in that described device also includes:
Control module, is configured to control described object content and returns to before drag operation on described terminal desktop
Original position.
13. devices according to claim 8, it is characterised in that described second performs processing module bag
Include:
Detector unit, is configured to detect whether described user keeps the drag operation to described object content;
Decryption processing unit, when being configured as the drag operation that described user keeps described object content,
Described object content is decrypted process.
Device described in 14. according to Claim 8 or 13, it is characterised in that described second execution processes mould
Block, or decryption processing unit is configured to point out described user to input encrypted message, and determine described user
The encrypted message of input is the most correct;If the encrypted message of described user input is correct, then to described target
Content is decrypted, and shows that described object content is to user.
15. 1 kinds of ciphering and deciphering devices, it is characterised in that for running the terminal having application program, including:
Processor;
For storing the memory of the executable instruction of described processor;
Wherein, described processor is configured to:
User is for the drag operation of object content on terminal desktop in detection;
Determine whether described drag operation drags described object content and cross the display interface of terminal screen;
When determining that dragging described object content has crossed the display interface of terminal screen, it is determined that in described target
Hold the most encrypted;
If described object content is the most encrypted, then described object content is encrypted;
If described object content is encrypted, then described object content is decrypted process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610190772.5A CN105893854B (en) | 2016-03-30 | 2016-03-30 | Encryption and decryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610190772.5A CN105893854B (en) | 2016-03-30 | 2016-03-30 | Encryption and decryption method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105893854A true CN105893854A (en) | 2016-08-24 |
CN105893854B CN105893854B (en) | 2019-04-12 |
Family
ID=57014702
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610190772.5A Active CN105893854B (en) | 2016-03-30 | 2016-03-30 | Encryption and decryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105893854B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106384060A (en) * | 2016-09-23 | 2017-02-08 | 维沃移动通信有限公司 | Mobile terminal data encryption method and mobile terminal |
CN106548078A (en) * | 2016-10-20 | 2017-03-29 | 北京小米移动软件有限公司 | Using encryption method and device |
CN107220552A (en) * | 2017-05-25 | 2017-09-29 | 维沃移动通信有限公司 | A kind of encryption and decryption approaches and mobile terminal |
CN108337355A (en) * | 2017-01-19 | 2018-07-27 | 北京小米移动软件有限公司 | Object Encryption Process and device |
CN111382395A (en) * | 2018-12-29 | 2020-07-07 | 北京小米移动软件有限公司 | Control method and device of application icons |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103235903A (en) * | 2013-04-12 | 2013-08-07 | 广东欧珀移动通信有限公司 | Processing method and device for hiding programs of mobile terminal |
CN104732121A (en) * | 2015-03-24 | 2015-06-24 | 广东欧珀移动通信有限公司 | Encryption setting method, decryption setting method and corresponding device of application program |
-
2016
- 2016-03-30 CN CN201610190772.5A patent/CN105893854B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103235903A (en) * | 2013-04-12 | 2013-08-07 | 广东欧珀移动通信有限公司 | Processing method and device for hiding programs of mobile terminal |
CN104732121A (en) * | 2015-03-24 | 2015-06-24 | 广东欧珀移动通信有限公司 | Encryption setting method, decryption setting method and corresponding device of application program |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106384060A (en) * | 2016-09-23 | 2017-02-08 | 维沃移动通信有限公司 | Mobile terminal data encryption method and mobile terminal |
CN106384060B (en) * | 2016-09-23 | 2019-11-15 | 维沃移动通信有限公司 | A kind of mobile terminal data encryption method and mobile terminal |
CN106548078A (en) * | 2016-10-20 | 2017-03-29 | 北京小米移动软件有限公司 | Using encryption method and device |
CN108337355A (en) * | 2017-01-19 | 2018-07-27 | 北京小米移动软件有限公司 | Object Encryption Process and device |
CN108337355B (en) * | 2017-01-19 | 2020-10-13 | 北京小米移动软件有限公司 | Object encryption method and device |
CN107220552A (en) * | 2017-05-25 | 2017-09-29 | 维沃移动通信有限公司 | A kind of encryption and decryption approaches and mobile terminal |
CN111382395A (en) * | 2018-12-29 | 2020-07-07 | 北京小米移动软件有限公司 | Control method and device of application icons |
Also Published As
Publication number | Publication date |
---|---|
CN105893854B (en) | 2019-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104503688B (en) | The control method and device of intelligent hardware devices | |
CN104219058B (en) | Authentication, identification authorization method and device | |
CN104503689B (en) | Application interface display methods and device | |
CN104850769A (en) | Method and device for executing operation | |
CN105389516A (en) | Sensitive picture reminding method and apparatus | |
CN104008348A (en) | Application program control method, application program control device and terminal | |
CN105893854A (en) | Encryption and decryption method and device | |
CN105607805A (en) | Corner mark processing method and apparatus for application icon | |
CN104850995A (en) | Operation executing method and device | |
CN107102772A (en) | Touch control method and device | |
CN107992257A (en) | Split screen method and device | |
CN104391712A (en) | Shutdown method and device | |
CN106909827A (en) | Using account management method and device | |
CN105843503A (en) | Application starting method and device as well as terminal equipment | |
CN107767133A (en) | Virtual card opens chucking method, apparatus and system, storage medium | |
CN104036165A (en) | Password processing method and device | |
CN106845199A (en) | Object authentication method and device | |
CN107145797A (en) | Display control method, device and the terminal device of application icon | |
CN106774802A (en) | The reminding method of terminal power, device and terminal | |
CN105204712A (en) | Method and device for displaying icons of folder | |
CN105046127A (en) | Encryption and decryption method and apparatus | |
CN107197107A (en) | Enabled instruction processing method and processing device | |
CN104506710B (en) | Short message management method, terminal and device | |
CN106778198A (en) | Perform the safety certifying method and device of operation | |
CN106778125A (en) | unlocking method, device and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |