CN106022148A - File encryption method and device - Google Patents
File encryption method and device Download PDFInfo
- Publication number
- CN106022148A CN106022148A CN201610363700.6A CN201610363700A CN106022148A CN 106022148 A CN106022148 A CN 106022148A CN 201610363700 A CN201610363700 A CN 201610363700A CN 106022148 A CN106022148 A CN 106022148A
- Authority
- CN
- China
- Prior art keywords
- file
- password
- secret
- unit
- destination
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a file encryption method and a device, which are used for solving the problem that an application lock can not only protect a file, and the method comprises the following steps: establishing a private folder; setting a private password for the private folder; acquiring a target file on a private folder interface, and storing the target file in a private folder; hiding the target files except the target files in the private folder. By implementing the embodiment of the invention, the protection of only the file can be realized.
Description
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of file encrypting method and device.
Background technology
Application on the subscriber equipment such as mobile phone, panel computer can be encrypted by application lock, when user needs
During application to be started, user needs to input correct Crypted password could use application, such that it is able to protection
The privacy of application.But, many times user is not required to protect whole application, it is only necessary to protection should
Use middle partial document, such as: user needs some pictures in subscriber equipment are carried out secret protection, and
Need not picture library is carried out secret protection, but file cannot only be protected by application lock.
Summary of the invention
The embodiment of the invention discloses a kind of file encrypting method and device, being used for solving application lock cannot be only
The problem that file is protected.
The open a kind of file encrypting method of embodiment of the present invention first aspect, including:
Set up secret file;
For described secret file, secret password is set;
Obtain file destination at secret file interface, and described file destination is stored in described secret literary composition
In part folder;
Hide the described file destination in addition to the described file destination in described secret file.
In one embodiment, described for described secret file, secret password is set after, and in institute
Before stating secret file interface acquisition file destination, described method also includes:
When the OPEN for opening described secret file being detected, output is used for pointing out user defeated
Enter the information of password;
When the first password inputted for described information being detected, by described first password with described
Secret password compares;
When described first password is identical with described secret password, enter described secret file interface.
In one embodiment, described method also includes:
Set up privacy account;
For described privacy account, privacy password is set;
Described secret file of setting up includes:
Secret file is set up under described privacy account.
In one embodiment, described method also includes:
When the second password for unlocking screen being detected, and described second password and described privacy password phase
Meanwhile, loading data, described data include the data in described secret file;
When the second password for unlocking screen being detected, and when described second password is identical with preset password,
Load the data in addition to the data in described secret file.
In one embodiment, during described file destination is picture file, video file and audio file
At least one.
The open a kind of document encrypting apparatus of embodiment of the present invention second aspect, including:
Set up unit, be used for setting up secret file;
Unit is set, for arranging secret password for the described secret file setting up unit foundation;
Acquiring unit, for obtaining file destination at secret file interface;
Memory element, for being stored in described secret file by the file destination that described acquiring unit obtains
In;
Hidden unit, for hiding except the described described acquisition set up in the secret file that unit is set up is single
Described file destination outside the file destination that unit obtains.
In one embodiment, described device also includes:
Output unit, for when detecting for opening beating of the described secret file setting up unit foundation
When opening instruction, output is for pointing out user the information inputting password;
Comparing unit, for when the first of the information input exported for described output unit being detected
During password, described first password is compared with the described secret password arranging unit setting;
Enter unit, be used for when the comparative result of described comparing unit is described first password and described secret
When password is identical, enter described secret file interface.
In one embodiment, described set up unit, be additionally operable to set up privacy account;
Described unit is set, is additionally operable to set up the privacy account that unit sets up arrange privacy password for described;
Described set up unit and set up the mode of secret file be:
Secret file is set up under described privacy account.
In one embodiment, described device also includes that loading unit, described loading unit are used for:
When the second password for unlocking screen being detected, and described second password sets with the described unit that arranges
When the privacy password put is identical, loading data, described data include described setting up the secret literary composition that unit is set up
Data in part folder;
When the second password for unlocking screen being detected, and when described second password is identical with preset password,
Load the data in addition to the data in described secret file.
In one embodiment, during described file destination is picture file, video file and audio file
At least one.
In the embodiment of the present invention, set up secret file, secret password is set for secret file, in private
Close file interface obtains file destination, is stored in by file destination in secret file, and hides except private
The file destination outside file destination in close file, it is seen then that mesh can only be accessed from secret file
Mark file, and secret file is provided with password, it is thereby achieved that the protection to file.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below will be to required in embodiment
Accompanying drawing to be used is briefly described, it should be apparent that, the accompanying drawing in describing below is only the present invention
Some embodiments, for those of ordinary skill in the art, in the premise not paying creative work
Under, it is also possible to other accompanying drawing is obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of a kind of file encrypting method disclosed in the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of another kind of file encrypting method disclosed in the embodiment of the present invention;
Fig. 3 is the structural representation of a kind of document encrypting apparatus disclosed in the embodiment of the present invention;
Fig. 4 is the structural representation of another kind of document encrypting apparatus disclosed in the embodiment of the present invention;
Fig. 5 is the structural representation of the embodiment of the present invention another document encrypting apparatus disclosed.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out
Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of the present invention, and not
It it is whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making
The every other embodiment obtained under creative work premise, broadly falls into the scope of protection of the invention.
The embodiment of the invention discloses a kind of file encrypting method and device, being used for solving application lock cannot be only
The problem that file is protected.It is described in detail individually below.
Referring to Fig. 1, Fig. 1 is the schematic flow sheet of a kind of file encrypting method disclosed in the embodiment of the present invention.
Wherein, this document encryption method is to describe from the angle of the subscriber equipment such as mobile phone, panel computer.Such as Fig. 1
Shown in, this document encryption method may comprise steps of.
101, set up secret file, and secret password is set for secret file.
In the present embodiment, when during user needs subscriber equipment, some files of storage are protected, will
Set up a secret file, and one secret password is set for this secret file.Wherein, secret
File needs document to be protected, secret password to be used for protecting this secret file for storage, thus
Protection is stored in the file in secret file.
102, obtain file destination at secret file interface, and file destination is stored in secret file
In.
In the present embodiment, when user needs to protect the file destination of storage, user can pass through
Operating with family equipment and enter secret file interface, subscriber equipment obtains at secret file interface afterwards
File destination, and file destination is stored in secret file.Wherein, file destination can be picture
At least one in the files such as file, video file, audio file.Wherein, file destination can be literary composition
File in part manager, it is also possible to be the file in a concrete client (or application), such as:
When file destination is picture, file destination can be the file in picture library.
103, the file destination in addition to the file destination in secret file is hidden.
In the present embodiment, after file destination is stored in secret file by subscriber equipment, will be except secret
The file destination outside file destination in file stashes, in order to can only be beaten by secret file
Open file destination, thus protect file destination.Such as: when file destination is picture, and file destination is former
When being first stored in picture library, after file destination being stored in secret file, can be by picture library and file
File destination in manager stashes.
In the file encrypting method described by Fig. 1, set up secret file, private is set for secret file
Password, obtains file destination, is stored in by file destination in secret file at secret file interface,
And hide the file destination in addition to the file destination in secret file, it is seen then that can only be from secret file
Folder accesses file destination, and secret file is provided with password, it is thereby achieved that the guarantor to file
Protect.
Refer to the flow process signal that Fig. 2, Fig. 2 are another kind of file encrypting methods disclosed in the embodiment of the present invention
Figure.Wherein, this document encryption method is to describe from the angle of the subscriber equipment such as mobile phone, panel computer.
As in figure 2 it is shown, this document encryption method may comprise steps of.
201, set up privacy account, and privacy password is set for privacy account.
In the present embodiment, when during user needs subscriber equipment, some files of storage are protected, can
To set up a privacy account, and arranging privacy password for privacy account, subscriber equipment can be in privacy account
To needing document to be protected to carry out privacy settings under number.Wherein, subscriber equipment will include two accounts, one
Individual for privacy account, one is common account, when the unlocking pin of user's input is arranged with for privacy account
Privacy password identical time, subscriber equipment will enter privacy account, when user input unlocking pin with for
When the preset password of common account setting is identical, subscriber equipment will enter common account.
202, under privacy account, set up secret file, and secret password is set for secret file.
In the present embodiment, after subscriber equipment establishes privacy account, one can be set up under privacy account
Individual secret file, and one secret password is set for this secret file.Wherein, secret file
Need document to be protected, secret password to be used for protecting this secret file for storage, thus protection is deposited
Storage file in secret file.
203, when the OPEN for opening secret file being detected, output is used for pointing out user defeated
Enter the information of password.
In the present embodiment, when during user needs subscriber equipment, the file of storage carries out protection setting, can
With under privacy account by click on preset icon, click on predeterminable area, the pressing operation such as programmable button to
Subscriber equipment input is for opening the OPEN of secret file, and subscriber equipment detects this OPEN
Afterwards, output being used for the information pointing out user to input password, this information can be with voice
Mode exports, it is also possible to export with text mode.
204, when the first password inputted for this information being detected, first password is close with secret
Code compares, and when first password is identical with secret password, enters secret file interface.
In the present embodiment, when subscriber equipment detects the first password inputted for this information, will
First password compares with the secret password arranged for secret file, when first password and secret password
Time identical, secret file interface will be entered, when first password is different from secret password, can export
For pointing out the information of user cipher mistake.Wherein, first password can be to input with voice mode
, it is also possible to input with text mode.
205, obtain file destination at secret file interface, and file destination is stored in secret file
In.
In the present embodiment, after subscriber equipment enters secret file interface, when user needs storage
When file destination is protected, subscriber equipment obtains file destination at secret file interface, and by target
File is stored in secret file.Wherein, file destination can be picture file, video file, sound
At least one in the files such as frequency file.Wherein, file destination can be the file in file manager,
Can also be the file in a concrete client (or application), such as: when file destination is picture
Time, file destination can be the file in picture library.
206, the file destination in addition to the file destination in secret file is hidden.
In the present embodiment, after file destination is stored in secret file by subscriber equipment, will be except secret
The file destination outside file destination in file stashes, in order to can only be beaten by secret file
Open file destination, thus protect file destination.Such as: when file destination is picture, and file destination is former
When being first stored in picture library, after file destination being stored in secret file, can be by picture library and file
File destination in manager stashes.
207, when the second password for unlocking screen being detected, and when the second password is identical with privacy password,
Load the data of the data included in secret file, when the second password for unlocking screen being detected,
And second password identical with preset password time, load data in addition to the data in secret file.
In the present embodiment, after subscriber equipment establishes privacy account, when subscriber equipment is in the situation of screen locking
Under receive user's input when the second password unlocking screen, by the second password and privacy password and
Preset password compares, and when the second password is identical with privacy password, loads and includes in secret file
The data of data, i.e. load all of data, but the data in the secret file loaded be only in secret
File shows, does not shows in other place, when the second password is identical with preset password, only loads and removes
The data outside data in secret file.
In one embodiment, subscriber equipment can delete privacy account, enters common account afterwards, deletes
Except the secret file under privacy account and all data in secret file, and show secret file
Data in folder are stored in other data.
In the file encrypting method described by Fig. 2, set up secret file, private is set for secret file
Password, obtains file destination, is stored in by file destination in secret file at secret file interface,
And hide the file destination in addition to the file destination in secret file, it is seen then that can only be from secret file
Folder accesses file destination, and secret file is provided with password, it is thereby achieved that the guarantor to file
Protect.
Referring to Fig. 3, Fig. 4 is the structural representation of a kind of document encrypting apparatus disclosed in the embodiment of the present invention.
Wherein, this document encryption device can be the subscriber equipment such as mobile phone, panel computer.As it is shown on figure 3, this article
Part encryption device may include that
Set up unit 301, be used for setting up secret file;
Unit 302 is set, secret password is set for the secret file set up for setting up unit 301;
Acquiring unit 303, for obtaining file destination at secret file interface;
Memory element 304, sets up unit 301 build for being stored in by the file destination that acquiring unit 303 obtains
In vertical secret file;
Hidden unit 305, for hiding except the acquisition list set up in the secret file that unit 301 is set up
File destination outside the file destination that unit 303 obtains.
In the document encrypting apparatus described by Fig. 3, set up secret file, arrange for secret file
Secret password, obtains file destination, file destination is stored in secret file at secret file interface
In, and hide the file destination in addition to the file destination in secret file, it is seen then that can only be from secret
File accesses file destination, and secret file is provided with password, it is thereby achieved that to file
Protection.
Referring to Fig. 4, Fig. 4 is that disclosed in the embodiment of the present invention, the structure of another kind of document encrypting apparatus is shown
It is intended to.Wherein, this document encryption device can be the subscriber equipment such as mobile phone, panel computer.Shown in Fig. 4
Document encrypting apparatus be that the document encrypting apparatus optimization shown in Fig. 3 obtains, wherein:
This document encryption device can also include:
Output unit 306, for setting up the secret file that unit 301 is set up for opening when detecting
During OPEN, output is for pointing out user the information inputting password;
Comparing unit 307, for when the of the information input for output unit 306 output be detected
During one password, first password is compared with arranging the secret password that unit 302 arranges;
Enter unit 308, be used for when the comparative result of comparing unit 307 is first password and secret password
Time identical, enter secret file interface.
Specifically, acquiring unit 303 is entering the secret file interface acquisition target that unit 308 enters
File;
As a kind of possible embodiment, set up unit 301, be additionally operable to set up privacy account;
Arranging unit 302, the privacy account being additionally operable to set up for setting up unit 301 arranges privacy password;
Set up unit 301 and set up the mode of secret file and be:
Secret file is set up under privacy account.
As a kind of possible embodiment, set up unit 301, be additionally operable to set up common account;
Unit 302 is set, is additionally operable to arrange preset password for common account.
As a kind of possible embodiment, this document encryption device can also include loading unit 309, add
Carrier unit 309 is used for:
When the second password for unlocking screen being detected, and the second password with arrange unit 302 arrange hidden
Simultaneously, loading data, these data include setting up the data in the secret file that unit is set up secret code-phase;
When the second password for unlocking screen being detected, and the second password with arrange unit 302 arrange pre-
If password is identical, load the data in addition to the data in secret file.
As a kind of possible embodiment, file destination is picture file, video file and audio file
In at least one.
In the document encrypting apparatus described by Fig. 4, set up secret file, private is set for secret file
Password, obtains file destination, is stored in by file destination in secret file at secret file interface,
And hide the file destination in addition to the file destination in secret file, it is seen then that can only be from secret file
Folder accesses file destination, and secret file is provided with password, it is thereby achieved that the guarantor to file
Protect.
Refer to the structural representation that Fig. 5, Fig. 5 are the embodiment of the present invention another document encrypting apparatus disclosed
Figure.Wherein, this document encryption device can be the subscriber equipment such as mobile phone, panel computer.As it is shown in figure 5,
This document encryption device can include processor 501, memorizer 502, input equipment 503, output device 504
With communication bus 505, memorizer 502 can be high-speed RAM memorizer, it is also possible to be non-labile depositing
Reservoir (non-volatile memory), for example, at least one disk memory.Alternatively, memorizer 502
Can also is that at least one is located remotely from the storage device of aforementioned processor 501.Input equipment 503 can be
Touch screen, button, microphone etc., output device 504 can be display screen, microphone etc., wherein:
In memorizer 502, storage has batch processing code, processor 501 to be used for calling in memorizer 502 storage
Program code perform following operation:
Set up secret file;
For secret file, secret password is set;
Obtain file destination at secret file interface, and file destination is stored in secret file;
Hide the file destination in addition to the file destination in secret file.
As a kind of possible embodiment, after processor 501 arranges secret password for secret file,
And before secret file interface obtains file destination, input equipment 503, for receiving the use of input
In opening the OPEN of secret file and being sent to processor 501;
Output device 504, for output under the control of processor 501 for pointing out user to input password
Information;
Input equipment 503, is additionally operable to receive the first password for information input and be sent to processor
501;
Processor 501 is additionally operable to call below the program code execution of storage in memorizer 502 and operates:
First password is compared with the secret password arranged for secret file;
When first password is identical with secret password, enter secret file interface.
As a kind of possible embodiment, processor 501 is additionally operable to call the journey of storage in memorizer 502
Sequence code operates below performing:
Set up privacy account;
For privacy account, privacy password is set;
The mode of secret file set up by processor 501:
Secret file is set up under privacy account.
As a kind of possible embodiment, processor 501 is additionally operable to call the journey of storage in memorizer 502
Sequence code operates below performing:
When the second password for unlocking screen being detected, and the second password is hidden with arrange for privacy account
Simultaneously, loading data, these data include the data in secret file to secret code-phase;
When the second password for unlocking screen being detected, and when the second password is identical with preset password, add
Carry the data in addition to the data in secret file.
As a kind of possible embodiment, file destination is picture file, video file and audio file
In at least one.
In the document encrypting apparatus described by Fig. 5, set up secret file, private is set for secret file
Password, obtains file destination, is stored in by file destination in secret file at secret file interface,
And hide the file destination in addition to the file destination in secret file, it is seen then that can only be from secret file
Folder accesses file destination, and secret file is provided with password, it is thereby achieved that the guarantor to file
Protect.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment
Suddenly the program that can be by completes to instruct relevant hardware, and this program can be stored in a computer can
Read in storage medium, storage medium may include that flash disk, read only memory (read-only memory,
ROM), random access device (random access memory, RAM), disk or CD etc..
Above file encrypting method disclosed in the embodiment of the present invention and device are described in detail, herein
In apply specific case principle and the embodiment of the present invention be set forth, saying of above example
Bright method and the core concept thereof being only intended to help to understand the present invention;General simultaneously for this area
Technical staff, according to the thought of the present invention, the most all can change it
Place, in sum, this specification content should not be construed as limitation of the present invention.
Claims (10)
1. a file encrypting method, it is characterised in that including:
Set up secret file;
For described secret file, secret password is set;
Obtain file destination at secret file interface, and described file destination is stored in described secret literary composition
In part folder;
Hide the described file destination in addition to the described file destination in described secret file.
Method the most according to claim 1, it is characterised in that described for described secret file sandwiched
After putting secret password, and before described secret file interface obtains file destination, described method
Also include:
When the OPEN for opening described secret file being detected, output is used for pointing out user defeated
Enter the information of password;
When the first password inputted for described information being detected, by described first password with described
Secret password compares;
When described first password is identical with described secret password, enter secret file interface.
Method the most according to claim 1 and 2, it is characterised in that described method also includes:
Set up privacy account;
For described privacy account, privacy password is set;
Described secret file of setting up includes:
Secret file is set up under described privacy account.
Method the most according to claim 3, it is characterised in that described method also includes:
When the second password for unlocking screen being detected, and described second password and described privacy password phase
Meanwhile, loading data, described data include the data in described secret file;
When the second password for unlocking screen being detected, and when described second password is identical with preset password,
Load the data in addition to the data in described secret file.
Method the most according to claim 4, it is characterised in that described file destination be picture file,
At least one in video file and audio file.
6. a document encrypting apparatus, it is characterised in that including:
Set up unit, be used for setting up secret file;
Unit is set, for arranging secret password for the described secret file setting up unit foundation;
Acquiring unit, for obtaining file destination at secret file interface;
Memory element, for being stored in described secret file by the file destination that described acquiring unit obtains
In;
Hidden unit, for hiding except the described described acquisition set up in the secret file that unit is set up is single
Described file destination outside the file destination that unit obtains.
Device the most according to claim 6, it is characterised in that described device also includes:
Output unit, for when detecting for opening beating of the described secret file setting up unit foundation
When opening instruction, output is for pointing out user the information inputting password;
Comparing unit, for when the first of the information input exported for described output unit being detected
During password, described first password is compared with the described secret password arranging unit setting;
Enter unit, be used for when the comparative result of described comparing unit is described first password and described secret
When password is identical, enter described secret file interface.
8., according to the device described in claim 6 or 7, it is characterised in that described set up unit, it is additionally operable to
Set up privacy account;
Described unit is set, is additionally operable to set up the privacy account that unit sets up arrange privacy password for described;
Described set up unit and set up the mode of secret file be:
Secret file is set up under described privacy account.
Device the most according to claim 8, it is characterised in that described device also includes loading unit,
Described loading unit is used for:
When the second password for unlocking screen being detected, and described second password sets with the described unit that arranges
When the privacy password put is identical, loading data, described data include described setting up the secret literary composition that unit is set up
Data in part folder;
When the second password for unlocking screen being detected, and when described second password is identical with preset password,
Load the data in addition to the data in described secret file.
Device the most according to claim 9, it is characterised in that described file destination be picture file,
At least one in video file and audio file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610363700.6A CN106022148A (en) | 2016-05-26 | 2016-05-26 | File encryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610363700.6A CN106022148A (en) | 2016-05-26 | 2016-05-26 | File encryption method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106022148A true CN106022148A (en) | 2016-10-12 |
Family
ID=57091271
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610363700.6A Pending CN106022148A (en) | 2016-05-26 | 2016-05-26 | File encryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106022148A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106788970A (en) * | 2016-12-12 | 2017-05-31 | 暴风集团股份有限公司 | The method and system of secret protection is carried out to video |
CN107229396A (en) * | 2017-06-20 | 2017-10-03 | 维沃移动通信有限公司 | A kind of hiding method of mobile terminal application icon and mobile terminal |
CN108021631A (en) * | 2017-11-22 | 2018-05-11 | 努比亚技术有限公司 | File polling method, system and computer-readable recording medium |
CN108573161A (en) * | 2017-03-13 | 2018-09-25 | 北京贝塔科技股份有限公司 | Encryption method, application lock and electronic equipment |
CN109284628A (en) * | 2018-09-10 | 2019-01-29 | 珠海格力电器股份有限公司 | A kind of file encryption storage reading system, method and mobile terminal based on fingerprint |
CN109492417A (en) * | 2018-11-13 | 2019-03-19 | 熊予舒 | Data ciphering method and system |
WO2019051692A1 (en) * | 2017-09-13 | 2019-03-21 | 深圳传音通讯有限公司 | Privacy information protection method, terminal, and computer readable storage medium |
EP4276667A4 (en) * | 2021-01-27 | 2024-06-19 | Vivo Mobile Communication Co., Ltd. | Encryption method and apparatus, electronic device, and medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130246806A1 (en) * | 2012-03-13 | 2013-09-19 | Nec Corporation | Information processing apparatus, file encryption determination method and authority determination method |
CN103324893A (en) * | 2013-05-31 | 2013-09-25 | 华为技术有限公司 | Privacy protection method and device |
CN103338445A (en) * | 2013-06-19 | 2013-10-02 | 深圳市垦鑫达科技有限公司 | File encryption and decryption method and system |
CN103366105A (en) * | 2012-03-29 | 2013-10-23 | 宇龙计算机通信科技(深圳)有限公司 | Method and communication terminal for implementing private space |
CN104158947A (en) * | 2014-07-30 | 2014-11-19 | 张剑文 | Mobile phone privacy protecting system |
CN104168277A (en) * | 2014-08-15 | 2014-11-26 | 小米科技有限责任公司 | File security maintaining method and device |
CN104573536A (en) * | 2015-01-28 | 2015-04-29 | 深圳市中兴移动通信有限公司 | File protection method and device |
CN104700001A (en) * | 2013-12-04 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Information encryption method and device of application program |
-
2016
- 2016-05-26 CN CN201610363700.6A patent/CN106022148A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130246806A1 (en) * | 2012-03-13 | 2013-09-19 | Nec Corporation | Information processing apparatus, file encryption determination method and authority determination method |
CN103366105A (en) * | 2012-03-29 | 2013-10-23 | 宇龙计算机通信科技(深圳)有限公司 | Method and communication terminal for implementing private space |
CN103324893A (en) * | 2013-05-31 | 2013-09-25 | 华为技术有限公司 | Privacy protection method and device |
CN103338445A (en) * | 2013-06-19 | 2013-10-02 | 深圳市垦鑫达科技有限公司 | File encryption and decryption method and system |
CN104700001A (en) * | 2013-12-04 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Information encryption method and device of application program |
CN104158947A (en) * | 2014-07-30 | 2014-11-19 | 张剑文 | Mobile phone privacy protecting system |
CN104168277A (en) * | 2014-08-15 | 2014-11-26 | 小米科技有限责任公司 | File security maintaining method and device |
CN104573536A (en) * | 2015-01-28 | 2015-04-29 | 深圳市中兴移动通信有限公司 | File protection method and device |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106788970A (en) * | 2016-12-12 | 2017-05-31 | 暴风集团股份有限公司 | The method and system of secret protection is carried out to video |
CN108573161A (en) * | 2017-03-13 | 2018-09-25 | 北京贝塔科技股份有限公司 | Encryption method, application lock and electronic equipment |
CN108573161B (en) * | 2017-03-13 | 2022-02-18 | 北京贝塔科技股份有限公司 | Encryption method, application lock and electronic equipment |
CN107229396A (en) * | 2017-06-20 | 2017-10-03 | 维沃移动通信有限公司 | A kind of hiding method of mobile terminal application icon and mobile terminal |
CN107229396B (en) * | 2017-06-20 | 2019-12-24 | 维沃移动通信有限公司 | Mobile terminal application icon hiding method and mobile terminal |
WO2019051692A1 (en) * | 2017-09-13 | 2019-03-21 | 深圳传音通讯有限公司 | Privacy information protection method, terminal, and computer readable storage medium |
CN108021631A (en) * | 2017-11-22 | 2018-05-11 | 努比亚技术有限公司 | File polling method, system and computer-readable recording medium |
CN108021631B (en) * | 2017-11-22 | 2021-10-29 | 努比亚技术有限公司 | File query method, system and computer readable storage medium |
CN109284628A (en) * | 2018-09-10 | 2019-01-29 | 珠海格力电器股份有限公司 | A kind of file encryption storage reading system, method and mobile terminal based on fingerprint |
CN109492417A (en) * | 2018-11-13 | 2019-03-19 | 熊予舒 | Data ciphering method and system |
EP4276667A4 (en) * | 2021-01-27 | 2024-06-19 | Vivo Mobile Communication Co., Ltd. | Encryption method and apparatus, electronic device, and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106022148A (en) | File encryption method and device | |
KR102108614B1 (en) | Method and apparatus for unlocking user interface | |
EP2860654A1 (en) | Improved security function-based cloud service system and method for supporting same | |
US9443072B2 (en) | Methods and devices for granting access to and enabling passcode protection for a file | |
CN105760737A (en) | Control method for applications and terminal | |
CN104866752B (en) | A kind of application guard method and user terminal | |
CN109688145B (en) | Method and device for protecting privacy information | |
CN105701420B (en) | A kind of management method and terminal of user data | |
US8706158B2 (en) | Mobile phone for authenticating SIM card and method thereof | |
KR102491360B1 (en) | Systems and methods for providing user accounts that allow users to operate computing devices | |
CN105740670B (en) | Using encryption, starting method and apparatus | |
CN105512547A (en) | Intelligent terminal privacy protection method and intelligent terminal privacy protection system | |
CN106936999A (en) | Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently | |
CN105138252A (en) | Control method and electronic equipment | |
CN105184132A (en) | Electronic device privacy right management method and system | |
CN106599115B (en) | Data protection method, device and terminal | |
CN106909827A (en) | Using account management method and device | |
CN103324874A (en) | Verification method and electronic device | |
CN105574423B (en) | Terminal equipment and file management method thereof | |
US10372921B2 (en) | Dynamic security policies | |
CN106066967A (en) | Permission setting method and device | |
CN106909812A (en) | Terminal unlocking processing method and terminal | |
WO2023160640A1 (en) | Application identifier control method and apparatus | |
US10678895B2 (en) | Data input method, and electronic device and system for implementing the data input method | |
CN103425936B (en) | A kind of method realizing data confidentiality and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161012 |
|
RJ01 | Rejection of invention patent application after publication |