CN107423628A - File encrypting method, device and terminal - Google Patents

File encrypting method, device and terminal Download PDF

Info

Publication number
CN107423628A
CN107423628A CN201610343947.1A CN201610343947A CN107423628A CN 107423628 A CN107423628 A CN 107423628A CN 201610343947 A CN201610343947 A CN 201610343947A CN 107423628 A CN107423628 A CN 107423628A
Authority
CN
China
Prior art keywords
predetermined file
file
crypted password
encrypted
mentioned
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610343947.1A
Other languages
Chinese (zh)
Inventor
相薇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610343947.1A priority Critical patent/CN107423628A/en
Priority to PCT/CN2016/108608 priority patent/WO2017201999A1/en
Publication of CN107423628A publication Critical patent/CN107423628A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a kind of file encrypting method, device and terminal, wherein, this method includes:Before predetermined file is generated or during generation predetermined file, the Crypted password of input is obtained;When generating above-mentioned predetermined file, predetermined file is encrypted using above-mentioned Crypted password.By the invention it is possible to ensure the security of file, effectively solve the problems, such as that the security of file present in correlation technique is low.

Description

File encrypting method, device and terminal
Technical field
The present invention relates to the communications field, in particular to a kind of file encrypting method, device and terminal.
Background technology
With the development of science and technology, the application of intelligent terminal is more next universal, substantially every household is all using, below with intelligence Illustrated exemplified by camera function in energy mobile phone:In modern science and technology, the application on smart mobile phone is more and more, wherein, intelligence Camera in energy mobile phone can substantially replace the function of special digital camera, the photo meeting stored in smart mobile phone More and more, that mobile phone takes pictures and preserved safetyAnswer whether, have many people because mobile phone lose, cause photo to be revealed, Or photo is illegally obtained by other people, and cause the big damage of reputation, and thus caused associated loss is also very big.
It in current shooting technology, will not be encrypted during taking pictures, usually take pictures completion simultaneously And photo is saved in after memory and just can suitably be encrypted, so as to realize in photo has clapped ciphering process The secrecy processing of photo;Also, current primary encryption mode is encrypting fingerprint, and encrypting fingerprint is not tight enough, mobile phone Upper registered all fingerprints can be decrypted, without uniqueness.
In addition to above-mentioned photo, video, short message or other files of storage in the terminal in terminal are all desirable Complete creating and can be just encrypted after storage, so as to cause the security of file than relatively low.
For above mentioned problem present in correlation technique, effective solution is not yet proposed at present.
The content of the invention
The embodiments of the invention provide a kind of file encrypting method, device and terminal, at least to solve to deposit in correlation technique File security it is low the problem of.
According to one embodiment of present invention, there is provided a kind of file encrypting method, including:Before predetermined file is generated Or during generation predetermined file, obtain the Crypted password of input;It is close using the encryption when generating the predetermined file The predetermined file is encrypted code.
Alternatively, after the predetermined file is encrypted using the Crypted password, methods described also includes:It is hidden Hide the predetermined file after encryption.
Alternatively, obtaining the Crypted password of input includes:The first of input is obtained using two or more infrared ray sensor Gesture motion;First gesture action is converted to by the first data signal by analog-to-digital conversion;Determine the first numeral letter Number it is the Crypted password.
Alternatively, the predetermined file is encrypted using the Crypted password including:Determine the predetermined file The suffix of filename;The mode that the suffix is modified is added to the predetermined file by using the Crypted password It is close.
Alternatively, after the predetermined file is encrypted using the Crypted password, methods described also includes:Obtain Take the clear crytpographic key of input;The predetermined file after encryption is decrypted using the clear crytpographic key, and shown described pre- Determine file.
Alternatively, obtaining the clear crytpographic key of input includes:Entering storage circle for storing the predetermined file Behind face, the clear crytpographic key of input is obtained.
Alternatively, obtaining the clear crytpographic key of input includes:Input is obtained using two or more infrared ray sensor Second gesture acts;Second gesture action is converted to by the second data signal by analog-to-digital conversion;Determine second number Word signal is the clear crytpographic key.
Alternatively, when the Crypted password is that the first gesture obtained using infrared ray sensor described in two or more is moved During the first data signal being converted to, sliding path and the first gesture action of the second gesture action Sliding path is opposite.
Alternatively, when the side to be modified by using the Crypted password to the suffix of the filename of the predetermined file When the predetermined file is encrypted formula, the predetermined file after encryption is decrypted using the clear crytpographic key, and Show that the predetermined file includes:Recover the suffix of the filename of the predetermined file using the clear crytpographic key;Display recovers The predetermined file of suffix.
Alternatively, after the predetermined file is shown, methods described also includes:When it is determined that exiting described pre- for showing When determining the display interface of file, reuse the Crypted password and the predetermined file is encrypted.
According to one embodiment of present invention, there is provided a kind of document encrypting apparatus, including:Acquisition module, in life Before into predetermined file or during generation predetermined file, the Crypted password of input is obtained;Encrypting module, in generation institute When stating predetermined file, the predetermined file is encrypted using the Crypted password.
According to one embodiment of present invention, there is provided a kind of terminal, the terminal include device described above.
According to still another embodiment of the invention, a kind of storage medium is additionally provided.The storage medium is arranged to storage and used In the program code for performing above-mentioned steps.
By the present invention, due to the predetermined file being encrypted while predetermined file is generated, without Perform cryptographic operation again after predetermined file is saved, the security of file has been effectively ensured, effectively solve in correlation technique The problem of security of existing file is low.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, forms the part of the application, this hair Bright schematic description and description is used to explain the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is a kind of hardware block diagram of the mobile terminal of file encrypting method of the embodiment of the present invention;
Fig. 2 is the flow chart of file encrypting method according to embodiments of the present invention;
Fig. 3 is the distribution schematic diagram of infrared ray sensor according to embodiments of the present invention;
Fig. 4 is gesture schematic diagram according to embodiments of the present invention;
Fig. 5 is the encryption block diagram of process of taking pictures according to embodiments of the present invention;
Fig. 6 is the encryption flow figure of process of taking pictures according to embodiments of the present invention;
Fig. 7 is decryption block diagram according to embodiments of the present invention;
Fig. 8 is decryption flow chart according to embodiments of the present invention;
Fig. 9 is encryption according to embodiments of the present invention, decryption gesture sequential schematic;
Figure 10 is the structured flowchart of document encrypting apparatus according to embodiments of the present invention.
Embodiment
Describe the present invention in detail below with reference to accompanying drawing and in conjunction with the embodiments.It should be noted that do not conflicting In the case of, the feature in embodiment and embodiment in the application can be mutually combined.
It should be noted that term " first " in description and claims of this specification and above-mentioned accompanying drawing, " Two " etc. be for distinguishing similar object, without for describing specific order or precedence.
Method provided in the embodiment of the present invention can be in mobile terminal, terminal or similar arithmetic unit Middle execution.Exemplified by running on mobile terminals, Fig. 1 is a kind of mobile terminal of file encrypting method of the embodiment of the present invention Hardware block diagram.As shown in figure 1, mobile terminal 10 can include one or more (one is only shown in Fig. 1) processors 102 (processor 102 can include but is not limited to Micro-processor MCV or PLD FPGA etc. processing unit), for depositing Store up the memory 104 of data and the transmitting device 106 for communication function.It will appreciated by the skilled person that figure Structure shown in 1 is only to illustrate, and it does not cause to limit to the structure of above-mentioned electronic installation.For example, mobile terminal 10 can also wrap Include more either less components than shown in Fig. 1 or there is the configuration different from shown in Fig. 1.
Memory 104 can be used for the software program and module of storage application software, such as the file in the embodiment of the present invention Programmed instruction/module corresponding to encryption method, processor 102 by operation be stored in software program in memory 104 and Module, so as to perform various function application and data processing, that is, realize above-mentioned method.Memory 104 may include at a high speed with Machine memory, may also include nonvolatile memory, as one or more magnetic storage device, flash memory or other it is non-easily The property lost solid-state memory.In some instances, memory 104 can further comprise depositing relative to processor 102 is remotely located Reservoir, these remote memories can pass through network connection to mobile terminal 10.The example of above-mentioned network is including but not limited to mutual Networking, intranet, LAN, mobile radio communication and combinations thereof.
Transmitting device 106 is used to data are received or sent via a network.Above-mentioned network instantiation may include The wireless network that the communication providerses of mobile terminal 10 provide.In an example, transmitting device 106 includes a Network adaptation Device (Network Interface Controller, referred to as NIC), its can be connected by base station with other network equipments so as to It can be communicated with internet.In an example, transmitting device 106 can be that radio frequency (Radio Frequency, is referred to as RF) module, it is used to wirelessly be communicated with internet.
A kind of file encrypting method for running on above-mentioned mobile terminal is provided in the present embodiment, and Fig. 2 is according to this hair The flow chart of the file encrypting method of bright embodiment, as shown in Fig. 2 the flow comprises the following steps:
Step S202, before predetermined file is generated or during generation predetermined file, obtain the Crypted password of input;
Step S204, when generating above-mentioned predetermined file, predetermined file is encrypted using above-mentioned Crypted password.
Wherein, perform aforesaid operations can be terminal.
By above-mentioned steps, due to the predetermined file being encrypted while predetermined file is generated, so as to nothing Cryptographic operation need to be performed again after predetermined file is saved, the security of file has been effectively ensured, has effectively solved correlation technique Present in file security it is low the problem of.
In an optional embodiment, after above-mentioned steps S204, following operation can also carry out:After concealed encrypted Predetermined file.In the present embodiment, the file after encryption can be hidden so that other users can not discover it is pre- Determine the presence of file, further increase the safety coefficient of predetermined file.Certainly, in actual applications, can also be only to predetermined File is encrypted, without being hidden to the predetermined file after encryption, i.e. other users can be aware of depositing for predetermined file , but can not normally open the predetermined file.
In an optional embodiment, the encryption that can obtain input in the following way in above-mentioned steps S202 is close Code:The first gesture that input is obtained using two or more infrared ray sensor is acted;By analog-to-digital conversion by above-mentioned first gesture Action is converted to the first data signal;It is above-mentioned Crypted password to determine above-mentioned first data signal.In the present embodiment, can incite somebody to action The gesture motion of infrared ray sensor capture is converted into Crypted password, wherein, the quantity of the infrared ray sensor in a terminal It can flexibly set, for example, being arranged to four, and be set respectively on four angles of terminal screen, as shown in Figure 3;Or It is arranged to five, can also be in end panel in addition to respectively an infrared ray sensor is set on four angles in terminal screen The middle of curtain sets an infrared ray sensor.In the present embodiment, the action of above-mentioned first gesture can be 8 drawn every sky Word, as shown in figure 4, above-mentioned first data signal can include the data signal of 16 systems.
In an optional embodiment, above-mentioned predetermined file is encrypted using above-mentioned Crypted password including:It is determined that The suffix of the filename of above-mentioned predetermined file;By using the mode that above-mentioned Crypted password is modified to suffix to above-mentioned predetermined File is encrypted.In the present embodiment, after have modified the suffix of filename of above-mentioned predetermined file, above-mentioned predetermined file It can not can normally open, therefore, file can be encrypted by way of the suffix for changing filename.In practical operation In, it can also be encrypted by way of the attribute for changing predetermined file.
In an optional embodiment, after above-mentioned predetermined file is encrypted using above-mentioned Crypted password, on Stating method also includes:Obtain the clear crytpographic key of input;The predetermined file after encryption is decrypted using above-mentioned clear crytpographic key, and Show above-mentioned predetermined file.
In an optional embodiment, obtaining the above-mentioned clear crytpographic key of input includes:It is above-mentioned pre- for storing entering Behind the storage interface for determining file, the above-mentioned clear crytpographic key of input is obtained.For example, when above-mentioned predetermined file is photo, it is above-mentioned to deposit Storage interface can be the picture library in terminal, and into after picture library, clear crytpographic key is inputted on picture library display interface, will can correspond to Encryption file decryption come out and shown.
In an optional embodiment, obtaining the above-mentioned clear crytpographic key of input includes:Passed using two or more infrared ray Sensor obtains the second gesture action of input;Second gesture action is converted to by the second data signal by analog-to-digital conversion;Really Fixed above-mentioned second data signal is clear crytpographic key.In the present embodiment, above-mentioned infrared ray sensor capture hand can also be utilized Gesture is acted, and the gesture motion of capture is converted into clear crytpographic key.
In an optional embodiment, when above-mentioned Crypted password is to being obtained using the above-mentioned infrared ray sensor of two or more During the first data signal that the first gesture action taken is converted to, the sliding path of second gesture action and above-mentioned the The sliding path of one gesture motion is opposite.The safety of file can further be improved by the decryption processing of opposite direction gesture motion Property.
In an optional embodiment, when by using above-mentioned Crypted password to the filename of above-mentioned predetermined file after When sewing the mode modified above-mentioned predetermined file being encrypted, the predetermined file after encryption is solved using clear crytpographic key It is close, and show that above-mentioned predetermined file includes:Recover the suffix of the filename of above-mentioned predetermined file using clear crytpographic key;Display recovers The predetermined file of suffix.
In an optional embodiment, after above-mentioned predetermined file is shown, the above method also includes:When it is determined that exiting During display interface for showing above-mentioned predetermined file, reuse above-mentioned Crypted password and predetermined file is encrypted.At this In embodiment, after user consults predetermined file, and when exiting the storage interface of predetermined file, terminal can be deposited exiting this Above-mentioned predetermined file is encrypted again immediately while storing up interface, and place can be encrypted using original Crypted password Reason.
The present invention will be described so that above-mentioned predetermined file is picture or video file as an example below:
In the present embodiment, operation is encrypted during taking pictures or imaging, encryption is to pass through infrared ray sensor The complicated gesture motion of realization is completed.Also, built-in 4 Minitype infrared line sensors in terminal, by palm every the word of cavitation 8 Image is encrypted mode.8 word figures of generation pass through analog-to-digital conversion into 16 binary digits signals are transformed into, as life Into picture or video file name front two and corresponding suffix name (suffix name that picture or video file can also be only used as).And And in the present embodiment, the picture or video of generation are due to having carried out encryption, so being usually invisible in picture library , the presence that user knows the picture is only corresponded to, before user enters picture library preparation opening encryption picture, phase can be carried out The finger manipulation (that is, decryption oprerations) answered, the operation is received, and is converted into corresponding digital signals, then and has preserved picture Used secret agreement is matched, if unanimously, temporarily removing file designation the first two byte, recovering original file suffixes Name, proper naming file are consulted for user, are finished if consulted, are exited picture library interface, then encryption again immediately.Wherein, When operation is decrypted, it can be decrypted using opposite direction gesture motion, become string number after a series of processing Code, the digital code after inverted sequence arrangement processing, could be compared, security is higher with encryption secret agreement again.
In the present embodiment, the intelligent terminal front panel can built-in 4 infrared ray sensors, as shown in figure 3 above, this 4 Individual infrared ray sensor need to be placed on four angles of the terminal (assuming that the numbering of the infrared ray sensor in the upper left corner is 101, the upper right corner Infrared ray sensor numbering be 102, the numbering of the infrared ray sensor in the lower left corner is 103, the infrared ray sensing in the lower right corner The numbering of device is that 104), when palm (or finger), 101~102~103~104~101 orders are streaked in order, then according to infrared The size of light return value and time, the figure that one palm of generation streaks are as shown in Figure 4.
Infrared gesture principle is illustrated below:The infrared light value that four infrared ray sensors reflect in reception And corresponding time value, and there is maximum sequencing according to infrared light is received, recover the figure that palm streaks.Need to illustrate , the quantity of the infrared ray sensor in above-mentioned terminal and position can flexibly be set, and the image that palm streaks (for example, standardized individual rectangle) can be freely defined, therefore, for single be used for, the image that palm streaks can be only One.
Ciphering process of taking pictures is illustrated with reference to specific embodiment:
A kind of encryption method is provided in the present embodiment, as shown in figure 5, Fig. 5 is process ciphering process schematic diagram of taking pictures.Its In, the process cryptographic operation of taking pictures relates generally to 5 modules, is image sensor module, gesture sensor, A/D moduluss of conversion respectively Block, encryption processing module, memory module, detailed process are as follows:
The first step:Open camera and enter viewfinder mode, gesture sensor, imaging sensor respectively enter mode of operation. User operates the gesture motion of oneself directly over mobile phone screen, for example, draw eight words, draw square, infrared gesture sensor according to The most strong infrared light time order and function order recovery that palmar is returned goes out gesture graph;
Second step:Finger clicks on shoot button, and imaging sensor starts to connect the scenery varying strength light of reception Receive, and be converted into analog electrical signal;
3rd step:Analog image electric signal, the hand signal of simulation enter A/D modular converters, A/D modular converter masters simultaneously If convert analog signals into the data signal for being easy to central processing unit to handle;
4th step:Image digital signal, gesture data signal respectively enter encryption processing module, encryption mould here Block works comprising several aspects, will receive data signal first and optimizes, amplifies, the processing such as amendment, and by complicated number Word arithmetic is converted into can be in the picture signal that display is shown;Secondly:Gesture data signal is converted into specific character code, makees For naming picture files the first two initial or image file suffix name is used as, the picture after being encrypted by gesture is saved in again to be deposited In reservoir, but due to being encrypted, so same gesture decryption personnel are not used, the picture will be can't see.
Fig. 6 is the encryption flow figure of process of taking pictures according to embodiments of the present invention, as shown in fig. 6, comprising the following steps:
Step S600:Start.
Step S601:For camera-enabled, user opens a terminal equipment camera, into viewfinder mode;For shooting Machine function, user are directly entered recording interface.
Step S602:For camera function, viewfinder mode system can give certain stand-by period, the period, hand automatically Gesture sensor is in running order, has monitored whether gesture motion signal, if being directly entered hand signal receiving step, turns To step S603;If not receiving hand signal in stipulated time section, the step S604 that takes pictures is directly entered, for video camera Function, gesture sensor can work asynchronously with imaging sensor.
Step S603:Gesture analog signal will be received by infrared ray sensor to recover, and then carry out specific mould Enter next encryption processing module after number conversion, go to step S606.
Step S604:If not finding that user has any gesture motion, directly taken pictures or video record.
Step S605:Pictorial simulation signal will be received, by analog-to-digital conversion, by a series of digital operations, becomes special Fixed data signal.
Step S606:Then operation is encrypted in the data signal that uses gesture again, and cryptographic operation typical feature here is:Hand The data signal of gesture action output, is converted into 16 system numbers, and then 16 system numbers are as generation picture file name head sum-bits pair The suffix name answered, algorithm here also can customize.
Step S607:Picture preserves into memory after encryption, and flow terminates.
It should be noted that:Above-mentioned gesture is not only applicable to picture, in video, short message, voice call and all It can be applied in cell-phone function operation.
Cryptographic user can also be self-defined, can complexity can be simple, give user to open maximum operating right.
Wherein, for taking pictures because process is very quick, thus take pictures find a view interface system can reserve certain wait when Between, when the stand-by period then, if not receiving any gesture also, then it is assumed that this is taken pictures and not encrypted.For video record, due to The recording process time is long, therefore input gesture and recorded video can carry out simultaneously.
Decrypting process of taking pictures is illustrated with reference to specific embodiment:
In the present embodiment, there is provided a kind of picture decryption method, as shown in fig. 7, Fig. 7 is according to the embodiment of the present invention Picture decrypting process block diagram.
Picture decryption includes 6 parts altogether, is to open picture library respectively, and gesture, gesture sensing module, A/D conversions are drawn every sky Module, picture deciphering module, picture is shown in last memory.User enters terminal memory display interface, Ran Hou first Picture gesture is controlled, gesture sensor is immediately subjected to the infrared light reflected, then according to time order and function order and infrared light The analog signal received is converted into corresponding data signal, picture solution by original figure at strong and weak recovery, A/D modular converters Close module mainly analyzes and processes picture file hit front two, is then compared with acquisition hand signal value, if it does, Picture name is then changed, picture is visible, editable, if inconsistent, picture is not shown, i.e., does not allow user to check mutually inside the Pass Hold.
Fig. 8 is decryption flow chart according to embodiments of the present invention, as shown in figure 8, the flow comprises the following steps:
Step S800, start;
Step S801, user open picture memory;
Step S802:User draws gesture every sky in the air;
Step S803:Gesture sensor will receive hand signal and be converted into electric signal, then be gone out according to electrical signal simulation Corresponding gesture motion, then by gesture motion by A D conversion after, become a succession of data signal;
Step S804:Gesture data signal is received, is rearranged according to inverted order, then becomes 16 system numbers again, finally 16 system numbers of generation are direct to be checked with first two letters, file suffixes name in all picture file names encrypted;
Step S805, if it does, then picture can be shown, operable, if mismatched, picture is not shown, no It can be seen that;
Step S806, flow terminate.
If it should be noted that after being checked after user's opening encryption picture, do not delete, then close memory moment, Picture continues to keep encryption mode.
Fig. 9 is encryption according to embodiments of the present invention, decrypts gesture sequential schematic, wherein, the digitized representation in Fig. 9 is slided Dynamic order, the figure on the left side can be the schematic diagram of encryption in Fig. 9, and the figure on the right can be the schematic diagram of decryption, due to this hair The calculation for the reverse inverted order that APU in bright embodiment uses, therefore user is before browsing pictures or video, If the gesture of input and must encrypt the order used on the contrary, decryption and encryption use gesture completely the same, it fails to match.
Scheme in the embodiment of the present invention is mainly used in encryption of taking pictures:Detailed process is:User opens camera function, so It afterwards in the control specific gesture of picture, then can start to take pictures, take pictures and complete the encrypted preservation of picture, and in memories such as picture libraries In do not show.If user wants to check picture, picture library is opened, then draws same gesture in the air, then can open picture Browsed, or various corresponding operatings.
Method can be applicable to more scene used by the present embodiment, except above-mentioned photograph process encryption, recording regard Frequency process is encrypted, and also short message writing interface, communication process can be applied, such as:When user want using some people's phones as plus Cipher telegram is talked about, and when not wanting to allow other people answer, then gesture password can be set in contact person, when the contact person makes a phone call, Then interface does not show personnel's name, and other users can not approach, and only specific user picks up mobile phone in control picture certain gestures, side It can receive calls.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but a lot In the case of the former be more preferably embodiment.Based on such understanding, technical scheme is substantially in other words to existing The part that technology contributes can be embodied in the form of software product, and the computer software product is stored in a storage In medium (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, calculate Machine, server, or network equipment etc.) perform method described in each embodiment of the present invention.
A kind of document encrypting apparatus is additionally provided in the present embodiment, and the device is used to realize above-described embodiment and preferred reality Mode is applied, had carried out repeating no more for explanation.As used below, term " module " can realize the soft of predetermined function The combination of part and/or hardware.Although device described by following examples is preferably realized with software, hardware, or The realization of the combination of software and hardware is also what may and be contemplated.
Figure 10 is the structured flowchart of document encrypting apparatus according to embodiments of the present invention, and as shown in Figure 10, the device includes Acquisition module 102 and encrypting module 104, are illustrated to the device below:
Acquisition module 102, for before predetermined file is generated or during generation predetermined file, obtaining adding for input Password;Encrypting module 104, above-mentioned acquisition module 102 is connected to, it is close using encrypting for when generating above-mentioned predetermined file Above-mentioned predetermined file is encrypted code.
In an optional embodiment, said apparatus also includes hidden module, for utilizing above-mentioned Crypted password pair After predetermined file is encrypted, it is concealed encrypted after above-mentioned predetermined file.
In an optional embodiment, the encryption that above-mentioned acquisition module 102 can obtain input in the following way is close Code:The first gesture that input is obtained using two or more infrared ray sensor is acted;By analog-to-digital conversion by above-mentioned first gesture Action is converted to the first data signal;It is Crypted password to determine above-mentioned first data signal.
In an optional embodiment, above-mentioned encrypting module 104 can be entered to above-mentioned predetermined file in the following way Row encryption:Determine the suffix of the filename of above-mentioned predetermined file;Above-mentioned suffix is modified by using above-mentioned Crypted password Mode predetermined file is encrypted.
In an optional embodiment, said apparatus also includes deciphering module, for utilizing above-mentioned Crypted password pair After predetermined file is encrypted, the clear crytpographic key of input is obtained;The predetermined file after encryption is entered using above-mentioned clear crytpographic key Row decryption, and show above-mentioned predetermined file.
In an optional embodiment, above-mentioned deciphering module obtains the above-mentioned solution that can obtain input in the following way Password:Entering for after storing the storage interface of above-mentioned predetermined file, obtaining the above-mentioned clear crytpographic key of input.
In an optional embodiment, above-mentioned deciphering module obtains the above-mentioned solution that can obtain input in the following way Password:The second gesture that input is obtained using two or more infrared ray sensor is acted;By analog-to-digital conversion by above-mentioned second Gesture motion is converted to the second data signal;It is above-mentioned clear crytpographic key to determine above-mentioned second data signal.
In an optional embodiment, when above-mentioned Crypted password is to being obtained using two or more infrared ray sensor During the first data signal that first gesture action is converted to, the sliding path and first gesture of above-mentioned second gesture action The sliding path of action is opposite.
In an optional embodiment, when by using the Crypted password to the filename of the predetermined file after When sewing the mode modified the predetermined file being encrypted, above-mentioned deciphering module can utilize decryption in the following way Predetermined file after encryption is decrypted password, and shows that above-mentioned predetermined file includes:Recover pre- using above-mentioned clear crytpographic key Determine the suffix of the filename of file;Display has recovered the above-mentioned predetermined file of suffix.
In an optional embodiment, above-mentioned encrypting module 104 is additionally operable to after above-mentioned predetermined file is shown, when true When exiting the display interface for showing above-mentioned predetermined file surely, reuse above-mentioned Crypted password and above-mentioned predetermined file is carried out Encryption.
According to one embodiment of present invention, a kind of terminal is additionally provided, the terminal includes above-mentioned document encrypting apparatus.
It should be noted that above-mentioned modules can be realized by software or hardware, for the latter, Ke Yitong Cross in the following manner realization, but not limited to this:Above-mentioned module is respectively positioned in same processor;Or above-mentioned modules are with any The form of combination is located in different processors respectively.
Embodiments of the invention additionally provide a kind of storage medium.Alternatively, in the present embodiment, above-mentioned storage medium can The program code for performing each step in above method embodiment to be arranged to storage to be used for.
Alternatively, in the present embodiment, above-mentioned storage medium can include but is not limited to:USB flash disk, read-only storage (Read- Only Memory, referred to as ROM), it is random access memory (Random Access Memory, referred to as RAM), mobile hard Disk, magnetic disc or CD etc. are various can be with the medium of store program codes.
Alternatively, in the present embodiment, processor performs above-mentioned each side according to the program code stored in storage medium Step in method embodiment.
Alternatively, the specific example in the present embodiment may be referred to described in above-described embodiment and optional embodiment Example, the present embodiment will not be repeated here.
Obviously, those skilled in the art should be understood that above-mentioned each module of the invention or each step can be with general Computing device realize that they can be concentrated on single computing device, or be distributed in multiple computing devices and formed Network on, alternatively, they can be realized with the program code that computing device can perform, it is thus possible to they are stored Performed in the storage device by computing device, and in some cases, can be with different from shown in order execution herein The step of going out or describing, they are either fabricated to each integrated circuit modules respectively or by multiple modules in them or Step is fabricated to single integrated circuit module to realize.So, the present invention is not restricted to any specific hardware and software combination.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should be included in the scope of the protection.

Claims (12)

  1. A kind of 1. file encrypting method, it is characterised in that including:
    Before predetermined file is generated or during generation predetermined file, the Crypted password of input is obtained;
    When generating the predetermined file, the predetermined file is encrypted using the Crypted password.
  2. 2. according to the method for claim 1, it is characterised in that the predetermined file is being carried out using the Crypted password After encryption, methods described also includes:
    The predetermined file after concealed encrypted.
  3. 3. according to the method for claim 1, it is characterised in that obtaining the Crypted password of input includes:
    The first gesture that input is obtained using two or more infrared ray sensor is acted;
    First gesture action is converted to by the first data signal by analog-to-digital conversion;
    It is the Crypted password to determine first data signal.
  4. 4. according to the method for claim 1, it is characterised in that the predetermined file is added using the Crypted password It is close including:
    Determine the suffix of the filename of the predetermined file;
    The predetermined file is encrypted the mode that the suffix is modified by using the Crypted password.
  5. 5. method according to any one of claim 1 to 4, it is characterised in that utilizing the Crypted password to described After predetermined file is encrypted, methods described also includes:
    Obtain the clear crytpographic key of input;
    The predetermined file after encryption is decrypted using the clear crytpographic key, and shows the predetermined file.
  6. 6. according to the method for claim 5, it is characterised in that obtaining the clear crytpographic key of input includes:
    Entering for after storing the storage interface of the predetermined file, obtaining the clear crytpographic key of input.
  7. 7. according to the method for claim 5, it is characterised in that obtaining the clear crytpographic key of input includes:
    The second gesture that input is obtained using two or more infrared ray sensor is acted;
    Second gesture action is converted to by the second data signal by analog-to-digital conversion;
    It is the clear crytpographic key to determine second data signal.
  8. 8. according to the method for claim 7, it is characterised in that when the Crypted password is red described in two or more to utilizing During the first data signal that the first gesture action that outside line sensor obtains is converted to, the cunning of the second gesture action Dynamic path is opposite with the sliding path that the first gesture acts.
  9. 9. according to the method for claim 5, it is characterised in that when by using the Crypted password to the predetermined file The mode modified of suffix of filename when the predetermined file is encrypted, using the clear crytpographic key to encryption after The predetermined file be decrypted, and show that the predetermined file includes:
    Recover the suffix of the filename of the predetermined file using the clear crytpographic key;
    Display has recovered the predetermined file of suffix.
  10. 10. according to the method for claim 5, it is characterised in that after the predetermined file is shown, methods described is also wrapped Include:
    When it is determined that exiting the display interface for showing the predetermined file, the Crypted password is reused to described predetermined File is encrypted.
  11. A kind of 11. document encrypting apparatus, it is characterised in that including:
    Acquisition module, for before predetermined file is generated or during generation predetermined file, obtaining the Crypted password of input;
    Encrypting module, for when generating the predetermined file, the predetermined file to be encrypted using the Crypted password.
  12. 12. a kind of terminal, it is characterised in that including the device described in claim 11.
CN201610343947.1A 2016-05-23 2016-05-23 File encrypting method, device and terminal Pending CN107423628A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610343947.1A CN107423628A (en) 2016-05-23 2016-05-23 File encrypting method, device and terminal
PCT/CN2016/108608 WO2017201999A1 (en) 2016-05-23 2016-12-05 File encryption method, device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610343947.1A CN107423628A (en) 2016-05-23 2016-05-23 File encrypting method, device and terminal

Publications (1)

Publication Number Publication Date
CN107423628A true CN107423628A (en) 2017-12-01

Family

ID=60411048

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610343947.1A Pending CN107423628A (en) 2016-05-23 2016-05-23 File encrypting method, device and terminal

Country Status (2)

Country Link
CN (1) CN107423628A (en)
WO (1) WO2017201999A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287733A (en) * 2019-06-05 2019-09-27 杭州迪普科技股份有限公司 A kind of file tamper resistant method and device
CN111967032A (en) * 2020-08-27 2020-11-20 长城计算机软件与***有限公司 File encryption method and decryption method based on obfuscation processing

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111552938B (en) * 2020-04-29 2024-03-15 上海明略人工智能(集团)有限公司 File encryption method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101295341A (en) * 2008-06-25 2008-10-29 腾讯科技(深圳)有限公司 Portable equipment and data protection method thereof
CN103699847A (en) * 2013-11-29 2014-04-02 上海合合信息科技发展有限公司 Fingerprint encryption method and device, and encrypted shooting method and device
CN104978541A (en) * 2015-04-28 2015-10-14 努比亚技术有限公司 Method and apparatus for hiding audio/video file
CN105426746A (en) * 2015-10-30 2016-03-23 努比亚技术有限公司 Password setting apparatus and method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287733A (en) * 2019-06-05 2019-09-27 杭州迪普科技股份有限公司 A kind of file tamper resistant method and device
CN111967032A (en) * 2020-08-27 2020-11-20 长城计算机软件与***有限公司 File encryption method and decryption method based on obfuscation processing
CN111967032B (en) * 2020-08-27 2023-08-25 长城计算机软件与***有限公司 File encryption method and decryption method based on confusion processing

Also Published As

Publication number Publication date
WO2017201999A1 (en) 2017-11-30

Similar Documents

Publication Publication Date Title
CN104933342B (en) A kind of picture inspection method and mobile terminal
CN104967511B (en) The processing method and processing device of encryption data
CN104040934B (en) Image privacy is protected when being manipulated by cloud service
CN105069075B (en) Photo be shared method and apparatus
EP1914961B1 (en) Mobile information terminal apparatus
WO2008010275A1 (en) Medium data processing device and medium data processing method
CN115810208A (en) Face recognition method, device and system
CN104732158A (en) Encryption photographing method, system and device
CN107423628A (en) File encrypting method, device and terminal
CN103077357A (en) Method for storing private files
CN106161947A (en) Photo encryption method and system for camera terminal
CN105281907A (en) Encrypted data processing method and apparatus
CN110213458A (en) A kind of image processing method, device and storage medium
CN109246110A (en) data sharing method and device
JP7278345B2 (en) Mobile terminal privacy protection method and protection device, and mobile terminal
CN106101140B (en) A kind of method and server of authentification of message
CN105681365B (en) Method and apparatus for file transmission
CN108540591B (en) Address book management method, address book management device and electronic equipment
CN103780756B (en) The method of client identification card data secrecy and mobile terminal thereof
EP3915221B1 (en) Offline interception-free interaction with a cryptocurrency network using a network-disabled device
CN111581622A (en) Information processing method and device and electronic equipment
CN110190947B (en) Information encryption and decryption method, terminal and computer readable storage medium
US20150156173A1 (en) Communication system utilizing fingerprint information and use thereof
CN107292133A (en) The obfuscation method and device of artificial intelligence
US20080052531A1 (en) Device and Method for Secure Biometric Applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20171201

WD01 Invention patent application deemed withdrawn after publication