CN107423628A - File encrypting method, device and terminal - Google Patents
File encrypting method, device and terminal Download PDFInfo
- Publication number
- CN107423628A CN107423628A CN201610343947.1A CN201610343947A CN107423628A CN 107423628 A CN107423628 A CN 107423628A CN 201610343947 A CN201610343947 A CN 201610343947A CN 107423628 A CN107423628 A CN 107423628A
- Authority
- CN
- China
- Prior art keywords
- predetermined file
- file
- crypted password
- encrypted
- mentioned
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04883—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Storage Device Security (AREA)
- Telephone Function (AREA)
Abstract
The invention provides a kind of file encrypting method, device and terminal, wherein, this method includes:Before predetermined file is generated or during generation predetermined file, the Crypted password of input is obtained;When generating above-mentioned predetermined file, predetermined file is encrypted using above-mentioned Crypted password.By the invention it is possible to ensure the security of file, effectively solve the problems, such as that the security of file present in correlation technique is low.
Description
Technical field
The present invention relates to the communications field, in particular to a kind of file encrypting method, device and terminal.
Background technology
With the development of science and technology, the application of intelligent terminal is more next universal, substantially every household is all using, below with intelligence
Illustrated exemplified by camera function in energy mobile phone:In modern science and technology, the application on smart mobile phone is more and more, wherein, intelligence
Camera in energy mobile phone can substantially replace the function of special digital camera, the photo meeting stored in smart mobile phone
More and more, that mobile phone takes pictures and preserved safetyAnswer whether, have many people because mobile phone lose, cause photo to be revealed,
Or photo is illegally obtained by other people, and cause the big damage of reputation, and thus caused associated loss is also very big.
It in current shooting technology, will not be encrypted during taking pictures, usually take pictures completion simultaneously
And photo is saved in after memory and just can suitably be encrypted, so as to realize in photo has clapped ciphering process
The secrecy processing of photo;Also, current primary encryption mode is encrypting fingerprint, and encrypting fingerprint is not tight enough, mobile phone
Upper registered all fingerprints can be decrypted, without uniqueness.
In addition to above-mentioned photo, video, short message or other files of storage in the terminal in terminal are all desirable
Complete creating and can be just encrypted after storage, so as to cause the security of file than relatively low.
For above mentioned problem present in correlation technique, effective solution is not yet proposed at present.
The content of the invention
The embodiments of the invention provide a kind of file encrypting method, device and terminal, at least to solve to deposit in correlation technique
File security it is low the problem of.
According to one embodiment of present invention, there is provided a kind of file encrypting method, including:Before predetermined file is generated
Or during generation predetermined file, obtain the Crypted password of input;It is close using the encryption when generating the predetermined file
The predetermined file is encrypted code.
Alternatively, after the predetermined file is encrypted using the Crypted password, methods described also includes:It is hidden
Hide the predetermined file after encryption.
Alternatively, obtaining the Crypted password of input includes:The first of input is obtained using two or more infrared ray sensor
Gesture motion;First gesture action is converted to by the first data signal by analog-to-digital conversion;Determine the first numeral letter
Number it is the Crypted password.
Alternatively, the predetermined file is encrypted using the Crypted password including:Determine the predetermined file
The suffix of filename;The mode that the suffix is modified is added to the predetermined file by using the Crypted password
It is close.
Alternatively, after the predetermined file is encrypted using the Crypted password, methods described also includes:Obtain
Take the clear crytpographic key of input;The predetermined file after encryption is decrypted using the clear crytpographic key, and shown described pre-
Determine file.
Alternatively, obtaining the clear crytpographic key of input includes:Entering storage circle for storing the predetermined file
Behind face, the clear crytpographic key of input is obtained.
Alternatively, obtaining the clear crytpographic key of input includes:Input is obtained using two or more infrared ray sensor
Second gesture acts;Second gesture action is converted to by the second data signal by analog-to-digital conversion;Determine second number
Word signal is the clear crytpographic key.
Alternatively, when the Crypted password is that the first gesture obtained using infrared ray sensor described in two or more is moved
During the first data signal being converted to, sliding path and the first gesture action of the second gesture action
Sliding path is opposite.
Alternatively, when the side to be modified by using the Crypted password to the suffix of the filename of the predetermined file
When the predetermined file is encrypted formula, the predetermined file after encryption is decrypted using the clear crytpographic key, and
Show that the predetermined file includes:Recover the suffix of the filename of the predetermined file using the clear crytpographic key;Display recovers
The predetermined file of suffix.
Alternatively, after the predetermined file is shown, methods described also includes:When it is determined that exiting described pre- for showing
When determining the display interface of file, reuse the Crypted password and the predetermined file is encrypted.
According to one embodiment of present invention, there is provided a kind of document encrypting apparatus, including:Acquisition module, in life
Before into predetermined file or during generation predetermined file, the Crypted password of input is obtained;Encrypting module, in generation institute
When stating predetermined file, the predetermined file is encrypted using the Crypted password.
According to one embodiment of present invention, there is provided a kind of terminal, the terminal include device described above.
According to still another embodiment of the invention, a kind of storage medium is additionally provided.The storage medium is arranged to storage and used
In the program code for performing above-mentioned steps.
By the present invention, due to the predetermined file being encrypted while predetermined file is generated, without
Perform cryptographic operation again after predetermined file is saved, the security of file has been effectively ensured, effectively solve in correlation technique
The problem of security of existing file is low.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, forms the part of the application, this hair
Bright schematic description and description is used to explain the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is a kind of hardware block diagram of the mobile terminal of file encrypting method of the embodiment of the present invention;
Fig. 2 is the flow chart of file encrypting method according to embodiments of the present invention;
Fig. 3 is the distribution schematic diagram of infrared ray sensor according to embodiments of the present invention;
Fig. 4 is gesture schematic diagram according to embodiments of the present invention;
Fig. 5 is the encryption block diagram of process of taking pictures according to embodiments of the present invention;
Fig. 6 is the encryption flow figure of process of taking pictures according to embodiments of the present invention;
Fig. 7 is decryption block diagram according to embodiments of the present invention;
Fig. 8 is decryption flow chart according to embodiments of the present invention;
Fig. 9 is encryption according to embodiments of the present invention, decryption gesture sequential schematic;
Figure 10 is the structured flowchart of document encrypting apparatus according to embodiments of the present invention.
Embodiment
Describe the present invention in detail below with reference to accompanying drawing and in conjunction with the embodiments.It should be noted that do not conflicting
In the case of, the feature in embodiment and embodiment in the application can be mutually combined.
It should be noted that term " first " in description and claims of this specification and above-mentioned accompanying drawing, "
Two " etc. be for distinguishing similar object, without for describing specific order or precedence.
Method provided in the embodiment of the present invention can be in mobile terminal, terminal or similar arithmetic unit
Middle execution.Exemplified by running on mobile terminals, Fig. 1 is a kind of mobile terminal of file encrypting method of the embodiment of the present invention
Hardware block diagram.As shown in figure 1, mobile terminal 10 can include one or more (one is only shown in Fig. 1) processors 102
(processor 102 can include but is not limited to Micro-processor MCV or PLD FPGA etc. processing unit), for depositing
Store up the memory 104 of data and the transmitting device 106 for communication function.It will appreciated by the skilled person that figure
Structure shown in 1 is only to illustrate, and it does not cause to limit to the structure of above-mentioned electronic installation.For example, mobile terminal 10 can also wrap
Include more either less components than shown in Fig. 1 or there is the configuration different from shown in Fig. 1.
Memory 104 can be used for the software program and module of storage application software, such as the file in the embodiment of the present invention
Programmed instruction/module corresponding to encryption method, processor 102 by operation be stored in software program in memory 104 and
Module, so as to perform various function application and data processing, that is, realize above-mentioned method.Memory 104 may include at a high speed with
Machine memory, may also include nonvolatile memory, as one or more magnetic storage device, flash memory or other it is non-easily
The property lost solid-state memory.In some instances, memory 104 can further comprise depositing relative to processor 102 is remotely located
Reservoir, these remote memories can pass through network connection to mobile terminal 10.The example of above-mentioned network is including but not limited to mutual
Networking, intranet, LAN, mobile radio communication and combinations thereof.
Transmitting device 106 is used to data are received or sent via a network.Above-mentioned network instantiation may include
The wireless network that the communication providerses of mobile terminal 10 provide.In an example, transmitting device 106 includes a Network adaptation
Device (Network Interface Controller, referred to as NIC), its can be connected by base station with other network equipments so as to
It can be communicated with internet.In an example, transmitting device 106 can be that radio frequency (Radio Frequency, is referred to as
RF) module, it is used to wirelessly be communicated with internet.
A kind of file encrypting method for running on above-mentioned mobile terminal is provided in the present embodiment, and Fig. 2 is according to this hair
The flow chart of the file encrypting method of bright embodiment, as shown in Fig. 2 the flow comprises the following steps:
Step S202, before predetermined file is generated or during generation predetermined file, obtain the Crypted password of input;
Step S204, when generating above-mentioned predetermined file, predetermined file is encrypted using above-mentioned Crypted password.
Wherein, perform aforesaid operations can be terminal.
By above-mentioned steps, due to the predetermined file being encrypted while predetermined file is generated, so as to nothing
Cryptographic operation need to be performed again after predetermined file is saved, the security of file has been effectively ensured, has effectively solved correlation technique
Present in file security it is low the problem of.
In an optional embodiment, after above-mentioned steps S204, following operation can also carry out:After concealed encrypted
Predetermined file.In the present embodiment, the file after encryption can be hidden so that other users can not discover it is pre-
Determine the presence of file, further increase the safety coefficient of predetermined file.Certainly, in actual applications, can also be only to predetermined
File is encrypted, without being hidden to the predetermined file after encryption, i.e. other users can be aware of depositing for predetermined file
, but can not normally open the predetermined file.
In an optional embodiment, the encryption that can obtain input in the following way in above-mentioned steps S202 is close
Code:The first gesture that input is obtained using two or more infrared ray sensor is acted;By analog-to-digital conversion by above-mentioned first gesture
Action is converted to the first data signal;It is above-mentioned Crypted password to determine above-mentioned first data signal.In the present embodiment, can incite somebody to action
The gesture motion of infrared ray sensor capture is converted into Crypted password, wherein, the quantity of the infrared ray sensor in a terminal
It can flexibly set, for example, being arranged to four, and be set respectively on four angles of terminal screen, as shown in Figure 3;Or
It is arranged to five, can also be in end panel in addition to respectively an infrared ray sensor is set on four angles in terminal screen
The middle of curtain sets an infrared ray sensor.In the present embodiment, the action of above-mentioned first gesture can be 8 drawn every sky
Word, as shown in figure 4, above-mentioned first data signal can include the data signal of 16 systems.
In an optional embodiment, above-mentioned predetermined file is encrypted using above-mentioned Crypted password including:It is determined that
The suffix of the filename of above-mentioned predetermined file;By using the mode that above-mentioned Crypted password is modified to suffix to above-mentioned predetermined
File is encrypted.In the present embodiment, after have modified the suffix of filename of above-mentioned predetermined file, above-mentioned predetermined file
It can not can normally open, therefore, file can be encrypted by way of the suffix for changing filename.In practical operation
In, it can also be encrypted by way of the attribute for changing predetermined file.
In an optional embodiment, after above-mentioned predetermined file is encrypted using above-mentioned Crypted password, on
Stating method also includes:Obtain the clear crytpographic key of input;The predetermined file after encryption is decrypted using above-mentioned clear crytpographic key, and
Show above-mentioned predetermined file.
In an optional embodiment, obtaining the above-mentioned clear crytpographic key of input includes:It is above-mentioned pre- for storing entering
Behind the storage interface for determining file, the above-mentioned clear crytpographic key of input is obtained.For example, when above-mentioned predetermined file is photo, it is above-mentioned to deposit
Storage interface can be the picture library in terminal, and into after picture library, clear crytpographic key is inputted on picture library display interface, will can correspond to
Encryption file decryption come out and shown.
In an optional embodiment, obtaining the above-mentioned clear crytpographic key of input includes:Passed using two or more infrared ray
Sensor obtains the second gesture action of input;Second gesture action is converted to by the second data signal by analog-to-digital conversion;Really
Fixed above-mentioned second data signal is clear crytpographic key.In the present embodiment, above-mentioned infrared ray sensor capture hand can also be utilized
Gesture is acted, and the gesture motion of capture is converted into clear crytpographic key.
In an optional embodiment, when above-mentioned Crypted password is to being obtained using the above-mentioned infrared ray sensor of two or more
During the first data signal that the first gesture action taken is converted to, the sliding path of second gesture action and above-mentioned the
The sliding path of one gesture motion is opposite.The safety of file can further be improved by the decryption processing of opposite direction gesture motion
Property.
In an optional embodiment, when by using above-mentioned Crypted password to the filename of above-mentioned predetermined file after
When sewing the mode modified above-mentioned predetermined file being encrypted, the predetermined file after encryption is solved using clear crytpographic key
It is close, and show that above-mentioned predetermined file includes:Recover the suffix of the filename of above-mentioned predetermined file using clear crytpographic key;Display recovers
The predetermined file of suffix.
In an optional embodiment, after above-mentioned predetermined file is shown, the above method also includes:When it is determined that exiting
During display interface for showing above-mentioned predetermined file, reuse above-mentioned Crypted password and predetermined file is encrypted.At this
In embodiment, after user consults predetermined file, and when exiting the storage interface of predetermined file, terminal can be deposited exiting this
Above-mentioned predetermined file is encrypted again immediately while storing up interface, and place can be encrypted using original Crypted password
Reason.
The present invention will be described so that above-mentioned predetermined file is picture or video file as an example below:
In the present embodiment, operation is encrypted during taking pictures or imaging, encryption is to pass through infrared ray sensor
The complicated gesture motion of realization is completed.Also, built-in 4 Minitype infrared line sensors in terminal, by palm every the word of cavitation 8
Image is encrypted mode.8 word figures of generation pass through analog-to-digital conversion into 16 binary digits signals are transformed into, as life
Into picture or video file name front two and corresponding suffix name (suffix name that picture or video file can also be only used as).And
And in the present embodiment, the picture or video of generation are due to having carried out encryption, so being usually invisible in picture library
, the presence that user knows the picture is only corresponded to, before user enters picture library preparation opening encryption picture, phase can be carried out
The finger manipulation (that is, decryption oprerations) answered, the operation is received, and is converted into corresponding digital signals, then and has preserved picture
Used secret agreement is matched, if unanimously, temporarily removing file designation the first two byte, recovering original file suffixes
Name, proper naming file are consulted for user, are finished if consulted, are exited picture library interface, then encryption again immediately.Wherein,
When operation is decrypted, it can be decrypted using opposite direction gesture motion, become string number after a series of processing
Code, the digital code after inverted sequence arrangement processing, could be compared, security is higher with encryption secret agreement again.
In the present embodiment, the intelligent terminal front panel can built-in 4 infrared ray sensors, as shown in figure 3 above, this 4
Individual infrared ray sensor need to be placed on four angles of the terminal (assuming that the numbering of the infrared ray sensor in the upper left corner is 101, the upper right corner
Infrared ray sensor numbering be 102, the numbering of the infrared ray sensor in the lower left corner is 103, the infrared ray sensing in the lower right corner
The numbering of device is that 104), when palm (or finger), 101~102~103~104~101 orders are streaked in order, then according to infrared
The size of light return value and time, the figure that one palm of generation streaks are as shown in Figure 4.
Infrared gesture principle is illustrated below:The infrared light value that four infrared ray sensors reflect in reception
And corresponding time value, and there is maximum sequencing according to infrared light is received, recover the figure that palm streaks.Need to illustrate
, the quantity of the infrared ray sensor in above-mentioned terminal and position can flexibly be set, and the image that palm streaks
(for example, standardized individual rectangle) can be freely defined, therefore, for single be used for, the image that palm streaks can be only
One.
Ciphering process of taking pictures is illustrated with reference to specific embodiment:
A kind of encryption method is provided in the present embodiment, as shown in figure 5, Fig. 5 is process ciphering process schematic diagram of taking pictures.Its
In, the process cryptographic operation of taking pictures relates generally to 5 modules, is image sensor module, gesture sensor, A/D moduluss of conversion respectively
Block, encryption processing module, memory module, detailed process are as follows:
The first step:Open camera and enter viewfinder mode, gesture sensor, imaging sensor respectively enter mode of operation.
User operates the gesture motion of oneself directly over mobile phone screen, for example, draw eight words, draw square, infrared gesture sensor according to
The most strong infrared light time order and function order recovery that palmar is returned goes out gesture graph;
Second step:Finger clicks on shoot button, and imaging sensor starts to connect the scenery varying strength light of reception
Receive, and be converted into analog electrical signal;
3rd step:Analog image electric signal, the hand signal of simulation enter A/D modular converters, A/D modular converter masters simultaneously
If convert analog signals into the data signal for being easy to central processing unit to handle;
4th step:Image digital signal, gesture data signal respectively enter encryption processing module, encryption mould here
Block works comprising several aspects, will receive data signal first and optimizes, amplifies, the processing such as amendment, and by complicated number
Word arithmetic is converted into can be in the picture signal that display is shown;Secondly:Gesture data signal is converted into specific character code, makees
For naming picture files the first two initial or image file suffix name is used as, the picture after being encrypted by gesture is saved in again to be deposited
In reservoir, but due to being encrypted, so same gesture decryption personnel are not used, the picture will be can't see.
Fig. 6 is the encryption flow figure of process of taking pictures according to embodiments of the present invention, as shown in fig. 6, comprising the following steps:
Step S600:Start.
Step S601:For camera-enabled, user opens a terminal equipment camera, into viewfinder mode;For shooting
Machine function, user are directly entered recording interface.
Step S602:For camera function, viewfinder mode system can give certain stand-by period, the period, hand automatically
Gesture sensor is in running order, has monitored whether gesture motion signal, if being directly entered hand signal receiving step, turns
To step S603;If not receiving hand signal in stipulated time section, the step S604 that takes pictures is directly entered, for video camera
Function, gesture sensor can work asynchronously with imaging sensor.
Step S603:Gesture analog signal will be received by infrared ray sensor to recover, and then carry out specific mould
Enter next encryption processing module after number conversion, go to step S606.
Step S604:If not finding that user has any gesture motion, directly taken pictures or video record.
Step S605:Pictorial simulation signal will be received, by analog-to-digital conversion, by a series of digital operations, becomes special
Fixed data signal.
Step S606:Then operation is encrypted in the data signal that uses gesture again, and cryptographic operation typical feature here is:Hand
The data signal of gesture action output, is converted into 16 system numbers, and then 16 system numbers are as generation picture file name head sum-bits pair
The suffix name answered, algorithm here also can customize.
Step S607:Picture preserves into memory after encryption, and flow terminates.
It should be noted that:Above-mentioned gesture is not only applicable to picture, in video, short message, voice call and all
It can be applied in cell-phone function operation.
Cryptographic user can also be self-defined, can complexity can be simple, give user to open maximum operating right.
Wherein, for taking pictures because process is very quick, thus take pictures find a view interface system can reserve certain wait when
Between, when the stand-by period then, if not receiving any gesture also, then it is assumed that this is taken pictures and not encrypted.For video record, due to
The recording process time is long, therefore input gesture and recorded video can carry out simultaneously.
Decrypting process of taking pictures is illustrated with reference to specific embodiment:
In the present embodiment, there is provided a kind of picture decryption method, as shown in fig. 7, Fig. 7 is according to the embodiment of the present invention
Picture decrypting process block diagram.
Picture decryption includes 6 parts altogether, is to open picture library respectively, and gesture, gesture sensing module, A/D conversions are drawn every sky
Module, picture deciphering module, picture is shown in last memory.User enters terminal memory display interface, Ran Hou first
Picture gesture is controlled, gesture sensor is immediately subjected to the infrared light reflected, then according to time order and function order and infrared light
The analog signal received is converted into corresponding data signal, picture solution by original figure at strong and weak recovery, A/D modular converters
Close module mainly analyzes and processes picture file hit front two, is then compared with acquisition hand signal value, if it does,
Picture name is then changed, picture is visible, editable, if inconsistent, picture is not shown, i.e., does not allow user to check mutually inside the Pass
Hold.
Fig. 8 is decryption flow chart according to embodiments of the present invention, as shown in figure 8, the flow comprises the following steps:
Step S800, start;
Step S801, user open picture memory;
Step S802:User draws gesture every sky in the air;
Step S803:Gesture sensor will receive hand signal and be converted into electric signal, then be gone out according to electrical signal simulation
Corresponding gesture motion, then by gesture motion by A D conversion after, become a succession of data signal;
Step S804:Gesture data signal is received, is rearranged according to inverted order, then becomes 16 system numbers again, finally
16 system numbers of generation are direct to be checked with first two letters, file suffixes name in all picture file names encrypted;
Step S805, if it does, then picture can be shown, operable, if mismatched, picture is not shown, no
It can be seen that;
Step S806, flow terminate.
If it should be noted that after being checked after user's opening encryption picture, do not delete, then close memory moment,
Picture continues to keep encryption mode.
Fig. 9 is encryption according to embodiments of the present invention, decrypts gesture sequential schematic, wherein, the digitized representation in Fig. 9 is slided
Dynamic order, the figure on the left side can be the schematic diagram of encryption in Fig. 9, and the figure on the right can be the schematic diagram of decryption, due to this hair
The calculation for the reverse inverted order that APU in bright embodiment uses, therefore user is before browsing pictures or video,
If the gesture of input and must encrypt the order used on the contrary, decryption and encryption use gesture completely the same, it fails to match.
Scheme in the embodiment of the present invention is mainly used in encryption of taking pictures:Detailed process is:User opens camera function, so
It afterwards in the control specific gesture of picture, then can start to take pictures, take pictures and complete the encrypted preservation of picture, and in memories such as picture libraries
In do not show.If user wants to check picture, picture library is opened, then draws same gesture in the air, then can open picture
Browsed, or various corresponding operatings.
Method can be applicable to more scene used by the present embodiment, except above-mentioned photograph process encryption, recording regard
Frequency process is encrypted, and also short message writing interface, communication process can be applied, such as:When user want using some people's phones as plus
Cipher telegram is talked about, and when not wanting to allow other people answer, then gesture password can be set in contact person, when the contact person makes a phone call,
Then interface does not show personnel's name, and other users can not approach, and only specific user picks up mobile phone in control picture certain gestures, side
It can receive calls.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation
The method of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but a lot
In the case of the former be more preferably embodiment.Based on such understanding, technical scheme is substantially in other words to existing
The part that technology contributes can be embodied in the form of software product, and the computer software product is stored in a storage
In medium (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, calculate
Machine, server, or network equipment etc.) perform method described in each embodiment of the present invention.
A kind of document encrypting apparatus is additionally provided in the present embodiment, and the device is used to realize above-described embodiment and preferred reality
Mode is applied, had carried out repeating no more for explanation.As used below, term " module " can realize the soft of predetermined function
The combination of part and/or hardware.Although device described by following examples is preferably realized with software, hardware, or
The realization of the combination of software and hardware is also what may and be contemplated.
Figure 10 is the structured flowchart of document encrypting apparatus according to embodiments of the present invention, and as shown in Figure 10, the device includes
Acquisition module 102 and encrypting module 104, are illustrated to the device below:
Acquisition module 102, for before predetermined file is generated or during generation predetermined file, obtaining adding for input
Password;Encrypting module 104, above-mentioned acquisition module 102 is connected to, it is close using encrypting for when generating above-mentioned predetermined file
Above-mentioned predetermined file is encrypted code.
In an optional embodiment, said apparatus also includes hidden module, for utilizing above-mentioned Crypted password pair
After predetermined file is encrypted, it is concealed encrypted after above-mentioned predetermined file.
In an optional embodiment, the encryption that above-mentioned acquisition module 102 can obtain input in the following way is close
Code:The first gesture that input is obtained using two or more infrared ray sensor is acted;By analog-to-digital conversion by above-mentioned first gesture
Action is converted to the first data signal;It is Crypted password to determine above-mentioned first data signal.
In an optional embodiment, above-mentioned encrypting module 104 can be entered to above-mentioned predetermined file in the following way
Row encryption:Determine the suffix of the filename of above-mentioned predetermined file;Above-mentioned suffix is modified by using above-mentioned Crypted password
Mode predetermined file is encrypted.
In an optional embodiment, said apparatus also includes deciphering module, for utilizing above-mentioned Crypted password pair
After predetermined file is encrypted, the clear crytpographic key of input is obtained;The predetermined file after encryption is entered using above-mentioned clear crytpographic key
Row decryption, and show above-mentioned predetermined file.
In an optional embodiment, above-mentioned deciphering module obtains the above-mentioned solution that can obtain input in the following way
Password:Entering for after storing the storage interface of above-mentioned predetermined file, obtaining the above-mentioned clear crytpographic key of input.
In an optional embodiment, above-mentioned deciphering module obtains the above-mentioned solution that can obtain input in the following way
Password:The second gesture that input is obtained using two or more infrared ray sensor is acted;By analog-to-digital conversion by above-mentioned second
Gesture motion is converted to the second data signal;It is above-mentioned clear crytpographic key to determine above-mentioned second data signal.
In an optional embodiment, when above-mentioned Crypted password is to being obtained using two or more infrared ray sensor
During the first data signal that first gesture action is converted to, the sliding path and first gesture of above-mentioned second gesture action
The sliding path of action is opposite.
In an optional embodiment, when by using the Crypted password to the filename of the predetermined file after
When sewing the mode modified the predetermined file being encrypted, above-mentioned deciphering module can utilize decryption in the following way
Predetermined file after encryption is decrypted password, and shows that above-mentioned predetermined file includes:Recover pre- using above-mentioned clear crytpographic key
Determine the suffix of the filename of file;Display has recovered the above-mentioned predetermined file of suffix.
In an optional embodiment, above-mentioned encrypting module 104 is additionally operable to after above-mentioned predetermined file is shown, when true
When exiting the display interface for showing above-mentioned predetermined file surely, reuse above-mentioned Crypted password and above-mentioned predetermined file is carried out
Encryption.
According to one embodiment of present invention, a kind of terminal is additionally provided, the terminal includes above-mentioned document encrypting apparatus.
It should be noted that above-mentioned modules can be realized by software or hardware, for the latter, Ke Yitong
Cross in the following manner realization, but not limited to this:Above-mentioned module is respectively positioned in same processor;Or above-mentioned modules are with any
The form of combination is located in different processors respectively.
Embodiments of the invention additionally provide a kind of storage medium.Alternatively, in the present embodiment, above-mentioned storage medium can
The program code for performing each step in above method embodiment to be arranged to storage to be used for.
Alternatively, in the present embodiment, above-mentioned storage medium can include but is not limited to:USB flash disk, read-only storage (Read-
Only Memory, referred to as ROM), it is random access memory (Random Access Memory, referred to as RAM), mobile hard
Disk, magnetic disc or CD etc. are various can be with the medium of store program codes.
Alternatively, in the present embodiment, processor performs above-mentioned each side according to the program code stored in storage medium
Step in method embodiment.
Alternatively, the specific example in the present embodiment may be referred to described in above-described embodiment and optional embodiment
Example, the present embodiment will not be repeated here.
Obviously, those skilled in the art should be understood that above-mentioned each module of the invention or each step can be with general
Computing device realize that they can be concentrated on single computing device, or be distributed in multiple computing devices and formed
Network on, alternatively, they can be realized with the program code that computing device can perform, it is thus possible to they are stored
Performed in the storage device by computing device, and in some cases, can be with different from shown in order execution herein
The step of going out or describing, they are either fabricated to each integrated circuit modules respectively or by multiple modules in them or
Step is fabricated to single integrated circuit module to realize.So, the present invention is not restricted to any specific hardware and software combination.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area
For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies
Change, equivalent substitution, improvement etc., should be included in the scope of the protection.
Claims (12)
- A kind of 1. file encrypting method, it is characterised in that including:Before predetermined file is generated or during generation predetermined file, the Crypted password of input is obtained;When generating the predetermined file, the predetermined file is encrypted using the Crypted password.
- 2. according to the method for claim 1, it is characterised in that the predetermined file is being carried out using the Crypted password After encryption, methods described also includes:The predetermined file after concealed encrypted.
- 3. according to the method for claim 1, it is characterised in that obtaining the Crypted password of input includes:The first gesture that input is obtained using two or more infrared ray sensor is acted;First gesture action is converted to by the first data signal by analog-to-digital conversion;It is the Crypted password to determine first data signal.
- 4. according to the method for claim 1, it is characterised in that the predetermined file is added using the Crypted password It is close including:Determine the suffix of the filename of the predetermined file;The predetermined file is encrypted the mode that the suffix is modified by using the Crypted password.
- 5. method according to any one of claim 1 to 4, it is characterised in that utilizing the Crypted password to described After predetermined file is encrypted, methods described also includes:Obtain the clear crytpographic key of input;The predetermined file after encryption is decrypted using the clear crytpographic key, and shows the predetermined file.
- 6. according to the method for claim 5, it is characterised in that obtaining the clear crytpographic key of input includes:Entering for after storing the storage interface of the predetermined file, obtaining the clear crytpographic key of input.
- 7. according to the method for claim 5, it is characterised in that obtaining the clear crytpographic key of input includes:The second gesture that input is obtained using two or more infrared ray sensor is acted;Second gesture action is converted to by the second data signal by analog-to-digital conversion;It is the clear crytpographic key to determine second data signal.
- 8. according to the method for claim 7, it is characterised in that when the Crypted password is red described in two or more to utilizing During the first data signal that the first gesture action that outside line sensor obtains is converted to, the cunning of the second gesture action Dynamic path is opposite with the sliding path that the first gesture acts.
- 9. according to the method for claim 5, it is characterised in that when by using the Crypted password to the predetermined file The mode modified of suffix of filename when the predetermined file is encrypted, using the clear crytpographic key to encryption after The predetermined file be decrypted, and show that the predetermined file includes:Recover the suffix of the filename of the predetermined file using the clear crytpographic key;Display has recovered the predetermined file of suffix.
- 10. according to the method for claim 5, it is characterised in that after the predetermined file is shown, methods described is also wrapped Include:When it is determined that exiting the display interface for showing the predetermined file, the Crypted password is reused to described predetermined File is encrypted.
- A kind of 11. document encrypting apparatus, it is characterised in that including:Acquisition module, for before predetermined file is generated or during generation predetermined file, obtaining the Crypted password of input;Encrypting module, for when generating the predetermined file, the predetermined file to be encrypted using the Crypted password.
- 12. a kind of terminal, it is characterised in that including the device described in claim 11.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610343947.1A CN107423628A (en) | 2016-05-23 | 2016-05-23 | File encrypting method, device and terminal |
PCT/CN2016/108608 WO2017201999A1 (en) | 2016-05-23 | 2016-12-05 | File encryption method, device, terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610343947.1A CN107423628A (en) | 2016-05-23 | 2016-05-23 | File encrypting method, device and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107423628A true CN107423628A (en) | 2017-12-01 |
Family
ID=60411048
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610343947.1A Pending CN107423628A (en) | 2016-05-23 | 2016-05-23 | File encrypting method, device and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107423628A (en) |
WO (1) | WO2017201999A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110287733A (en) * | 2019-06-05 | 2019-09-27 | 杭州迪普科技股份有限公司 | A kind of file tamper resistant method and device |
CN111967032A (en) * | 2020-08-27 | 2020-11-20 | 长城计算机软件与***有限公司 | File encryption method and decryption method based on obfuscation processing |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111552938B (en) * | 2020-04-29 | 2024-03-15 | 上海明略人工智能(集团)有限公司 | File encryption method and device |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101295341A (en) * | 2008-06-25 | 2008-10-29 | 腾讯科技(深圳)有限公司 | Portable equipment and data protection method thereof |
CN103699847A (en) * | 2013-11-29 | 2014-04-02 | 上海合合信息科技发展有限公司 | Fingerprint encryption method and device, and encrypted shooting method and device |
CN104978541A (en) * | 2015-04-28 | 2015-10-14 | 努比亚技术有限公司 | Method and apparatus for hiding audio/video file |
CN105426746A (en) * | 2015-10-30 | 2016-03-23 | 努比亚技术有限公司 | Password setting apparatus and method |
-
2016
- 2016-05-23 CN CN201610343947.1A patent/CN107423628A/en active Pending
- 2016-12-05 WO PCT/CN2016/108608 patent/WO2017201999A1/en active Application Filing
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110287733A (en) * | 2019-06-05 | 2019-09-27 | 杭州迪普科技股份有限公司 | A kind of file tamper resistant method and device |
CN111967032A (en) * | 2020-08-27 | 2020-11-20 | 长城计算机软件与***有限公司 | File encryption method and decryption method based on obfuscation processing |
CN111967032B (en) * | 2020-08-27 | 2023-08-25 | 长城计算机软件与***有限公司 | File encryption method and decryption method based on confusion processing |
Also Published As
Publication number | Publication date |
---|---|
WO2017201999A1 (en) | 2017-11-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104933342B (en) | A kind of picture inspection method and mobile terminal | |
CN104967511B (en) | The processing method and processing device of encryption data | |
CN104040934B (en) | Image privacy is protected when being manipulated by cloud service | |
CN105069075B (en) | Photo be shared method and apparatus | |
EP1914961B1 (en) | Mobile information terminal apparatus | |
WO2008010275A1 (en) | Medium data processing device and medium data processing method | |
CN115810208A (en) | Face recognition method, device and system | |
CN104732158A (en) | Encryption photographing method, system and device | |
CN107423628A (en) | File encrypting method, device and terminal | |
CN103077357A (en) | Method for storing private files | |
CN106161947A (en) | Photo encryption method and system for camera terminal | |
CN105281907A (en) | Encrypted data processing method and apparatus | |
CN110213458A (en) | A kind of image processing method, device and storage medium | |
CN109246110A (en) | data sharing method and device | |
JP7278345B2 (en) | Mobile terminal privacy protection method and protection device, and mobile terminal | |
CN106101140B (en) | A kind of method and server of authentification of message | |
CN105681365B (en) | Method and apparatus for file transmission | |
CN108540591B (en) | Address book management method, address book management device and electronic equipment | |
CN103780756B (en) | The method of client identification card data secrecy and mobile terminal thereof | |
EP3915221B1 (en) | Offline interception-free interaction with a cryptocurrency network using a network-disabled device | |
CN111581622A (en) | Information processing method and device and electronic equipment | |
CN110190947B (en) | Information encryption and decryption method, terminal and computer readable storage medium | |
US20150156173A1 (en) | Communication system utilizing fingerprint information and use thereof | |
CN107292133A (en) | The obfuscation method and device of artificial intelligence | |
US20080052531A1 (en) | Device and Method for Secure Biometric Applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20171201 |
|
WD01 | Invention patent application deemed withdrawn after publication |