CN107609422B - A kind of file management method and mobile terminal - Google Patents

A kind of file management method and mobile terminal Download PDF

Info

Publication number
CN107609422B
CN107609422B CN201710907244.1A CN201710907244A CN107609422B CN 107609422 B CN107609422 B CN 107609422B CN 201710907244 A CN201710907244 A CN 201710907244A CN 107609422 B CN107609422 B CN 107609422B
Authority
CN
China
Prior art keywords
file
user
data
hidden
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710907244.1A
Other languages
Chinese (zh)
Other versions
CN107609422A (en
Inventor
马子平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201710907244.1A priority Critical patent/CN107609422B/en
Publication of CN107609422A publication Critical patent/CN107609422A/en
Application granted granted Critical
Publication of CN107609422B publication Critical patent/CN107609422B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of file management method and mobile terminals, are related to mobile communication technology field, which comprises detect when connecting with moveable magnetic disc, obtain the hidden file on the moveable magnetic disc;The predetermined encryption data for reading and parsing the hidden file obtain the original user mark data for the hidden file owning user that the predetermined encryption data carry;Obtain active user's mark data of the mobile terminal;When according to the original user mark data and active user's mark data, determining the hidden file is the file of the active user, the hidden file is read.When the present invention solves current terminal and moveable magnetic disc progress file interaction, the poor problem of the mode safety of file encryption.

Description

A kind of file management method and mobile terminal
Technical field
The present invention relates to mobile communication technology field more particularly to a kind of file management methods and mobile terminal.
Background technique
In mobile internet era, with the promotion and popularization of various intelligent terminals, user constantly pursues readding for high-quality It reads and office is experienced.It is essential that fast browsing, editor, transmission and the various documents of management have become routine work, life Function, it is also higher and higher to functional requirements such as file privacy, safeties.Currently, on various intelligent terminals, most files File is encrypted by file manager class application program, file manager class application program is usually by the way that file to be added to It realizes in encryption folder, and is transmitted when terminal and moveable magnetic disc carry out file interaction, such as through moveable magnetic disc File or when being stored by moveable magnetic disc, in user by moveable magnetic disc access terminal, and after having encrypted file, when this is removable After movable magnetic disc is unplugged, again insertable into other moveable magnetic discs, the file encrypted fails;In addition, when the moveable magnetic disc connects When entering to other terminals, the file being encrypted on the moveable magnetic disc can be checked in other terminals.Therefore, currently, eventually When end carries out file interaction with moveable magnetic disc, the mode safety of file encryption is poor, and the private file of user has safety Hidden danger, user experience are poor.
Summary of the invention
The present invention provides a kind of file management method and mobile terminal, its purpose is to solve current terminal with it is removable When movable magnetic disc carries out file interaction, the poor problem of the mode safety of file encryption.
On the one hand, the embodiment provides a kind of file management methods, are applied to mobile terminal, the method packet It includes:
It detects when being connect with moveable magnetic disc, obtains the hidden file on the moveable magnetic disc;
The predetermined encryption data for reading and parsing the hidden file obtain the described hidden of the predetermined encryption data carrying The original user mark data of Tibetan language part owning user;
Obtain active user's mark data of the mobile terminal;
When determining the hidden file for institute according to the original user mark data and active user's mark data When stating the file of active user, the hidden file is read.
On the other hand, the embodiments of the present invention also provide a kind of mobile terminals, comprising:
Detection module when connecting for detecting with moveable magnetic disc, obtains the hidden file on the moveable magnetic disc;
Parsing module obtains the predetermined encryption number for reading and parsing the predetermined encryption data of the hidden file According to the original user mark data of the hidden file owning user of carrying;
Module is obtained, for obtaining active user's mark data of the mobile terminal;
Determining module determines institute for working as according to the original user mark data and active user's mark data When stating the file that hidden file is the active user, the hidden file is read.
Another aspect, the embodiments of the present invention also provide a kind of mobile terminals, comprising: memory, processor and storage On a memory and the computer program that can run on a processor, processor realize above-mentioned file pipe when executing computer program Step in reason method.
In another aspect, the embodiments of the present invention also provide a kind of computer readable storage medium, computer-readable storage It is stored with computer program on medium, the step in above-mentioned file management method is realized when computer program is executed by processor.
In this way, file management method provided by the invention and mobile terminal, detects when being connect with moveable magnetic disc, obtain The predetermined encryption data of hidden file on the moveable magnetic disc, and the parsing of predetermined encryption data is obtained belonging to hidden file The original user mark data of user compares active user's mark data of original user mark data and mobile terminal It is right, judge hidden file whether be active user file;For the owning user of non-concealed file, since encryption can not be matched IMEI and Integrated Circuit Card Identity, will be unable to open or consult hidden file, improve the safety of file.And the embodiment of the present invention In encryption rule, since the IMEI and Integrated Circuit Card Identity of the mobile terminal to owning user are encrypted, other users can not Know, therefore predetermined encryption data can not be parsed.In the embodiment of the present invention, mobile terminal is additionally provided with storage hidden file The database of file record timely updates file record according to user's operation, it is ensured that the integrality of the encryption information of user file, The user experience is improved.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 shows the flow charts of file management method provided in an embodiment of the present invention;
Fig. 2 indicates the flow chart of the file management method of specific example provided in an embodiment of the present invention;
Fig. 3 indicates one of the block diagram of mobile terminal that the embodiment of the present invention provides;
Fig. 4 indicates the two of the block diagram for the mobile terminal that the embodiment of the present invention provides;
Fig. 5 indicates the three of the block diagram for the mobile terminal that the embodiment of the present invention provides;
Fig. 6 indicates the four of the block diagram for the mobile terminal that the embodiment of the present invention provides.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
It should be understood that " one embodiment " or " embodiment " that specification is mentioned in the whole text mean it is related with embodiment A particular feature, structure, or characteristic is included at least one embodiment of the present invention.Therefore, occur everywhere in the whole instruction " in one embodiment " or " in one embodiment " not necessarily refer to identical embodiment.In addition, these specific features, knot Structure or characteristic can combine in any suitable manner in one or more embodiments.
In various embodiments of the present invention, it should be appreciated that the size of the serial number of following each processes is not meant to execute suitable Sequence it is successive, the execution of each process sequence should be determined by its function and internal logic, the implementation without coping with the embodiment of the present invention Process constitutes any restriction.
Referring to Fig. 1, the embodiment provides a kind of file management methods, are applied to mobile terminal, comprising:
Step 101, it detects when being connect with moveable magnetic disc, obtains the hidden file on the moveable magnetic disc.
Wherein, moveable magnetic disc can be USB flash disk, mobile hard disk or OTG (On The Go) equipment.Hidden file is text Part attribute is the file of concealed format.
Step 102, the predetermined encryption data for reading and parsing the hidden file obtain the predetermined encryption data and carry The hidden file owning user original user mark data.
Wherein, predetermined encryption data carry in the file data of hidden file, and mobile terminal is reading hidden file When file data, the preferential predetermined encryption data read in file data, and according to predetermined encryption data, it parses this and hides text The original mark data of part owning user.
Preferably, the predetermined encryption data are that the original user mark data is added according to preset encryption rule Close treated data;
The International Mobile Station Equipment Identification of the hidden file owning user is carried in the original user mark data IMEI and subscriber identification module Integrated Circuit Card Identity;
The Integrated Circuit Card Identity includes international mobile subscriber identity IMSI or telephone number.
That is, the IMEI and Integrated Circuit Card Identity of Tibetan language part owning user are carried in original user mark data, Integrated Circuit Card Identity can be the IMSI or telephone number of owning user.Original user mark data is advised according to preset encryption After then being encrypted, predetermined encryption data are obtained.
Step 103, active user's mark data of the mobile terminal is obtained.
Wherein, the instruction information that instruction current user identities are carried in active user's mark data, for adding with default Original user mark data in ciphertext data is compared, judge hidden file whether be active user file.
Step 104, when according to the original user mark data and active user's mark data, determining described hide When file is the file of the active user, the hidden file is read.
Wherein, it if the original user mark data matches with active user's mark data, can determine hiding File is the file of the active user, reads the hidden file;Conversely, if original user mark data and the current use Family mark data mismatches, which is not active user's file.
Preferably, active user's mark data includes the IMEI and Integrated Circuit Card Identity of the active user;SIM Card identifier can be the IMSI or telephone number of active user.
It should be noted that if in a step 102, the Integrated Circuit Card Identity of the hidden file owning user parsed is institute The IMSI for belonging to user or when one in telephone number then in active user's mark data acquired in step 103, should include With the content of the Integrated Circuit Card Identity same type of owning user;For example, if only carrying affiliated use in original user mark data The IMSI at family then should include the IMSI of active user in active user's mark data acquired in step 103.
Step 104 includes:
When the IMEI of the hidden file owning user carried in the original user mark data and the movement are whole The IMEI of the active user at end is identical, and
The Integrated Circuit Card Identity of the hidden file owning user carried in the predetermined encryption data and the movement are eventually When the Integrated Circuit Card Identity of the active user at end is identical, determine that the hidden file is the file of the active user.
Wherein, if the IMEI that carries is identical as the IMEI of active user in original user mark, show mobile terminal with The corresponding mobile terminal of IMEI carried in original user mark is identical, which is the text of the user of the mobile terminal Part, and further judge whether Integrated Circuit Card Identity identical, if they are the same then hidden file owning user whether be active user text Part.
Otherwise, the file of the non-active user of the hidden file, wherein, can in order to improve the safety of user file Setting non-belonging user for the attribute of hidden file can not open.
Preferably, step 102 includes:
Read the predetermined encryption data in the preset field of the hidden file, and to the predetermined encryption data according to The corresponding decryption rule of the encryption rule carries out dissection process, obtains the original user mark data of the owning user.
Wherein, predetermined encryption data are arranged in the preset field of hidden file, mobile terminal detect hidden file it Afterwards, it goes to read predetermined encryption data in the preset field of hidden file first, and is advised according to decryption corresponding with encryption rule Then predetermined encryption data are decrypted, obtain original user mark data.
Preferably, the encryption rule includes:
The IMEI for the owning user that the original user mark data is carried and Integrated Circuit Card Identity difference Backward processing;
Backward treated IMEI and backward treated Integrated Circuit Card Identity are arranged according to preset order, or will be inverse The predeterminated position of sequence treated Integrated Circuit Card Identity is inserted into backward treated IMEI, the data after obtaining encryption.
Wherein, in encryption rule first to IMEI and the Integrated Circuit Card Identity difference backward processing, first to IMEI into The processing of row backward obtains backward treated IMEI ';
Backward processing is carried out to Integrated Circuit Card Identity again: by taking Integrated Circuit Card Identity is telephone number as an example, when mobile terminal should When mobile terminal includes two telephone numbers, enabling two telephone numbers is respectively MobileNumber1, MobileNumber2, right Two telephone number difference backward processing, obtain MobileNumber1 ' and MobileNumber2 ';Such as MobileNumber1=5105619123, then MobileNumber1 '=3219165015;
Backward treated IMEI and backward treated Integrated Circuit Card Identity are arranged according to preset order, if moved Dynamic terminal includes two telephone numbers, then preset order may is that
MobileNumber1’+IMEI’+MobileNumber2’。
Alternatively, by the predeterminated position of backward treated Integrated Circuit Card Identity is inserted into backward treated IMEI, such as it is right When mobile terminal includes a telephone number MobileNumber1, MobileNumber1 ' can be inserted into the 9th of IMEI ' Behind position, then data after encryption are as follows: IMEI ' (1~8)+MobileNumber1 '+IMEI ' (9~15).
Wherein, if the telephone number of mobile terminal is sky, MobileNumber1 ' can be set as to one group of preset characters string, than If MobileNumber1 default setting is 3579A864201 (hexadecimal), it is encrypted also according to above-mentioned rule.
When Integrated Circuit Card Identity is IMSI, above-mentioned encryption rule is identical, and details are not described herein for the embodiment of the present invention.
Preferably, the encryption rule further include:
Default identifier is added for the data after the encryption.
Wherein, default identifier can add on the head of predetermined encryption data, and terminal easy to remove reads predetermined encryption number According to when, can determine predetermined encryption data according to default identifier.Default identifier can also be added to the name in predetermined encryption data In title, for example " .secret " will be added after the Old Name of the hidden file after encryption, for example old file name is known as " A ", Entitled " A.secret " after encryption.
Preferably, the method also includes:
When creating the file of the active user on the moveable magnetic disc, the file to be created adds described default Encryption data.
Wherein, when the active user of mobile terminal creates the file of the active user on the moveable magnetic disc, The predetermined encryption data of created file are set according to above-mentioned encryption rule, in this way, when the moveable magnetic disc is connected to other When terminal device, the subscriber identity data of other terminal user due to being mismatched with the predetermined encryption data for setting this document, Other terminal devices will be unable to obtain this document, improve the safety of hidden file, avoid hidden file by owning user it Outer user reads.
Preferably, after the step of determination hidden file is the file of the active user, comprising:
Obtain the preset file record of the hidden file in the database of the mobile terminal;
File attribute in the file record is added into serviceable indicia.
Wherein, mobile terminal is previously provided with the database for recording hidden file.When determining that the hidden file is After the step of file of the active user, the file attribute addition of the hidden file of storage in the database can be used into mark Note, shows that the hidden file is currently state of activation.
Preferably, the file record includes store path and/or modification time;
After the step of determination hidden file is the file of the active user, comprising:
When detecting that the active user carries out default edit operation to the hidden file, more according to the edit operation The file record of the new hidden file;The default edit operation includes deleting, modify and/or renaming.
Wherein, default edit operation may include deleting, modify and/or renaming;
It is literary according to edit operation update is preset in time when detecting default edit operation of the active user to hidden file Part record.
Specifically, the file record for updating the hidden file mainly includes following several situations:
(1) file is increased newly:
By third party's entrance under moveable magnetic disc file increase newly a user file, by the path of this file, The last modification time of file is matched with record in database, if not finding matched record, this file record is increased newly Into database.
The case where being accessed again for moveable magnetic disc, due to not deleting the respective record in database, Still matched record, the emerging hidden file of counterweight, the file record of more new database, by this article can be found when scanning Part attribute is set as state of activation.
(2) file is deleted:
Delete hidden file: after deleting some user file in moveable magnetic disc under file by third-party application, Since file has been not present, when traversing the All Files in moveable magnetic disc under file, there is no this records, for this Situation, this record, sets unactivated state for file attribute in more new database.
It,, should in more new database since file is not present if part hidden file is temporarily lost when moveable magnetic disc removes Item record, sets unactivated state for file attribute.
(3) hidden file of moveable magnetic disc is modified:
When modifying some hidden file, such as file is edited, the modification time of file is made to change, but stores road There is no change for diameter and file title: such situation, respective record in more new database, more by the nearest modification time of this record Newly, other information remains unchanged.
(4) hidden file is renamed:
Hidden file renamed as alternative document name:
Hidden file there are still, but store path change, can not match with having record in database.By the mark of file Topic match with records all in database, can find the equal record of title, at this time more new database, general Store path with record is changed to the store path of existing file, and other information remains unchanged.If (finding a plurality of matched note Record, due to that can not judge whether it is original, will be inserted into database using this hidden file information as new record at this time).
If after deleting some hidden file under hidden folder, and adding new file, and it is named as and is deleted The record of the title of hidden file, the store path of this stylish file and deleted file be it is matched, then it is further more literary Part size information, under normal circumstances, the size recorded in the size and database of new file are unequal, then believe new file correlation Breath is used as new record, is inserted into database.If there are the records of identical store path in database, first this record is deleted It removes.If the store path of new file and other information in database it is original record match, will direct more new database The modification time of respective record is the modification time of current file.
In the above embodiment of the present invention, detects when being connect with moveable magnetic disc, obtain on the moveable magnetic disc The predetermined encryption data of hidden file, and the original user of hidden file owning user, which identifies, to be obtained to the parsing of predetermined encryption data Original user mark data is compared with active user's mark data of mobile terminal, whether judges hidden file by data For the file of active user;For the owning user of non-concealed file, since IMEI and the SIM card identification of encryption can not be matched Number, it will be unable to open or consult hidden file, improve the safety of file.And the encryption rule in the embodiment of the present invention, due to The IMEI and Integrated Circuit Card Identity of the mobile terminal of owning user are encrypted, other users can not be known, therefore can not parse Predetermined encryption data.In the embodiment of the present invention, mobile terminal is additionally provided with the database of the file record of storage hidden file, It is timely updated file record according to user's operation, it is ensured that the integrality of the encryption information of user file, the user experience is improved;This When invention solves current terminal and moveable magnetic disc progress file interaction, the poor problem of the mode safety of file encryption.
As a specific example, referring to fig. 2, file management method shown in Fig. 2 mainly comprises the steps that
Step 201, when detecting moveable magnetic disc access, the file on moveable magnetic disc is scanned;
Step 202, judge whether it is hidden file, if so, executing step 203, otherwise, execute step 204;
Step 203, according to the corresponding decryption rule of encryption rule, the predetermined encryption data of hidden file are parsed, Obtain the IMEI and Integrated Circuit Card Identity of hidden file owning user;
Step 205, the IMEI and Integrated Circuit Card Identity of mobile terminal are obtained;
Step 206, judge whether to match, that is, judge IMEI and Integrated Circuit Card Identity and the movement of hidden file owning user Whether the IMEI and Integrated Circuit Card Identity of terminal match one by one: if so, thening follow the steps 207, otherwise, executing step 208;
Step 204, file suffixes name is obtained;
Step 209, judge whether file suffixes name is advance file suffixes name, if so, 207 are thened follow the steps, otherwise, Execute step 208;
Wherein, preset file suffixes name includes: " .doc ", " .ppt ", " .jpg " etc., for confirming that this file is user Effective document, and program process file of nonusable routine etc..
Step 207, this document is the file of active user, can be read;
Step 208, the file of this document non-present user, it is not possible to read.
In the above embodiment of the present invention, detects when being connect with moveable magnetic disc, obtain on the moveable magnetic disc The predetermined encryption data of hidden file, and the original user of hidden file owning user, which identifies, to be obtained to the parsing of predetermined encryption data Original user mark data is compared with active user's mark data of mobile terminal, whether judges hidden file by data For the file of active user;For the owning user of non-concealed file, since IMEI and the SIM card identification of encryption can not be matched Number, it will be unable to open or consult hidden file, improve the safety of file.
Referring to Fig. 3, the embodiment provides a kind of mobile terminals 300, comprising:
Detection module 301 when connecting for detecting with moveable magnetic disc, obtains the hiding text on the moveable magnetic disc Part.
Wherein, moveable magnetic disc can be USB flash disk, mobile hard disk or OTG (On The Go) equipment.Hidden file is text Part attribute is the file of concealed format.
Parsing module 302 obtains the predetermined encryption for reading and parsing the predetermined encryption data of the hidden file The original user mark data for the hidden file owning user that data carry.
Wherein, predetermined encryption data carry in the file data of hidden file, and mobile terminal is reading hidden file When file data, the preferential predetermined encryption data read in file data, and according to predetermined encryption data, it parses this and hides text The original mark data of part owning user.
Module 303 is obtained, for obtaining active user's mark data of the mobile terminal 300.
Wherein, the instruction information that instruction current user identities are carried in active user's mark data, for adding with default Original user mark data in ciphertext data is compared, judge hidden file whether be active user file.
Wherein, if the original user mark data matches with active user's mark data, hidden file is The file of the active user, otherwise, the hidden file are not active user's files.
Determining module 304 is determined for working as according to the original user mark data and active user's mark data When the hidden file is the file of the active user, the hidden file is read.
Optionally, the predetermined encryption data are that the original user mark data is added according to preset encryption rule Close treated data;
The International Mobile Station Equipment Identification of the hidden file owning user is carried in the original user mark data IMEI and subscriber identification module Integrated Circuit Card Identity;
The Integrated Circuit Card Identity includes international mobile subscriber identity IMSI or telephone number.
Optionally, the parsing module 302 is used for:
Read the predetermined encryption data in the preset field of the hidden file, and to the predetermined encryption data according to The corresponding decryption rule of the encryption rule carries out dissection process, obtains the original user mark data of the owning user.
Optionally, the encryption rule includes:
The IMEI for the owning user that the original user mark data is carried and Integrated Circuit Card Identity difference Backward processing;
Backward treated IMEI and backward treated Integrated Circuit Card Identity are arranged according to preset order, or will be inverse The predeterminated position of sequence treated Integrated Circuit Card Identity is inserted into backward treated IMEI, the data after obtaining encryption.
Optionally, the encryption rule further include:
Default identifier is added for the data after the encryption.
Optionally, active user's mark data includes the IMEI and Integrated Circuit Card Identity of the active user;
The determining module 304 is used for:
When the IMEI of the hidden file owning user carried in the original user mark data and the movement are whole The IMEI of the active user at end 300 is identical, and
The Integrated Circuit Card Identity of the hidden file owning user carried in the predetermined encryption data and the movement are eventually When the Integrated Circuit Card Identity of the active user at end 300 is identical, determine that the hidden file is the file of the active user.
Optionally, referring to fig. 4, mobile terminal 300 further include:
Mark module 305, for determining that the hidden file is the file of the active user in the determining module 304 Later, comprising:
Obtain the preset file record of the hidden file in the database of the mobile terminal 300;
File attribute in the file record is added into serviceable indicia.
Optionally, the file record includes store path and/or modification time;
Referring to fig. 4, mobile terminal 300 further include: update module 306, for described hidden in the determining module 304 determination After Tibetan language part is the file of the active user, comprising:
When detecting that the active user carries out default edit operation to the hidden file, more according to the edit operation The file record of the new hidden file;The default edit operation includes deleting, modify and/or renaming.
Optionally, referring to fig. 4, mobile terminal 300 further include: creation module 307, for being created on the moveable magnetic disc When building the file of the active user, the file to be created adds the predetermined encryption data.
In the above embodiment of the present invention, mobile terminal is detected when connecting with moveable magnetic disc, is obtained described removable The predetermined encryption data of hidden file on disk, and the original of hidden file owning user is obtained to the parsing of predetermined encryption data Original user mark data is compared subscriber identity data with active user's mark data of mobile terminal, and judgement is hidden File whether be active user file;For the owning user of non-concealed file, since the IMEI and SIM of encryption can not be matched Card identifier will be unable to open or consult hidden file, improve the safety of file.And the encryption rule in the embodiment of the present invention Then, since the IMEI and Integrated Circuit Card Identity of the mobile terminal to owning user are encrypted, other users can not be known, therefore Predetermined encryption data can not be parsed.In the embodiment of the present invention, mobile terminal is additionally provided with the file record of storage hidden file Database, timely updated file record according to user's operation, it is ensured that the integrality of the encryption information of user file improves use Family experience.
On the other hand, the embodiments of the present invention also provide a kind of mobile terminals, comprising: memory, processor and storage On a memory and the computer program that can run on a processor, the computer program are realized when being executed by the processor Each process of above-mentioned file management method embodiment, and identical technical effect can be reached, it is no longer superfluous here to avoid repeating It states.
In another aspect, the embodiments of the present invention also provide a kind of computer readable storage medium, computer-readable storage It is stored with computer program on medium, each mistake in above-mentioned file management method is realized when computer program is executed by processor Journey, and identical technical effect can be reached, to avoid repeating, which is not described herein again.Wherein, the computer-readable storage medium Matter, such as read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
Referring to Fig. 5, another embodiment of the present invention provides a kind of mobile terminal 500.Mobile terminal 500 shown in fig. 5 It include: at least one processor 501, memory 502, at least one network interface 504 and other users interface 503.It is mobile Various components in terminal 500 are coupled by bus system 505.It is understood that bus system 505 is for realizing these groups Connection communication between part.Bus system 505 further includes power bus, control bus and state in addition to including data/address bus Signal bus.But for the sake of clear explanation, various buses are all designated as bus system 505 in Fig. 5.
Wherein, user interface 503 may include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 502 in the embodiment of the present invention can be volatile memory or nonvolatile memory, It or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as external high Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Synch link DRAM, SLDRAM) and direct rambus random access memory (Direct Ram bus RAM, DRRAM).The memory 502 of system and method described herein be intended to include but be not limited to these and it is any The memory of other suitable types.
In some embodiments, memory 502 stores following element, executable modules or data structures, or Their subset of person or their superset: operating system 5021 and application program 5022.
Wherein, operating system 5021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and the hardware based task of processing.Application program 5022 includes various application programs, such as media Player (Media Player), browser (Browser) etc. realize the embodiment of the present invention for realizing various applied business The program of method may be embodied in application program 5022.
In embodiments of the present invention, mobile terminal 500 further include: storage on a memory 502 and can be on processor 501 The computer program of operation, computer program realize following steps when being executed by processor 501: detecting and connect with moveable magnetic disc When connecing, the hidden file on the moveable magnetic disc is obtained;The predetermined encryption data of the hidden file are read and parsed, are obtained The original user mark data for the hidden file owning user that the predetermined encryption data carry;Obtain the mobile terminal Active user's mark data;Described in determining according to the original user mark data and active user's mark data When hidden file is the file of the active user, the hidden file is read.
The method that the embodiments of the present invention disclose can be applied in processor 501, or be realized by processor 501. Processor 501 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 501 or the instruction of software form.Above-mentioned processing Device 501 can be general processor, digital signal processor (Digital Signal Processor, DSP), dedicated integrated electricity Road (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at The step of memory 502, processor 501 reads the information in memory 502, completes the above method in conjunction with its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combination is to realize.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (Application Specific Integrated Circuit, ASIC), digital signal processor (Digital Signal Processor, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field Programmable Gate Array, FPGA), general processor, In controller, microcontroller, microprocessor, other electronic units for executing herein described function or combinations thereof.
For software implementations, it can be realized herein by executing the module (such as process, function etc.) of function described herein The technology.Software code is storable in memory and is executed by processor.Memory can in the processor or It is realized outside processor.
Optionally, as another embodiment, the predetermined encryption data are the original user mark data according to pre- If encryption rule be encrypted after data;
The International Mobile Station Equipment Identification of the hidden file owning user is carried in the original user mark data IMEI and subscriber identification module Integrated Circuit Card Identity;
The Integrated Circuit Card Identity includes international mobile subscriber identity IMSI or telephone number.
Optionally, as another embodiment, computer program can also be achieved following steps when being executed by processor 501: Read the predetermined encryption data in the preset field of the hidden file, and to the predetermined encryption data according to the encryption The corresponding decryption rule of rule carries out dissection process, obtains the original user mark data of the owning user.
Optionally, as another embodiment, the encryption rule includes:
The IMEI for the owning user that the original user mark data is carried and Integrated Circuit Card Identity difference Backward processing;
Backward treated IMEI and backward treated Integrated Circuit Card Identity are arranged according to preset order, or will be inverse The predeterminated position of sequence treated Integrated Circuit Card Identity is inserted into backward treated IMEI, the data after obtaining encryption.
Optionally, as another embodiment, the encryption rule further include:
Default identifier is added for the data after the encryption.
Optionally, as another embodiment,
Active user's mark data includes the IMEI and Integrated Circuit Card Identity of the active user;
It is described according to the original user mark data and active user's mark data, determine that the hidden file is The step of file of the active user, comprising:
When the IMEI of the hidden file owning user carried in the original user mark data and the movement are whole The IMEI of the active user at end is identical, and
The Integrated Circuit Card Identity of the hidden file owning user carried in the predetermined encryption data and the movement are eventually When the Integrated Circuit Card Identity of the active user at end is identical, determine that the hidden file is the file of the active user.
Optionally, as another embodiment, computer program can also be achieved following steps when being executed by processor 501: Obtain the preset file record of the hidden file in the database of the mobile terminal;
File attribute in the file record is added into serviceable indicia.
Optionally, as another embodiment, the file record includes store path and/or modification time;
After the step of determination hidden file is the file of the active user, comprising:
When detecting that the active user carries out default edit operation to the hidden file, more according to the edit operation The file record of the new hidden file;The default edit operation includes deleting, modify and/or renaming.
Optionally, as another embodiment, computer program can also be achieved following steps when being executed by processor 501: When creating the file of the active user on the moveable magnetic disc, the file to be created adds the predetermined encryption number According to.
Mobile terminal 500 can be realized each process that mobile terminal is realized in previous embodiment, to avoid repeating, here It repeats no more.
The mobile terminal 500 of the embodiment of the present invention is detected by processor 501 when connecting with moveable magnetic disc, is obtained The predetermined encryption data of hidden file on the moveable magnetic disc, and the parsing of predetermined encryption data is obtained belonging to hidden file The original user mark data of user compares active user's mark data of original user mark data and mobile terminal It is right, judge hidden file whether be active user file;For the owning user of non-concealed file, since encryption can not be matched IMEI and Integrated Circuit Card Identity, will be unable to open or consult hidden file, improve the safety of file.And the embodiment of the present invention In encryption rule, since the IMEI and Integrated Circuit Card Identity of the mobile terminal to owning user are encrypted, other users can not Know, therefore predetermined encryption data can not be parsed.In the embodiment of the present invention, mobile terminal is additionally provided with storage hidden file The database of file record timely updates file record according to user's operation, it is ensured that the integrality of the encryption information of user file, The user experience is improved.
Referring to Fig. 6, another embodiment of the present invention provides a kind of mobile terminal 600.Specifically, the mobile end in Fig. 6 End 600 can be mobile phone, tablet computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle-mounted Computer etc..
Mobile terminal 600 in Fig. 6 includes radio frequency (Radio Frequency, RF) circuit 610, memory 620, input Unit 630, display unit 640, processor 650, Wi-Fi (Wireless Fidelity) module 660, voicefrequency circuit 670, electricity Source 680.
Wherein, input unit 630 can be used for receiving the number or character information of user's input, and generation and mobile terminal The related signal input of 600 user setting and function control.
Specifically, in the embodiment of the present invention, which may include touch panel 631.Touch panel 631, Referred to as touch screen, collecting the touch operation of user on it or nearby, (for example user is any suitable using finger, stylus etc. The operation of object or attachment on touch panel 631), and corresponding attachment device is driven according to preset formula.It is optional , touch panel 631 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detection is used The touch orientation at family, and touch operation bring signal is detected, transmit a signal to touch controller;Touch controller is from touch Touch information is received in detection device, and is converted into contact coordinate, then gives the processor 650, and can receive processor 650 orders sent simultaneously are executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves Type realizes touch panel 631.In addition to touch panel 631, input unit 630 can also include other input equipments 632, other are defeated Enter equipment 632 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, One of mouse, operating stick etc. are a variety of.
Wherein, display unit 640 can be used for showing information input by user or be supplied to the information and movement of user The various menu interfaces of terminal 600.Display unit 640 may include display panel 641, optionally, can use LCD or organic hair The forms such as optical diode (Organic Light-Emitting Diode, OLED) configure display panel 641.
It should be noted that touch panel 631 can cover display panel 641, touch display screen is formed, when the touch display screen is examined After measuring touch operation on it or nearby, processor 650 is sent to determine the type of touch event, is followed by subsequent processing device 650 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface elements such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example, Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
In embodiments of the present invention, mobile terminal 600 further include: storage on a memory 620 and can be on processor 650 The computer program of operation, computer program realize following steps when being executed by processor 650: detecting and connect with moveable magnetic disc When connecing, the hidden file on the moveable magnetic disc is obtained;The predetermined encryption data of the hidden file are read and parsed, are obtained The original user mark data for the hidden file owning user that the predetermined encryption data carry;Obtain the mobile terminal Active user's mark data;Described in determining according to the original user mark data and active user's mark data When hidden file is the file of the active user, the hidden file is read.
Optionally, as another embodiment, the predetermined encryption data are the original user mark data according to pre- If encryption rule be encrypted after data;
The International Mobile Station Equipment Identification of the hidden file owning user is carried in the original user mark data IMEI and subscriber identification module Integrated Circuit Card Identity;
The Integrated Circuit Card Identity includes international mobile subscriber identity IMSI or telephone number.
Optionally, as another embodiment, computer program can also be achieved following steps when being executed by processor 650: Read the predetermined encryption data in the preset field of the hidden file, and to the predetermined encryption data according to the encryption The corresponding decryption rule of rule carries out dissection process, obtains the original user mark data of the owning user.
Optionally, as another embodiment, the encryption rule includes:
The IMEI for the owning user that the original user mark data is carried and Integrated Circuit Card Identity difference Backward processing;
Backward treated IMEI and backward treated Integrated Circuit Card Identity are arranged according to preset order, or will be inverse The predeterminated position of sequence treated Integrated Circuit Card Identity is inserted into backward treated IMEI, the data after obtaining encryption.
Optionally, as another embodiment, the encryption rule further include:
Default identifier is added for the data after the encryption.
Optionally, as another embodiment,
Active user's mark data includes the IMEI and Integrated Circuit Card Identity of the active user;
It is described according to the original user mark data and active user's mark data, determine that the hidden file is The step of file of the active user, comprising:
When the IMEI of the hidden file owning user carried in the original user mark data and the movement are whole The IMEI of the active user at end is identical, and
The Integrated Circuit Card Identity of the hidden file owning user carried in the predetermined encryption data and the movement are eventually When the Integrated Circuit Card Identity of the active user at end is identical, determine that the hidden file is the file of the active user.
Optionally, as another embodiment, computer program can also be achieved following steps when being executed by processor 650: Obtain the preset file record of the hidden file in the database of the mobile terminal;
File attribute in the file record is added into serviceable indicia.
Optionally, as another embodiment, the file record includes store path and/or modification time;
After the step of determination hidden file is the file of the active user, comprising:
When detecting that the active user carries out default edit operation to the hidden file, more according to the edit operation The file record of the new hidden file;The default edit operation includes deleting, modify and/or renaming.
Optionally, as another embodiment, computer program can also be achieved following steps when being executed by processor 650: When creating the file of the active user on the moveable magnetic disc, the file to be created adds the predetermined encryption number According to.
Mobile terminal 600 can be realized each process that mobile terminal is realized in previous embodiment, to avoid repeating, here It repeats no more.
The mobile terminal 600 of the embodiment of the present invention is detected by processor 650 when connecting with moveable magnetic disc, is obtained The predetermined encryption data of hidden file on the moveable magnetic disc, and the parsing of predetermined encryption data is obtained belonging to hidden file The original user mark data of user compares active user's mark data of original user mark data and mobile terminal It is right, judge hidden file whether be active user file;For the owning user of non-concealed file, since encryption can not be matched IMEI and Integrated Circuit Card Identity, will be unable to open or consult hidden file, improve the safety of file.And the embodiment of the present invention In encryption rule, since the IMEI and Integrated Circuit Card Identity of the mobile terminal to owning user are encrypted, other users can not Know, therefore predetermined encryption data can not be parsed.In the embodiment of the present invention, mobile terminal is additionally provided with storage hidden file The database of file record timely updates file record according to user's operation, it is ensured that the integrality of the encryption information of user file, The user experience is improved.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: various Jie that can store program code such as USB flash disk, mobile hard disk, ROM, RAM, magnetic disk, CD Matter.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (20)

1. a kind of file management method is applied to mobile terminal characterized by comprising
It detects when being connect with moveable magnetic disc, obtains the hidden file on the moveable magnetic disc;
The predetermined encryption data for reading and parsing the hidden file obtain the hiding text that the predetermined encryption data carry The original user mark data of part owning user;
Obtain active user's mark data of the mobile terminal;
When according to the original user mark data and active user's mark data, determining that the hidden file is described works as When the file of preceding user, the hidden file is read;
Wherein, mobile terminal is provided with the database of the file record of storage hidden file.
2. the method according to claim 1, wherein the predetermined encryption data are that the original user identifies number According to the data after being encrypted according to preset encryption rule;
Carried in the original user mark data International Mobile Station Equipment Identification IMEI of the hidden file owning user with And subscriber identification module Integrated Circuit Card Identity;
The Integrated Circuit Card Identity includes international mobile subscriber identity IMSI or telephone number.
3. according to the method described in claim 2, it is characterized in that, the predetermined encryption read and parse the hidden file Data, the step of obtaining the original user mark data for the hidden file owning user that the predetermined encryption data carry, Include:
Read the predetermined encryption data in the preset field of the hidden file, and to the predetermined encryption data according to it is described The corresponding decryption rule of encryption rule carries out dissection process, obtains the original user mark data of the owning user.
4. according to the method described in claim 2, it is characterized in that, the encryption rule includes:
The IMEI and the Integrated Circuit Card Identity for the owning user that the original user mark data is carried distinguish backward Processing;
Backward treated IMEI and backward treated Integrated Circuit Card Identity are arranged according to preset order, or will be at backward Integrated Circuit Card Identity after reason is inserted into backward treated the predeterminated position of IMEI, the data after obtaining encryption.
5. according to the method described in claim 4, it is characterized in that, the encryption rule further include:
Default identifier is added for the data after the encryption.
6. according to the method described in claim 2, it is characterized in that, active user's mark data includes the active user IMEI and Integrated Circuit Card Identity;
It is described according to the original user mark data and active user's mark data, determine that the hidden file is described The step of file of active user, comprising:
As the IMEI and the mobile terminal of the hidden file owning user carried in the original user mark data The IMEI of active user is identical, and
The Integrated Circuit Card Identity of the hidden file owning user carried in the predetermined encryption data and the mobile terminal When the Integrated Circuit Card Identity of active user is identical, determine that the hidden file is the file of the active user.
7. the method according to claim 1, wherein the determination hidden file is the active user's After the step of file, comprising:
Obtain the preset file record of the hidden file in the database of the mobile terminal;
File attribute in the file record is added into serviceable indicia.
8. the method according to the description of claim 7 is characterized in that when the file record includes store path and/or modification Between;
After the step of determination hidden file is the file of the active user, comprising:
When detecting that the active user carries out default edit operation to the hidden file, institute is updated according to the edit operation State the file record of hidden file;The default edit operation includes deleting, modify and/or renaming.
9. according to the method described in claim 2, it is characterized in that, the method also includes:
When creating the file of the active user on the moveable magnetic disc, the file to be created adds the predetermined encryption Data.
10. a kind of mobile terminal characterized by comprising
Detection module when connecting for detecting with moveable magnetic disc, obtains the hidden file on the moveable magnetic disc;
Parsing module obtains the predetermined encryption data and takes for reading and parsing the predetermined encryption data of the hidden file The original user mark data of the hidden file owning user of band;
Module is obtained, for obtaining active user's mark data of the mobile terminal;
Determining module determines described hidden for working as according to the original user mark data and active user's mark data When Tibetan language part is the file of the active user, the hidden file is read;
Wherein, mobile terminal is provided with the database of the file record of storage hidden file.
11. mobile terminal according to claim 10, which is characterized in that the predetermined encryption data are the original user Mark data be encrypted according to preset encryption rule after data;
Carried in the original user mark data International Mobile Station Equipment Identification IMEI of the hidden file owning user with And subscriber identification module Integrated Circuit Card Identity;
The Integrated Circuit Card Identity includes international mobile subscriber identity IMSI or telephone number.
12. mobile terminal according to claim 11, which is characterized in that the parsing module is used for:
Read the predetermined encryption data in the preset field of the hidden file, and to the predetermined encryption data according to it is described The corresponding decryption rule of encryption rule carries out dissection process, obtains the original user mark data of the owning user.
13. mobile terminal according to claim 11, which is characterized in that the encryption rule includes:
The IMEI and the Integrated Circuit Card Identity for the owning user that the original user mark data is carried distinguish backward Processing;
Backward treated IMEI and backward treated Integrated Circuit Card Identity are arranged according to preset order, or will be at backward Integrated Circuit Card Identity after reason is inserted into backward treated the predeterminated position of IMEI, the data after obtaining encryption.
14. mobile terminal according to claim 13, which is characterized in that the encryption rule further include:
Default identifier is added for the data after the encryption.
15. mobile terminal according to claim 11, which is characterized in that active user's mark data includes described works as The IMEI and Integrated Circuit Card Identity of preceding user;
The determining module is used for:
As the IMEI and the mobile terminal of the hidden file owning user carried in the original user mark data The IMEI of active user is identical, and
The Integrated Circuit Card Identity of the hidden file owning user carried in the predetermined encryption data and the mobile terminal When the Integrated Circuit Card Identity of active user is identical, determine that the hidden file is the file of the active user.
16. mobile terminal according to claim 10, which is characterized in that further include:
Mark module, for after the file that the determining module determines that the hidden file is the active user, comprising:
Obtain the preset file record of the hidden file in the database of the mobile terminal;
File attribute in the file record is added into serviceable indicia.
17. mobile terminal according to claim 16, which is characterized in that the file record include store path and/or Modification time;
Update module, for after the file that the determining module determines that the hidden file is the active user, comprising:
When detecting that the active user carries out default edit operation to the hidden file, institute is updated according to the edit operation State the file record of hidden file;The default edit operation includes deleting, modify and/or renaming.
18. mobile terminal according to claim 11, which is characterized in that the mobile terminal further include:
Creation module, when for creating the file of the active user on the moveable magnetic disc, the file to be created adds Add the predetermined encryption data.
19. a kind of mobile terminal characterized by comprising memory, processor and be stored on the memory and can be in institute The computer program run on processor is stated, such as claim 1 to 9 is realized when the computer program is executed by the processor Any one of described in file management method in step.
20. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program, the computer program realize file management method as claimed in any one of claims 1-9 wherein when being executed by processor In step.
CN201710907244.1A 2017-09-29 2017-09-29 A kind of file management method and mobile terminal Active CN107609422B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710907244.1A CN107609422B (en) 2017-09-29 2017-09-29 A kind of file management method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710907244.1A CN107609422B (en) 2017-09-29 2017-09-29 A kind of file management method and mobile terminal

Publications (2)

Publication Number Publication Date
CN107609422A CN107609422A (en) 2018-01-19
CN107609422B true CN107609422B (en) 2019-03-05

Family

ID=61067303

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710907244.1A Active CN107609422B (en) 2017-09-29 2017-09-29 A kind of file management method and mobile terminal

Country Status (1)

Country Link
CN (1) CN107609422B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111125644B (en) * 2018-11-01 2022-05-27 百度在线网络技术(北京)有限公司 Information hiding method and device for application product
CN110929110B (en) * 2019-11-13 2023-02-21 北京北信源软件股份有限公司 Electronic document detection method, device, equipment and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105095784A (en) * 2014-05-21 2015-11-25 中兴通讯股份有限公司 Terminal data writing and reading methods and devices
CN105740937A (en) * 2015-11-11 2016-07-06 哈尔滨安天科技股份有限公司 High-strength encryption USB flash disk, encryption device and system
CN106357402A (en) * 2016-11-11 2017-01-25 武汉斗鱼网络科技有限公司 Data encryption-decryption processing method and device
CN106682458A (en) * 2016-12-22 2017-05-17 北京锐安科技有限公司 Method and device for authorization based on mobile device

Also Published As

Publication number Publication date
CN107609422A (en) 2018-01-19

Similar Documents

Publication Publication Date Title
CN101436175B (en) System and method for controlling comments in a collaborative document
CN103616981B (en) application processing method, device and mobile terminal
CN104834449B (en) The icon management method and device of mobile terminal
CN102393844B (en) Registration of applications and unified media search
RU2677393C2 (en) Method and apparatus for providing graphical user interface
CN106708658B (en) A kind of data back up method, mobile terminal and storage server
CN106462454A (en) Activity continuation between electronic devices
US20150163672A1 (en) Mobile terminal, device and control method thereof
CN103761779A (en) Mobile terminal and control method for electronic lock at mobile terminal
CN107390991B (en) A kind of processing method and mobile terminal of screenshot
CN105183513A (en) Application recommendation method and apparatus
CN105512294A (en) Multi-media file update prompting method and device
CN107609422B (en) A kind of file management method and mobile terminal
CN106817484A (en) The acquisition methods and mobile terminal of a kind of session information
CN106250757B (en) A kind of control method and mobile terminal of application program
CN104915588A (en) Privacy protection method and device for electronic equipment
EP3361671A1 (en) User authentication method, authentication apparatus, and terminal
CN106778344B (en) A kind of data permission control method and terminal
CN106210293A (en) A kind of information processing method and mobile terminal
JP7223857B2 (en) Document marking method and apparatus
CN106937001A (en) A kind of audio store method and mobile terminal
CN107567022A (en) A kind of wireless connection method, terminal and computer-readable recording medium
CN104301385A (en) Data acquisition method, calculation equipment, mobile equipment and system
CN103870544A (en) Method and device for virtually operating file, and electronic equipment
CN106648370A (en) Encrypting method for screenshots and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant