CN108052828A - Generation method, device, terminal and the storage medium of record screen file - Google Patents

Generation method, device, terminal and the storage medium of record screen file Download PDF

Info

Publication number
CN108052828A
CN108052828A CN201711432596.2A CN201711432596A CN108052828A CN 108052828 A CN108052828 A CN 108052828A CN 201711432596 A CN201711432596 A CN 201711432596A CN 108052828 A CN108052828 A CN 108052828A
Authority
CN
China
Prior art keywords
record screen
screen file
file
terminal
record
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711432596.2A
Other languages
Chinese (zh)
Other versions
CN108052828B (en
Inventor
张烨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201711432596.2A priority Critical patent/CN108052828B/en
Publication of CN108052828A publication Critical patent/CN108052828A/en
Application granted granted Critical
Publication of CN108052828B publication Critical patent/CN108052828B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses a kind of generation method, device, terminal and storage mediums for recording screen file, belong to field of terminal technology.The described method includes:The corresponding access mandate scope of record screen file is obtained, the record screen file is the video file generated after recording a video to the display content in screen, and the access mandate scope is used to indicate whether that the record screen file is encrypted;When the access mandate scope is used to indicate needs to the record screen file encryption, the encryption key of the record screen file is obtained;The record screen file is encrypted according to the encryption key, generates the record screen file after encryption.The application passes through when access mandate scope is used to indicate and record screen file is encrypted, terminal is encrypted record screen file according to the encryption key got, the situation of leaking data caused by record screen file is preserved with plaintext version is avoided, ensure that the security of data in record screen file.

Description

Generation method, device, terminal and the storage medium of record screen file
Technical field
The invention relates to field of terminal technology, more particularly to a kind of generation method, device, terminal for recording screen file And storage medium.
Background technology
Record screen file is the video file generated after the display content in terminal-pair screen is recorded a video.
At present, terminal carry out record screen process be usually:Terminal is adopted after record screen function is started according to preset sample frequency Collect screen-picture.Terminal encodes each frame screen-picture collected while terminating to record screen function, and synthesis is recorded Shield file, and the operations such as the record screen file is preserved or shared.
The content of the invention
The embodiment of the present application provides a kind of generation method, device, terminal and storage medium for recording screen file, technical solution It is as follows:
According to the embodiment of the present application in a first aspect, provide it is a kind of record screen file generation method, the described method includes:
Record screen file is obtained, the record screen file is the video text generated after recording a video to the display content in screen Part;
The corresponding access mandate scope of the record screen file is obtained, the access mandate scope is used to indicate whether to described Record screen file is encrypted;
When the access mandate scope is used to indicate, and the record screen file is encrypted, the record screen text is obtained The encryption key of part;
The record screen file is encrypted according to the encryption key, generates the record screen text after encryption Part.
According to the second aspect of the embodiment of the present application, a kind of generating means for recording screen file are provided, described device includes:
First acquisition module records screen file for obtaining, and the record shields file to be recorded to the display content in screen The video file generated as after;
Second acquisition module, for obtaining the corresponding access mandate scope of the record screen file, the access mandate scope It is used to indicate whether that the record screen file is encrypted;
3rd acquisition module, for work as the access mandate scope be used to indicate to it is described record screen file be encrypted When, obtain the encryption key that file is shielded in the record;
Encrypting module for the record screen file to be encrypted according to the encryption key, generates encryption The record screen file afterwards.
According to the third aspect of the embodiment of the present application, a kind of terminal is provided, the terminal includes processor and memory, It is stored at least one instruction in the memory, described instruction is loaded by the processor and performed to realize such as the application the The generation method of one side and its any record screen file of alternative embodiment.
According to the fourth aspect of the embodiment of the present application, a kind of computer readable storage medium, the storage medium are provided In be stored at least one instruction, described instruction is loaded by processor and is performed to realize such as the application first aspect and its optional The generation method of any record screen file of embodiment.
The advantageous effect that technical solution provided by the embodiments of the present application is brought is:
By obtaining record screen file, the corresponding access mandate scope of record screen file is obtained, when access mandate scope is used to refer to Show that the encryption key of file is shielded in acquisition record so that terminal can be according to encryption key pair when record screen file is encrypted Record screen file is encrypted, and generates the record screen file after encryption, so that subsequently needing to play record screen text During part, it is necessary to the record screen file could be successfully played according to corresponding decruption key, so as to avoid record screen file with plaintext shape The situation of leaking data caused by formula is preserved ensure that the security of data in record screen file.
Description of the drawings
Fig. 1 is the structure diagram for the terminal that one exemplary embodiment of the application is provided;
Fig. 2 is the flow chart of the generation method for the record screen file that one exemplary embodiment of the application provides;
Fig. 3 is the flow chart of the generation method of the record screen file of the application another exemplary embodiment offer;
Fig. 4 is the correspondence set between control and access mandate scope that one exemplary embodiment of the application provides Schematic diagram;
Fig. 5 is that the mandate that the generation method for the record screen file that one exemplary embodiment of the application provides is related to sets interface Interface schematic diagram;
Fig. 6 is that the password that the generation method for the record screen file that one exemplary embodiment of the application provides is related to sets interface Interface schematic diagram;
Fig. 7 is default corresponding between the access mandate scope that one exemplary embodiment of the application provides and encryption key The schematic diagram of relation;
Fig. 8 is the schematic diagram for the record screen file composition that one exemplary embodiment of the application provides;
Fig. 9 is the flow chart of the generation method for the record screen file that another exemplary embodiment provides;
Figure 10 is the structure diagram of the generating means for the record screen file that one exemplary embodiment of the application provides;
Figure 11 is the structure diagram of the generating means of the record screen file of the application another exemplary embodiment offer.
Specific embodiment
To make the purpose, technical scheme and advantage of the application clearer, below in conjunction with attached drawing to the application embodiment party Formula is described in further detail.
To make the purpose, technical scheme and advantage of the application clearer, below in conjunction with attached drawing to the application embodiment party Formula is described in further detail.
In the following description when referring to the accompanying drawings, unless otherwise indicated, the same numbers in different attached drawings represent same or similar Element.Embodiment described in following exemplary embodiment does not represent all embodiment party consistent with the application Formula.On the contrary, they are only the device consistent with some aspects being described in detail in such as the appended claims, the application and side The example of method.
In the description of the present application, it is to be understood that term " first ", " second " etc. are only used for description purpose, without It is understood that indicate or imply relative importance., it is necessary to which explanation, provides unless otherwise specific in the description of the present application And restriction, term " connected ", " connection " should be interpreted broadly, for example, it may be fixedly connected or be detachably connected, Or it is integrally connected;Can be mechanical connection or electrical connection;It can be directly connected, intermediary can also be passed through It is indirectly connected.For the ordinary skill in the art, the tool of above-mentioned term in this application can be understood with concrete condition Body meaning.In addition, in the description of the present application, unless otherwise indicated, " multiple " refer to two or more."and/or" is retouched The incidence relation of affiliated partner is stated, expression may have three kinds of relations, for example, A and/or B, can represent:Individualism A, together When there are A and B, these three situations of individualism B.It is a kind of relation of "or" that character "/", which typicallys represent forward-backward correlation object,.
First, to the invention relates to some nouns explain:
Android operation system:By the behaviour of a kind of freedom and open source code based on Linux that Google of the U.S. produces Make system, be mainly used for mobile equipment.
Process:It is the elementary cell for being scheduled and distributing to computing resource in operating system.One application program is being transported During row, there can be one or more processes.
Optionally, which can be the process of application program or the active process of application program or using journey User interface (User Interface, UI) process of sequence.In Android operation system, an application program generally includes at least One program assembly.Program assembly is divided into four kinds:Activity (English:Activity) component, service (English:Service) component, Content provider's (English:Content Provider) component and radio receiver (English:Broadcast Receiver) group Part.Wherein, to be responsible for the component with user interaction in Android application program, it is provided visually movable component for Android application program The user interface of change.One Android application program can include zero to multiple movable components, for example be used for the activity of unlock, be used for The activity of mobile payment, the activity for checking photo, the activity for setting subscriber information message.Active process refers to answering With the process corresponding to currently operation activity in program.UI processes in application program refer in the user interface of application program The corresponding process of UI elements of display.
Record screen:Also referred to as film recording or screen recording refers to that the whole region for gathering screen or screen specify region Coded image data is obtained the technology of video file by image data.
Wherein, it is regional area specified in entire screen that screen, which specifies region,.It is that terminal is write from memory that the screen, which specifies region, Recognize setting or that User Defined is set;For example, screen specify region be entire screen top half region, Region where the entire region of the latter half of screen or the program window of some application program.The embodiment of the present application is to this It is not limited.
Record screen file:The video file that display content in terminal-pair screen generates after being recorded a video.The display content is Interior perhaps screen shown by entire screen specifies the content shown by region.
In the following, the video file generated after only being recorded a video using record screen file as the content shown by the entire screen of terminal-pair Exemplified by illustrate.
In correlation technique, the processing mode of terminal-pair record screen file is usually:The record screen that terminal will obtain after recording File is preserved with plaintext version.But since record screen file belongs to important private data, if record screen file is straight It connects and is preserved with plaintext version, then be easy to cause leaking data so that the security of data is relatively low.It not yet provides at present a kind of The generation method of safe and reliable record screen file.
The embodiment of the present application provides a kind of generation method, device, terminal and storage medium for recording screen file, in solution State problem present in correlation technique.In the technical solution that the application provides, screen file is recorded by obtaining, obtains record screen file pair The access mandate scope answered when access mandate scope is used to indicate, and record screen file is encrypted, obtains record screen file Encryption key so that terminal can according to encryption key to record screen file be encrypted, generate encryption after record Shield file, so that subsequently when needing to play the record screen file, it is necessary to could successfully be played according to corresponding decruption key The record screen file, the situation of leaking data, ensure that caused by being preserved so as to avoid record screen file with plaintext version The security of data in record screen file.
Before the embodiment of the present application is explained, first the application scenarios of the embodiment of the present application are illustrated. Fig. 1 shows the structure diagram for the terminal 100 that one exemplary embodiment of the application is provided.
The terminal 100 is to be equipped with the terminal of record screen application program.The record screen application program is that have the function of answering for record screen Use program.
Optionally, which is system program or third party application.Wherein, third party application It is the application program that the third party in addition to user and operating system makes.
Optionally, the other application program in addition to application program is shielded in record is also equipped in terminal 100, for example, payment Program, antivirus applet, the application program with graph and image processing, the application program with word processing function, with Player application of media play function etc..
Terminal 100 can be mobile phone, tablet computer, E-book reader, multimedia play equipment, wearable device, knee Mo(u)ld top half pocket computer and desktop computer etc..The record screen process realization that terminal 100 is used for by recording screen application program is following The generation method for the record screen file that each embodiment of the method provides.
Optionally, which includes:Processor 120 and memory 140.
Processor 120 can include one or more processing core.Processor 120 utilizes various interfaces and connection Various pieces in entire terminal 100, by running or performing the instruction being stored in memory 140, program, code set or refer to Order collection and calling are stored in the data in memory 140, perform the various functions of terminal 100 and processing data.Optionally, Digital Signal Processing (Digital Signal Processing, DSP), field programmable gate array may be employed in processor 120 (Field-Programmable Gate Array, FPGA), programmable logic array (Programmable Logic Array, PLA) at least one of example, in hardware realize.Processor 120 can integrating central processor (Central Processing Unit, CPU), in image processor (Graphics Processing Unit, GPU) and modem etc. One or more of combinations.Wherein, the main processing operation systems of CPU, user interface and application program etc.;GPU is used to be responsible for Content to be shown needed for display screen 160 rendering and drawing;Modem is used to handle wireless communication.It is appreciated that It is that above-mentioned modem can not also be integrated into processor 120, realized separately through chip piece.
Memory 140 can include random access memory (Random Access Memory, RAM), can also include read-only Memory (Read-Only Memory).Optionally, which includes non-transient computer-readable medium (non- transitory computer-readable storage medium).Memory 140 can be used for store instruction, program, generation Code, code set or instruction set.Memory 140 may include storing program area and storage data field, wherein, storing program area can store The instruction that is used to implement operating system, instruction (such as touch function, sound-playing function, image at least one function Playing function etc.), the instruction that is used to implement following each embodiments of the method etc.;It is real that storage data field can store following each method Apply data arrived involved in example etc..
Optionally, display screen 160 is further included in the terminal 100, which is located at the use of front stage operation for showing Family interface, the display screen 160 also may be simply referred to as screen.
In order to ensure the Information Security of record screen file, the embodiment of the present application provides a kind of generation side for recording screen file Method, device, terminal and storage medium.In the following, it is illustrated using schematical embodiment.
It please refers to Fig.2, the stream of the generation method of file is shielded it illustrates the record that one exemplary embodiment of the application provides Cheng Tu.The present embodiment is illustrated with the generation method of the record screen file applied to implementation environment illustrated in fig. 1.The record screen The generation method of file includes:
Step 201, obtain the corresponding access mandate scope of record screen file, record screen file be to the display content in screen into The video file generated after row video recording, access mandate scope are used to indicate whether that record screen file is encrypted.
Terminal gathers screen-picture after record screen function is started, according to preset sample frequency, and terminal is recorded in end shields work( While energy, each frame screen-picture collected is encoded, synthesis obtains record screen file.
The preset sample frequency is that terminal default setting or User Defined are set;For example, default sampling frequency Rate is that 24 frames are per second or 30 frames are per second.The embodiment of the present application is not limited this.
Optionally, access mandate scope includes:Present terminal has in the authorization terminal and all terminals of access rights It is a kind of.
Wherein, present terminal is the terminal that record screen file is obtained after recording a video to the display content in screen, has and visits The authorization terminal for asking permission is the terminal with the permission for playing the encrypted record screen file.
Optionally, present terminal is a terminal in authorization terminal, and authorization terminal is at least one in all terminals Terminal.
Wherein, the corresponding access mandate scope of record screen file is that terminal default setting or User Defined are set 's.
Terminal obtains the corresponding access mandate scope of record screen file, includes but not limited to following three kinds of realization sides arranged side by side Formula:
In a kind of possible realization method, terminal default setting record screen file access mandate scope for present terminal, One kind in authorization terminal and all terminals with access rights, terminal obtain the access mandate scope of terminal default setting.
In alternatively possible realization method, terminal shows that mandate sets interface, the mandate after terminating to record screen function It is for prompting the interface being configured to the access mandate scope of the record screen file to set interface, which includes One kind in above-mentioned three kinds of access mandate scopes;Terminal sets the access for the record screen file for obtaining setting in interface to award from mandate Weigh scope.It is retouched from the process for setting acquisition access mandate scope in interface is authorized to can refer to the correlation in following methods embodiment It states, does not introduce first herein.
In alternatively possible realization method, terminal display first after terminating to record screen function sets interface, this first Interface is set to include prompt message and confirms control, which is for prompting whether place to be encrypted to record screen file The information of reason, when detect confirm control corresponding trigger action in the first setting interface when, determine to add record screen file While close processing, triggering display second sets interface, which is for prompting to carry out access mandate scope The interface of setting, the access mandate scope include present terminal or the authorization terminal with access rights;Terminal is set from second Put the access mandate scope for the record screen file that setting is obtained in interface.It is set from second and access mandate scope is obtained in interface Process can analogy with reference to the associated description that access mandate scope is obtained in interface is set from authorizing in following methods embodiment, herein It does not introduce first.
Step 202, when access mandate scope is used to indicate, and record screen file is encrypted, record screen file is obtained Encryption key.
When access mandate scope is present terminal or authorization terminal, terminal determines that access mandate scope is used to indicate to record Screen file is encrypted, and obtains the encryption key of record screen file.The mode that terminal obtains the encryption key of record screen file can With reference to the associated description in following methods embodiment, do not introduce first herein.
Optionally, when terminal determine access mandate scope be used to indicate to record screen file be encrypted when, generation record Shield the encryption secret key of file and decryption secret key, encryption key is the key for record screen file to be encrypted, and decryption is secret Key is the key for record screen file to be decrypted.
Wherein, for encryption key with decruption key there are correspondence, which includes encryption key and decruption key Between one-to-one relation or an encryption key correspond to the correspondences of multiple decruption keys.It is only close to encrypt below There are illustrated exemplified by one-to-one relation between key and decruption key.
In a kind of possible realization method, encryption secret key and decryption secret key are symmetric keys, that is, encrypt secret key and decryption Secret key is same key.
In alternatively possible realization method, encryption secret key and decryption secret key are a pair of of unsymmetrical key pair, that is, are encrypted Secret key is that there are the different keys of the two of correspondence with decryption secret key.The encryption secret key of terminal generation record screen file and decryption Secret key, including:Unsymmetrical key pair is generated, unsymmetrical key is determined as record screen to including private key and corresponding public key, by private key The corresponding encryption key of file, and the corresponding public key of the private key is determined as the corresponding decruption key of record screen file.
Step 203, record screen file is encrypted according to encryption key, generates the record screen file after encryption.
Record screen file generally includes two parts, is file head module and data module respectively.Wherein, file head module bag The header data for being stored in record screen top of file is included, for example, the general information of record screen file, the data format and used of definition The parameters such as compression algorithm.Data module addition shields the remainder in file in addition to header data after file head module, including record According to for example, the data block sequence of actual video data stream, i.e. image and sound.Optionally, data module further includes sequence data The random access capability of data in record screen file is responsible for ensureing in block list and their positions hereof.
Terminal is encrypted record screen file according to encryption key, generates the record screen file after encryption, including But it is not limited to following two possible realization methods:
In a kind of possible realization method, terminal is encrypted according to encryption key to entirely recording screen file, i.e., Shield the file head module in file to record and data module is encrypted, generate the record screen file after encryption.
In alternatively possible realization method, terminal is shielded record the file head module in file according to encryption key and is carried out Encryption according to the data module of encrypted file head module and unencryption, generates the record screen file after encryption.Eventually File head module in file is shielded to record according to encryption key, the phase that can refer in following methods embodiment is encrypted in end Description is closed, is not introduced first herein.
Terminal is encrypted record screen file according to encryption key, after generating the record screen file after encryption, Other processing can also be carried out to encrypted record screen file.Other processing are included in preserving, edit, play and sharing extremely Few one kind.
Optionally, step 201 is completed to step 203 by the record screen application program in terminal, which is present terminal.
In conclusion the embodiment of the present application records screen file by obtaining, the corresponding access mandate scope of record screen file is obtained, When access mandate scope is used to indicate, and record screen file is encrypted, the encryption key of record screen file is obtained, according to adding Record screen file is encrypted in key, generates the record screen file after encryption;So that when the private data quilt of user Be recorded in screen file in when, terminal can according to the access mandate scope set by user, determine need to record screen file into Row encryption, so that subsequently when needing to play the record screen file, it is necessary to the record screen file could be played according to successful decryption, So as to avoid record screen file with the situation that plaintext version is preserved and private data is caused to be revealed, ensure that in record screen file Data safety.
It please refers to Fig.3, the naming method of the record screen file provided it illustrates the application another exemplary embodiment Flow chart.The present embodiment is illustrated with the naming method of the record screen file applied to implementation environment illustrated in fig. 1.The record The naming method of screen file includes:
Step 301, record screen file is obtained, record screen file is the video generated after recording a video to the display content in screen File.
Optionally, terminal gathers screen-picture after record screen function is started according to preset sample frequency, when terminal detects To stop control is corresponding stop operation when, according to stop operation terminate record screen function, while each frame screen to collecting picture Face is encoded, and synthesis obtains record screen file.
Wherein, the control provided in the main interface that control is record screen application is stopped, alternatively, being that record screen applies corresponding suspension The control that window is shown after deployment.It is for terminating the operable control of record screen function to stop control.Schematically, control is stopped Type include button, controllable entry, at least one of sliding block.The present embodiment is equal to the position and type for stopping control It is not limited.
Stop operation is for triggering the user's operation for terminating to stop the corresponding record screen function of control.Schematically, stop Operation includes the combination of any one or more in clicking operation, slide, pressing operation, long-press operation.
Optionally, stop operation and further include other possible realization methods.In a kind of possible realization method, stop behaviour Work is realized with speech form.For example, user is inputted in the terminal with speech form stops the corresponding voice signal of control, terminal obtains After getting voice signal, to the voice signal carry out parsing obtain voice content, when in voice content exist and stop control Presupposed information match keyword when, i.e., terminal determines that the stopping control being triggered, terminate record screen function.
In alternatively possible realization method, stop operation and realized in the form of shaking operation, shaking operation is Refer to the operation for rocking terminal.For example, user rocks terminal, corresponding, terminal shakes operation according to what is detected, determines to shake one It shakes the corresponding stopping control of operation to be triggered, terminates record screen function.The present embodiment does not limit the realization method stopped operation It is fixed.
Step 302, show that mandate sets interface at the end of record screen is detected, authorize and interface is set to include n setting Control, there are one-to-one relation, 1≤i≤n, n and i are just whole for i-th of setting control and i-th of access mandate scope Number.
When terminal terminates to record screen function, definite record screen terminates, and shows that mandate sets interface, and mandate setting interface is For prompting the interface that is configured to the access mandate scope of the record screen file, the access mandate scope include present terminal, One kind in authorization terminal and all terminals with access rights.
Setting control is the operable control for being used to set the access mandate scope of the record screen file that record screen application provides. Schematically, setting the type of control includes button.
Optionally, terminal is prestored to exist there are three setting control and three access mandate scopes and closed correspondingly System.Schematically, it is respectively to set control 41, set control 42 and set control 43 that three, which set control, these three set control Correspondence between part and three access mandate scopes is as shown in Figure 4.Set control 41 corresponding access mandate scope for " when Preceding terminal ", it is " authorization terminal " to set 42 corresponding access mandate scope of control, sets 43 corresponding access mandate scope of control For " all terminals ".
Based on the correspondence that Fig. 4 is provided, in a schematical example, as shown in Fig. 5 (a), authorize and interface is set 50 include three setting controls, respectively set control 41, set control 42 and set control 43, control 41 is set to correspond to and is carried Show information " only visible to oneself ", it is " present terminal " to be used to indicate and set 41 corresponding access mandate scope of control, sets control Part 42 corresponds to prompt message " visible to authorized user ", is used to indicate and sets 42 corresponding access mandate scope of control " to authorize Terminal " sets control 43 to correspond to prompt message " visible to all users ", is used to indicate and sets 43 corresponding access mandate of control Scope is " all terminals ".
Step 303, when detecting that the corresponding setting of i-th of setting control operates in mandate setting interface, i-th is set It puts corresponding i-th of access mandate scope of control and is determined as the corresponding access mandate scope of record screen file.
It is for triggering the user's operation being configured to the corresponding access mandate scope of setting control to set operation.It is optional , operation is set to include the combination of any one or more in clicking operation, slide, pressing operation, long-press operation.If Put operation and further include other possible realization methods, can analogy reference pair stop the corresponding associated description stopped operation of control, Details are not described herein.
When terminal, which detects that i-th of setting control is corresponding, sets operation, set control i-th corresponding by i-th Access mandate scope is determined as the corresponding access mandate scope of record screen file.
It refer to shown in Fig. 5 (a) and Fig. 5 (b), set control 42 corresponding in interface 50 when terminal detects that mandate is set When operation is set, determine that the corresponding access mandate scope of record screen file to set 42 corresponding access mandate scope of control, is " authorization terminal ".
Step 304, when access mandate scope is present terminal or authorization terminal, the encryption key of record screen file is obtained.
Optionally, when access mandate scope be present terminal when, terminal obtain record screen file encryption key, including but not It is limited to following two possible realization methods:
In the first possible implementation, terminal obtains biological characteristic, according to the biological characteristic got, generation record Shield the encryption key of file.
Wherein, biological characteristic includes the physiological characteristic or behavioural characteristic of people, has generality, uniqueness, uniqueness, steady The characteristics such as qualitative, acquisition property, biological characteristic are used for identity authentication.Wherein, generality refers to the feature that everyone possesses;Only One property refers to that this feature of any two people is different;Stability refers to that this feature will not wait the variation of conditions at any time And change, at least it is constant whithin a period of time;Acquisition property refers to that this feature is easy for acquisition and quantitative measurment.
Optionally, the biological characteristic that terminal is got be using the terminal user biological characteristic, including face characteristic, At least one of vocal print feature, fingerprint characteristic and iris feature.The present embodiment is not added with the type and quantity of biological characteristic To limit.
Optionally, terminal obtains biological characteristic by acquisition component, according to the biological characteristic got, using feature extraction Feature vector is calculated in algorithm, and feature vector is used to indicate biological characteristic, and the encryption of record screen file is generated according to feature vector Key.
Wherein, acquisition component includes front camera, Application on Voiceprint Recognition sensor, fingerprint Identification sensor and iris scan device At least one of.
Optionally, terminal is calculated feature vector using feature extraction algorithm, wraps according to the biological characteristic got It includes:The biological characteristic collected is pre-processed, then feature extraction is carried out to pretreated biological characteristic, so as to pass through Data after feature extraction are determined as the feature vector of biological characteristic.
Pretreatment is that the biological characteristic for getting acquisition component is handled, and obtains the biology of semi-structured data form The process of feature.Wherein, pretreatment includes Information Compression, noise reduction and data normalization.
Feature extraction is that Partial Feature is extracted from pretreated biological characteristic, and Partial Feature is converted to structuring The process of data.
In second of possible realization method, terminal obtains the password of input, the password of input is determined as encrypting close Key.
Optionally, terminal shows that password sets interface, and password sets interface to include inputting the input control of password, The corresponding definite operation of input control in interface is set according to password, the password of input is determined as encryption key.
Wherein, password includes at least one of number, letter and predetermined symbol.Predetermined symbol includes:Dash "-", At least one of underscore " _ ", symbol "@", symbol " # ", symbol " % ".
Optionally, input control is for inputting the operable control of password.The set-up mode of input control is included but not It is limited to following two possible realization methods:
In a kind of possible realization method, input control includes at least two input frames, and each input frame is used to input One character, the corresponding definite operation of input control are the input operation corresponding to the last one input frame in the input control.
For example, as shown in Fig. 6 (a), password, which sets interface 60 to include prompt message, " please input password:" and for defeated Enter the input control 61 of password, which includes six rectangle input frames, and each rectangle input frame is for input one Number.After terminal detects in the input control 61 the corresponding definite operation of the 6th rectangle input frame, directly by input Six passwords " 123456 " are determined as encryption key.
In alternatively possible realization method, input control includes an input frame, and the input frame is predetermined for inputting The character string of form, the corresponding definite operation of input control are the clicking operation of definite control corresponding with the input control.
For example, as shown in Fig. 6 (b), password, which sets interface 62 to include prompt message, " please input password:" and for inputting The input control 63 of password, the input control 63 include a rectangle input frame, which is used to input predetermined format Character string.The password sets interface 60 to further include the definite control 64 for showing word " definite ", when terminal detects password It sets and 64 corresponding clicking operation of control is determined in interface 62, obtain the password " 112233 " inputted in input control 63, determine Encryption key is " 112233 ".The present embodiment is not limited the set-up mode of input control.
It should be noted that when access mandate scope is present terminal, determine in the possible realization method of above two A kind of realization method, the encryption key of record screen file is obtained using this kind of realization method.The possible realization method of above two In a kind of realization method determine can be that pre-set or user selects.
Schematically, when access mandate scope is present terminal, terminal shows that key obtains interface, which obtains boundary Face includes two controls, is used to indicate when one of control is triggered and is obtained using the first above-mentioned possible realization method The encryption key of screen file is enrolled, is used to indicate when other in which control is triggered using above-mentioned second possible realization Mode obtains the encryption key of record screen file.
Optionally, when access mandate scope is authorization terminal, terminal obtains the encryption key of record screen file, including:It is aobvious Show that the password of the input control including being used to input password sets interface, according to password input control in interface is set to correspond to really Fixed operation, is determined as encryption key by the password of input.The process can analogy with reference to it is above-mentioned when access mandate scope for it is current eventually During end, terminal obtains second of possible realization method of the encryption key of record screen file, and details are not described herein.
Corresponding same access mandate scope, the different record screen corresponding encryption keys of file that present terminal is recorded Can be all different, can also be all identical, it is different there may also be at least two record screen corresponding encryption keys of file.
In order to simplify user's operation when record screen file is encrypted, same access mandate scope is corresponded to, currently eventually The recorded different record screen corresponding encryption key all sames of file in end.That is, terminal is previously stored with access mandate scope Default correspondence between encryption key.
Optionally, terminal obtains the encryption key of record screen file, including:Terminal is determined and visited according to default correspondence Ask the scope of authority corresponding encryption key.
In a schematical example, default correspondence such as Fig. 7 institutes between access mandate scope and encryption key Show.When access mandate scope is " present terminal ", corresponding encryption key is " key A 1 ";When access mandate scope is " to award Weigh terminal " when, corresponding encryption key is " key B1 ".
It should be noted that the mode that the present embodiment obtains terminal the encryption key of record screen file is not limited.
Step 305, record screen file is encrypted according to encryption key, generates the record screen file after encryption.
Terminal is encrypted record screen file after encryption key is got, using encryption key.Below only with end End illustrates exemplified by the file head module that record is shielded in file is encrypted according to encryption key.
Optionally, terminal obtains the first header data of record screen file, and the first header data includes being stored in record screen file Head and the data that storage area is the first predeterminable area;The first header data is encrypted using encryption key, obtains Two header datas, the storage area of the second header data is the second predeterminable area, and the second predeterminable area is less than the first predeterminable area; According to the remaining data in the second header data and record screen file in addition to the first header data, the record screen text after encryption is generated Part.
Schematically, terminal using encryption key and Advanced Encryption Standard (Advanced Encryption Standard, AES) the first header data is encrypted in Encryption Algorithm, obtains the second header data.
Wherein, AES encryption algorithm is block cipher, usually by key schedule and encryption (decryption) algorithm two It is grouped into.B byte user's master keys are extended to r sub-key by key schedule;Encryption Algorithm is by a cryptography R composition of minorant f and r sub-key iteration.
Optionally, encryption key is extended to several sub-keys by terminal, according to several sub-keys, using AES plus First header data is encrypted close algorithm, obtains the second header data.
Schematically, as shown in figure 8, total storage area of data is L in the record screen file, which includes first Header data and the remaining data in addition to the first header data, storage section of the header data in file is shielded in record is [0, L1- 1], and the storage area of storage section [0, L1-1] is the first predeterminable area L1, and remaining data is recording the storage area in shielding file Between for [L1, L-1], and store the storage area of section [L1, L-1] as L2, wherein, L=L1+L2, L, L1, L2 are just whole Number.
Optionally, terminal pre-sets encryption identification, and the encryption identification is added in the second header data, then will add Remaining data in the second header data and record screen file after adding in addition to the first header data is combined, and generates encryption Record screen file afterwards.Wherein, encryption identification is stored in the head of encrypted record screen file, is used to indicate the record screen file and has added It is close.
In conclusion the embodiment of the present application works as detection also by showing that mandate sets interface at the end of record screen is detected To authorize set interface in i-th set control it is corresponding set operation when, by i-th set control it is corresponding i-th access The scope of authority is determined as the corresponding access mandate scope of record screen file;So that terminal sets interface by the mandate of display, it can Whether need be encrypted the record screen file, and then determine the record screen file according to the selection of user if prompting the user with Corresponding access mandate scope meets the individual demand of user couple.
The embodiment of the present application is also by when access mandate scope is present terminal, passing through the biological characteristic or defeated of acquisition The encryption key of the password generation record screen file entered;When access mandate scope is authorization terminal, generated by the password of input The encryption key of record screen file so that the different access mandate scopes that terminal can be selected according to user are obtained using different Mode is taken to obtain encryption key, improves the flexibility for the encryption key for obtaining record screen file.
The embodiment of the present application also records the first header data of screen file by obtaining, using encryption key to the first head number According to being encrypted, the second header data is obtained, according to surplus in addition to the first header data in the second header data and record screen file Remainder evidence generates the record screen file after encryption;During so that terminal-pair record screen file being encrypted, it is only necessary to using encryption Key shields the first header data in file to record and is encrypted, and improves encryption efficiency.
Optionally, after step 305, the generation method of the record screen file, further includes the following steps, such as Fig. 9 institutes Show:
Step 901, when receiving the playing request of record screen file, the corresponding decruption key of record screen file, decryption are obtained Key is key corresponding with encryption key.
Wherein, the playing request of record screen file, which is indicated for terminal, needs what encrypted record screen file was played out Request.
Optionally, terminal is stored with the record screen file after record screen file is encrypted according to encryption key Encryption key and corresponding decruption key.
Schematically, pair being stored in terminal between mark, encryption key and decruption key this three of record screen file It should be related to.Wherein, the mark of record screen file is for the unique mark record screen file.
When terminal receives the playing request of record screen file, according to the mark of the record screen file carried in the playing request Know, search decruption key corresponding with the mark of the record screen file.
Optionally, terminal first obtains the second head of record screen file before the corresponding decruption key of record screen file is obtained Data, when inquiring encryption identification in the second header data of the terminal in record screen file, after judging the record screen file for encryption Record screen file, then the step of perform acquisition record screen file corresponding decruption key.
Wherein, the second header data includes the number for being stored in record screen top of file and storage area is the second predeterminable area According to.
Step 902, record screen file is decrypted according to decruption key, obtains the record screen file after decryption processing.
Optionally, terminal is decrypted the second header data using the decruption key, obtains after decruption key is got To the first header data, according to the remaining data in the first header data and record screen file in addition to the second header data, solved It is close treated record screen file.
Schematically, terminal is decrypted the second header data using decruption key and AES decipherment algorithms, obtains first Header data.The storage area of first header data is the first predeterminable area, and the first predeterminable area is more than the second predeterminable area.
Step 903, the record screen file after decryption processing is played out.
Terminal plays out the record screen file after decryption processing after record screen file is decrypted.
Optionally, player application is installed, above-mentioned steps 901 to step 903 are by the broadcasting in terminal in terminal Device application program is completed.
It should be noted that step 301 to step 305 can be implemented separately as a kind of encryption method for recording screen file, The encryption method of the record screen file is usually completed by present terminal, for record screen file to be encrypted;Step 901 to Step 903 is a kind of decryption method for recording screen file, and the decryption method of the record screen file is usually completed by authorization terminal, is used for Step 301 to the encrypted record screen file of step 305 is decrypted, so as to play the record screen file.In the embodiment of the present application In, the decryption method of the record screen file can be that present terminal is completed or in authorization terminal in addition to present terminal Other terminals complete, the present embodiment is not limited this, only with present terminal complete record screen file encryption method and It is illustrated exemplified by decryption method.
In a schematical example, the record screen application program in terminal A is after terminating to record screen function, to what is collected Each frame screen-picture is encoded, and synthesis obtains record screen file S1, while shows that mandate sets interface on the screen.When record screen should It is when with Programmable detection, into mandate setting interface, the corresponding setting of the 1st setting control operates, the 1st setting control is corresponding Access mandate scope " present terminal A " is determined as the corresponding access mandate scopes of record screen file S1, according to access mandate scope " when Preceding terminal A " determines to need that record screen file S1 is encrypted.Record screen application program opens camera, and acquisition uses the end The facial image of the user of A is held, biological characteristic is extracted from the facial image collected, and is somebody's turn to do using feature extraction algorithm The corresponding feature vector of biological characteristic generates the encryption key of record screen file S1 according to feature vector.Record screen application program uses Record screen file S1 is encrypted in the encryption key, generates and stores the record screen file S1 after encryption.As terminal A In player application when receiving the playing request of record screen file S1, it is close to obtain the corresponding decryption of record screen file S1 Key, the decruption key and encryption key are same key.Player application according to decruption key to record screen file S1 into Row decryption processing, and the record screen file S1 after decryption processing is played out.
It should be noted that since the generation method for recording screen file that above-described embodiment is provided is to use first to record to add afterwards What close mode, i.e. step 302 to step 305 were provided is " to get record in step 301 " to the ciphering process of record screen file " It is carried out after screen file ", can not ensure to be completed in record screen document recording and encrypt the letter for completing record screen file in this period Breath safety.
Therefore, in order to solve the above-mentioned technical problem, to record in the generation method of record screen file provided by the embodiments of the present application Shield the encryption method of file, further include:When terminal collects jth stack screen picture group, generation and jth stack screen picture group pair J-th of the index information answered, j are the positive integer that initial value is 1;Place is encrypted to j-th of index information according to encryption key Reason, obtains j-th of encrypted index information;J-th of encrypted index information is stored in the header data of record screen file In;At the end of record screen is detected, according to header data and m stack screen picture groups, generation record screen file, the head of record screen file Data include m encrypted index informations, and m is positive integer.
Optionally, when terminal collects jth stack screen picture group, generation is j-th corresponding with jth stack screen picture group Index information, including:Terminal gathers screen-picture according to preset sample frequency, whenever k frame screen-pictures are collected, by this k Frame screen-picture is determined as a stack screen picture group, generates index information corresponding with the screen-picture group.
Terminal is encrypted j-th of index information according to encryption key, obtains j-th of encrypted index letter J-th of encrypted index information is stored in the header data of record screen file by breath.
Wherein, in encryption, used encryption key all same is either different or exists extremely for each index information Few two index informations used encryption key in encryption is different.The present embodiment is not limited this.
Optionally, m encryption key is stored in terminal, terminal is according to the encryption key to described j-th index letter Breath is encrypted, including:When terminal collects jth stack screen picture group, j-th of encryption key is obtained, is used j-th J-th of index information is encrypted in encryption key.
It should be noted that the mode that is encrypted of j-th of index information of terminal-pair can analogy refer to above-mentioned implementation With the relevant description of encryption in example, details are not described herein.
Optionally, jth stack screen picture group is also stored in the video data stream of record screen file by terminal.
It optionally,, should according to header data and video data stream generation record screen file at the end of terminal detects record screen The header data of record screen file includes m encrypted index informations.Wherein, the header data of the record screen file of generation includes m A encrypted index information, i.e., including the corresponding encrypted index information of m stack screen picture groups.
It should be noted that the process that the record screen file of terminal-pair generation is decrypted can refer in above-described embodiment to record The associated description that screen file is decrypted, details are not described herein.
In a schematical example, terminal obtains the corresponding access mandate scopes of record screen file A, when access mandate model Enclose and be used to indicate when record screen file A is encrypted, obtain the encryption key of record screen file A, be respectively encryption key 1, Encryption key 2 and encryption key 3.When terminal collects the 1st stack screen picture group, (the 1st frame screen-picture to the 15th frame screen is drawn Face) when, index information 1 corresponding with the 1st stack screen picture group is generated, place is encrypted to index information 1 using encryption key 1 Reason, obtains encrypted index information 1, encrypted index information 1 is stored in the header data of record screen file A;Work as end When end collects the 2nd stack screen picture group (the 16th frame screen-picture to the 30th frame screen-picture), generation and the 2nd stack screen picture The corresponding index information 2 of group, is encrypted index information 2 using encryption key 2, obtains encrypted index information 2, Encrypted index information 2 is stored in the header data of record screen file A;When terminal collects the 3rd stack screen picture group ( 31 frame screen-pictures to the 45th frame screen-picture) when, index information 3 corresponding with the 3rd stack screen picture group is generated, uses encryption Index information 3 is encrypted in key 3, obtains encrypted index information 3, and encrypted index information 3 is stored in In the header data of record screen file A.At the end of terminal detects record screen, generated according to header data and 3 stack screen picture groups After the header data of record screen file A, record screen file A include encrypted index information 1, encrypted index information 2 and encryption Index information 3.
In conclusion the embodiment of the present application is according to preset sample frequency also by gathering screen-picture, whenever collecting k frames During screen-picture, index information corresponding with k frame screen-pictures is generated, index information is encrypted in place according to encryption key Reason, obtains encrypted index information;At the end of record screen is detected, according to m encrypted index informations, generation record screen text Part;It avoids using information security issue caused by encrypted mode after first recording so that terminal can be used in Lu Ping Encrypted mode realizes the encryption to record screen file, so that the record screen file generated after screen is recorded has as been encrypted Record screen file, ensure that greatest extent record screen file security.
Following is the application device embodiment, can be used for performing the application embodiment of the method.It is real for the application device The details not disclosed in example is applied, refer to the application embodiment of the method.
0 is please referred to Fig.1, it illustrates the knots for naming device for the record screen file that one exemplary embodiment of the application provides Structure schematic diagram.The name device of the record screen file can be by special hardware circuit, alternatively, software and hardware is implemented in combination with as figure Terminal in 1 all or part of, the name device of the record screen file includes:First acquisition module 1010, second obtains mould Block 1020, the 3rd acquisition module 1030 and encrypting module 1040.
First acquisition module 1010 records screen file for obtaining, and record shields file to be recorded to the display content in screen The video file generated as after;
Second acquisition module 1020 records the corresponding access mandate scope of screen file for obtaining, and access mandate scope is used for Indicate whether record screen file is encrypted;
3rd acquisition module 1030, for when access mandate scope be used to indicate to record screen file be encrypted when, Obtain the encryption key of record screen file;
Encrypting module 1040, for record screen file to be encrypted according to encryption key, after generating encryption Record screen file.
In the alternative embodiment provided based on embodiment illustrated in fig. 10, as shown in figure 11, access mandate scope bag It includes:One kind in present terminal, authorization terminal and all terminals with access rights, the device further include:
Determining module 1050, for when access mandate scope is present terminal or authorization terminal, determining access mandate model It encloses to be used to indicate and record screen file is encrypted;
Wherein, present terminal is a terminal in authorization terminal.
In the alternative embodiment provided based on embodiment illustrated in fig. 10, as shown in figure 11, the second acquisition module 1020, including:First display unit 1022 and the first determination unit 1024.
First display unit 1022 for showing that mandate sets interface at the end of record screen is detected, authorizes and sets interface Include n setting control, control and i-th of access mandate scope are set for i-th there are one-to-one relation, 1≤i≤n, N and i is positive integer;
First determination unit 1024 detects that mandate sets i-th of corresponding set of setting control in interface to grasp for working as When making, by i-th corresponding i-th of access mandate scope of control is set to be determined as the corresponding access mandate scope of record screen file.
In the alternative embodiment provided based on embodiment illustrated in fig. 10, as shown in figure 11, access mandate scope is Present terminal, the 3rd acquisition module 1030, including:Collecting unit 1031, computing unit 1032 and generation unit 1033.
Collecting unit 1031, for obtaining biological characteristic by acquisition component, it is special that biological characteristic includes face characteristic, vocal print At least one of sign, fingerprint characteristic and iris feature;
Computing unit 1032, for according to the biological characteristic that gets, using feature extraction algorithm be calculated feature to Amount, feature vector are used to indicate biological characteristic;
Generation unit 1033, for according to feature vector, the encryption key of generation record screen file.
In the alternative embodiment provided based on embodiment illustrated in fig. 10, as shown in figure 11, access mandate scope is Present terminal or authorization terminal, the 3rd acquisition module 1030, including:Second display unit 1034 and the second determination unit 1035.
Second display unit 1034, for showing that password sets interface, password sets interface to include inputting password Input control, password includes number, letter and at least one of spcial character;
Second determination unit 1035 for setting the corresponding definite operation of input control in interface according to password, will input Password be determined as encryption key.
In the alternative embodiment provided based on embodiment illustrated in fig. 10, as shown in figure 11, encrypting module 1040, bag It includes:Acquiring unit 1041, encryption unit 1042 and generation unit 1043.
Acquiring unit 1041, for obtaining the first header data for recording screen file, the first header data includes being stored in record Screen top of file and the data that storage area is the first predeterminable area;
Encryption unit 1042 for the first header data to be encrypted using encryption key, obtains the second header data, The storage area of second header data is the second predeterminable area, and the second predeterminable area is less than the first predeterminable area;
Generation unit 1043, for according to the remainder in the second header data and record screen file in addition to the first header data According to the record screen file after generation encryption.
In the alternative embodiment provided based on embodiment illustrated in fig. 10, as shown in figure 11, which further includes: 4th acquisition module 1060, deciphering module 1070 and playing module 1080.
4th acquisition module 1060, for when receiving the playing request of record screen file, it is corresponding to obtain record screen file Decruption key, decruption key are keys corresponding with encryption key;
Deciphering module 1070, for record screen file to be decrypted according to decruption key, after obtaining decryption processing Record screen file;
Playing module 1080, for being played out to the record screen file after decryption processing.
In the alternative embodiment provided based on embodiment illustrated in fig. 10, as shown in figure 11, deciphering module 1060, also For obtaining the second header data for recording screen file, the second header data includes being stored in record screen top of file and storage area is The data of second predeterminable area;The second header data is decrypted using decruption key, obtains the first header data, first The storage area of portion's data is the first predeterminable area, and the first predeterminable area is more than the second predeterminable area;According to the first header data Shield the remaining data in file in addition to the second header data with record, obtain the record screen file after decryption processing.
Correlative detail can be combined referring to figs. 2 to embodiment of the method shown in Fig. 9.Wherein, the first acquisition module 1010, second 1020 and the 3rd acquisition module 1030 of acquisition module is additionally operable to realize any other implicit or disclosed in above method embodiment With the relevant function of obtaining step;Encrypting module 1040 is additionally operable to realize any other implicit in above method embodiment or openly With the relevant function of encrypting step.
It should be noted that the device that above-described embodiment provides, when realizing its function, only with above-mentioned each function module Division for example, in practical application, can be completed as needed and by above-mentioned function distribution by different function modules, The internal structure of equipment is divided into different function modules, to complete all or part of function described above.In addition, The apparatus and method embodiment that above-described embodiment provides belongs to same design, and specific implementation process refers to embodiment of the method, this In repeat no more.
The application also provides a kind of computer-readable medium, is stored thereon with program instruction, and the program instruction is by processor The generation method for the record screen file that above-mentioned each embodiment of the method provides is realized during execution.
Present invention also provides it is a kind of comprising instruction computer program product, when run on a computer so that Computer performs the generation method of the record screen file described in above-mentioned each embodiment of the method.
Above-mentioned the embodiment of the present application sequence number is for illustration only, does not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that it is completely or partially walked in the document handling method of realization above-described embodiment Suddenly it can be completed by hardware, relevant hardware can also be instructed to complete by program, the program can be stored in In a kind of computer readable storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..More than Described is only the preferred embodiment of the application, all within spirit herein and principle not to limit the application, is made Any modification, equivalent substitution, improvement and etc., should be included within the protection domain of the application.

Claims (12)

1. a kind of generation method for recording screen file, which is characterized in that the described method includes:
The corresponding access mandate scope of record screen file is obtained, after the record screen file is records a video to the display content in screen The video file of generation, the access mandate scope are used to indicate whether that the record screen file is encrypted;
When the access mandate scope is used to indicate, and the record screen file is encrypted, the record screen file is obtained Encryption key;
The record screen file is encrypted according to the encryption key, generates the record screen file after encryption.
2. according to the method described in claim 1, it is characterized in that, the access mandate scope includes:Present terminal has and visits Ask one kind in the authorization terminal and all terminals of permission, it is described obtain the corresponding access mandate scope of the record screen file it Afterwards, further include:
When the access mandate scope is the present terminal or the authorization terminal, determine that the access mandate scope is used for Instruction is needed to the record screen file encryption;
Wherein, the present terminal is a terminal in the authorization terminal.
3. according to the method described in claim 2, it is characterized in that, described obtain the corresponding access mandate model of the record screen file It encloses, including:
When detect record screen at the end of show mandate set interface, it is described authorize set interface include n set control, i-th There are one-to-one relation, 1≤i≤n, the n and the i for a setting control and i-th of access mandate scope It is positive integer;
When detect it is described authorize set interface in i-th it is described set control it is corresponding set operation when, will be set described in i-th It puts corresponding i-th of the access mandate scope of control and is determined as the corresponding access mandate scope of the record screen file.
4. according to the method described in claim 2, it is characterized in that, the access mandate scope be the present terminal, it is described The encryption key of the record screen file is obtained, including:
Biological characteristic is obtained by acquisition component, the biological characteristic includes face characteristic, vocal print feature, fingerprint characteristic and iris At least one of feature;
According to the biological characteristic got, feature vector is calculated using feature extraction algorithm, described eigenvector is used In the instruction biological characteristic;
According to described eigenvector, the encryption key that file is shielded in the record is generated.
5. according to the method described in claim 2, it is characterized in that, the access mandate scope is the present terminal or described Authorization terminal, the encryption key for obtaining the record screen file, including:
Show that password sets interface, the password sets interface to include inputting the input control of password, the password bag Include at least one of number, letter and spcial character;
The corresponding definite operation of input control described in interface is set according to the password, the password of input is determined as institute State encryption key.
6. method according to any one of claims 1 to 5, which is characterized in that it is described according to the encryption key to the record Screen file is encrypted, and generates the record screen file after encryption, including:
The first header data of the record screen file is obtained, first header data includes being stored in the record screen top of file And the data that storage area is the first predeterminable area;
First header data is encrypted using the encryption key, obtains the second header data, second head The storage area of data is the second predeterminable area, and second predeterminable area is less than first predeterminable area;
According to the remaining data in second header data and the record screen file in addition to first header data, generation adds It is close treated it is described record screen file.
7. method according to any one of claims 1 to 5, which is characterized in that it is described according to the encryption key to the record Screen file is encrypted, and generates the record screen file after encryption, including:
When collecting jth stack screen picture group, j-th of index information corresponding with the jth stack screen picture group, institute are generated It is the positive integer that initial value is 1 to state j;
J-th of index information is encrypted according to the encryption key, obtains j-th of encrypted index letter Breath;
Described j-th encrypted index information is stored in the header data of the record screen file;
At the end of record screen is detected, according to the header data and the m groups screen-picture group, the record screen file is generated, The header data of the record screen file includes the m encrypted index informations, and the m is positive integer.
8. method according to any one of claims 1 to 5, which is characterized in that the method further includes:
When receiving the playing request of the record screen file, the corresponding decruption key of the record screen file, the decryption are obtained Key is key corresponding with the encryption key;
The record screen file is decrypted according to the decruption key, obtains the record screen file after decryption processing;
The record screen file after decryption processing is played out.
9. according to the method described in claim 8, it is characterized in that, it is described according to the decruption key to it is described record screen file into Row decryption processing obtains the record screen file after decryption processing, including:
The second header data of the record screen file is obtained, second header data includes being stored in the record screen top of file And the data that storage area is the second predeterminable area;
Second header data is decrypted using the decruption key, obtains the first header data, first head The storage area of data is the first predeterminable area, and first predeterminable area is more than second predeterminable area;
According to the remaining data in first header data and the record screen file in addition to second header data, solved It is close treated it is described record screen file.
10. a kind of generating means for recording screen file, which is characterized in that described device includes:
First acquisition module records screen file, after the record screen file is records a video to the display content in screen for obtaining The video file of generation;
Second acquisition module, for obtaining the corresponding access mandate scope of the record screen file, the access mandate scope is used for Indicate whether the record screen file is encrypted;
3rd acquisition module, for when the access mandate scope be used to indicate to it is described record screen file be encrypted when, Obtain the encryption key of the record screen file;
Encrypting module, for the record screen file to be encrypted according to the encryption key, after generating encryption The record screen file.
11. a kind of terminal, which is characterized in that the memory that the terminal includes processor, is connected with the processor, Yi Jicun The program instruction on the memory is stored up, the processor is realized when performing described program instruction as claim 1 to 8 is any The generation method of the record screen file.
12. a kind of computer readable storage medium, which is characterized in that be stored thereon with program instruction, described program instruction is located Manage the generation method that the screen file of the record as described in claim 1 to 8 is any is realized when device performs.
CN201711432596.2A 2017-12-26 2017-12-26 Method and device for generating screen recording file, terminal and storage medium Expired - Fee Related CN108052828B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711432596.2A CN108052828B (en) 2017-12-26 2017-12-26 Method and device for generating screen recording file, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711432596.2A CN108052828B (en) 2017-12-26 2017-12-26 Method and device for generating screen recording file, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN108052828A true CN108052828A (en) 2018-05-18
CN108052828B CN108052828B (en) 2021-02-23

Family

ID=62127957

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711432596.2A Expired - Fee Related CN108052828B (en) 2017-12-26 2017-12-26 Method and device for generating screen recording file, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN108052828B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110175441A (en) * 2019-04-12 2019-08-27 平安普惠企业管理有限公司 Data managing method, device, equipment and storage medium based on bio-identification
CN112565648A (en) * 2020-12-02 2021-03-26 用友网络科技股份有限公司 Robot behavior acquisition method and device, electronic equipment and readable storage medium
CN116611035A (en) * 2023-04-24 2023-08-18 苏州魔视智能科技有限公司 Application software running method, management method, device and readable storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101399633A (en) * 2008-10-17 2009-04-01 浙江大学 Interference resisting method combining Reed-Solomon code with grid coding modulation technique
CN102054051A (en) * 2009-11-04 2011-05-11 英特尔公司 Recording contents of display screens
CN103049685A (en) * 2013-01-23 2013-04-17 天津三星光电子有限公司 User multi-code management system and method
CN103310137A (en) * 2012-03-16 2013-09-18 宇龙计算机通信科技(深圳)有限公司 Method for safely accessing terminal and terminal
CN103491391A (en) * 2013-09-17 2014-01-01 深圳创维数字技术股份有限公司 Method and device for managing and controlling video playing and terminal equipment
CN103701978A (en) * 2012-09-27 2014-04-02 中国电信股份有限公司 Terminal and automatic multimedia file encryption method
CN104537315A (en) * 2014-12-27 2015-04-22 宁波江东恒冠信息技术有限公司 File usage authority management method, device and system
CN105653969A (en) * 2015-04-27 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Data processing method, apparatus and electronic equipment
CN106096384A (en) * 2016-06-15 2016-11-09 北京握奇智能科技有限公司 A kind of data processing method and device
US20160342800A1 (en) * 2015-05-19 2016-11-24 Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. Electronic device and hard disk device of electronic device
CN106920195A (en) * 2017-03-09 2017-07-04 郑州云海信息技术有限公司 A kind of teaching resource sharing system based on cloud computing

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101399633A (en) * 2008-10-17 2009-04-01 浙江大学 Interference resisting method combining Reed-Solomon code with grid coding modulation technique
CN102054051A (en) * 2009-11-04 2011-05-11 英特尔公司 Recording contents of display screens
CN103310137A (en) * 2012-03-16 2013-09-18 宇龙计算机通信科技(深圳)有限公司 Method for safely accessing terminal and terminal
CN103701978A (en) * 2012-09-27 2014-04-02 中国电信股份有限公司 Terminal and automatic multimedia file encryption method
CN103049685A (en) * 2013-01-23 2013-04-17 天津三星光电子有限公司 User multi-code management system and method
CN103491391A (en) * 2013-09-17 2014-01-01 深圳创维数字技术股份有限公司 Method and device for managing and controlling video playing and terminal equipment
CN104537315A (en) * 2014-12-27 2015-04-22 宁波江东恒冠信息技术有限公司 File usage authority management method, device and system
CN105653969A (en) * 2015-04-27 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Data processing method, apparatus and electronic equipment
US20160342800A1 (en) * 2015-05-19 2016-11-24 Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. Electronic device and hard disk device of electronic device
CN106096384A (en) * 2016-06-15 2016-11-09 北京握奇智能科技有限公司 A kind of data processing method and device
CN106920195A (en) * 2017-03-09 2017-07-04 郑州云海信息技术有限公司 A kind of teaching resource sharing system based on cloud computing

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110175441A (en) * 2019-04-12 2019-08-27 平安普惠企业管理有限公司 Data managing method, device, equipment and storage medium based on bio-identification
CN112565648A (en) * 2020-12-02 2021-03-26 用友网络科技股份有限公司 Robot behavior acquisition method and device, electronic equipment and readable storage medium
CN116611035A (en) * 2023-04-24 2023-08-18 苏州魔视智能科技有限公司 Application software running method, management method, device and readable storage medium

Also Published As

Publication number Publication date
CN108052828B (en) 2021-02-23

Similar Documents

Publication Publication Date Title
CN104967511B (en) The processing method and processing device of encryption data
CN107209821B (en) Method and authentication method for being digitally signed to electronic document
CN104732626B (en) Gate inhibition's authorization management method and system
CN108170844A (en) Storage method, device, terminal and the storage medium of record screen file
JP5184442B2 (en) Methods used in systems for digital authentication, encryption and signing
CN105429761B (en) A kind of key generation method and device
US8959357B2 (en) Biometric encryption and key generation
CN111431719A (en) Mobile terminal password protection module, mobile terminal and password protection method
WO2016045469A1 (en) Information encryption method and mobile terminal
CN104657674A (en) Isolation protection system and isolation protection method of private data in mobile phone
CN107194268A (en) A kind of information processing method, device, computer installation and readable storage medium storing program for executing
CN110175441A (en) Data managing method, device, equipment and storage medium based on bio-identification
JP2014508456A5 (en)
CN107180197A (en) file operation method and device
CN108052828A (en) Generation method, device, terminal and the storage medium of record screen file
CN111815833A (en) Hotel access control authentication system based on intelligent identification and encryption technology
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
CN106033625A (en) Lockset, mobile terminal, lockset control method, and lockset control system
CN112632593A (en) Data storage method, data processing method, device and storage medium
CN105989304A (en) File storage method, file reading method, file storage apparatus and file reading apparatus
CN106650372A (en) open method and device of administrator authority
CN114357418A (en) Encryption authentication method, system, terminal device, server and storage medium
CN105760733B (en) Data ciphering method and module, data access method and module
CN103684740A (en) Encrypting method and system, decrypting method and system, encryption and decryption method and system for photo album of mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210223