CN112231717A - Encrypted file name processing method and device, electronic equipment and storage medium - Google Patents

Encrypted file name processing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112231717A
CN112231717A CN201910636792.4A CN201910636792A CN112231717A CN 112231717 A CN112231717 A CN 112231717A CN 201910636792 A CN201910636792 A CN 201910636792A CN 112231717 A CN112231717 A CN 112231717A
Authority
CN
China
Prior art keywords
file name
file
processed
external
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910636792.4A
Other languages
Chinese (zh)
Inventor
倪桂欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Office Software Inc
Zhuhai Kingsoft Office Software Co Ltd
Original Assignee
Beijing Kingsoft Office Software Inc
Zhuhai Kingsoft Office Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Office Software Inc, Zhuhai Kingsoft Office Software Co Ltd filed Critical Beijing Kingsoft Office Software Inc
Priority to CN201910636792.4A priority Critical patent/CN112231717A/en
Publication of CN112231717A publication Critical patent/CN112231717A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the invention provides a processing method and device for encrypted file names, electronic equipment and a computer readable storage medium, wherein the method comprises the following steps: acquiring an encrypted file to be processed; outputting prompt information for setting external file names; acquiring an external file name input by a user based on the external file name setting prompt information; and setting the file name of the encrypted file to be processed as the external file name. The scheme provided by the embodiment of the invention processes the file name of the encrypted file, so that the file name displayed outside the encrypted file is the external file name instead of the original file name, thereby protecting the confidential information contained in the original file name of the encrypted file and improving the confidentiality of the encrypted file.

Description

Encrypted file name processing method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of file security technologies, and in particular, to a method and an apparatus for processing a file name of an encrypted file, an electronic device, and a computer-readable storage medium.
Background
With the development of science and technology, the living standard of people is continuously improved, and the application of electronic products is more and more common. At present, people generally use electronic equipment to store files, the files stored by the electronic equipment can be checked at any time, and the stored files are large in amount and not easy to lose. Files stored in the electronic equipment are provided with file names, so that a user can conveniently search and arrange the files.
However, many files involve secret information, and although the files can be encrypted by using an encryption mode to obtain encrypted files, the file names of the encrypted files still expose some secret information, so that the encrypted files are easy to find and crack. Therefore, a method for processing the file name of the encrypted file is needed to improve the security of the encrypted file.
Disclosure of Invention
Embodiments of the present invention provide a method and an apparatus for processing a file name of an encrypted file, an electronic device, and a computer-readable storage medium, so as to protect secret information included in an original file name of the encrypted file and improve the confidentiality of the encrypted file. The specific technical scheme is as follows:
in a first aspect, an embodiment of the present invention provides a method for processing a file name of an encrypted file, where the method includes:
acquiring an encrypted file to be processed;
outputting prompt information for setting external file names;
acquiring an external file name input by a user based on the external file name setting prompt information;
and setting the file name of the encrypted file to be processed as the external file name.
Optionally, after the step of setting the file name of the encrypted file to be processed as the external file name, the method further includes:
determining the corresponding relation between the external file name and the original file name of the encrypted file to be processed;
and storing the corresponding relation.
Optionally, after the step of storing the corresponding relationship, the method further includes:
when an external file name deleting instruction for the encrypted file to be processed is acquired, outputting external file name deleting prompt information;
deleting the external file name when acquiring the deletion operation of the user based on the external file name deletion prompt information;
and restoring the file name of the encrypted file to be processed into the original file name of the encrypted file to be processed based on the corresponding relation.
Optionally, before the step of outputting the prompt information for deleting the external filename, the method further includes:
outputting key input prompt information of the encrypted file to be processed;
acquiring a key input by a user based on the key input prompt message;
verifying whether the secret key is matched with a pre-recorded encryption secret key of the encrypted file to be processed, wherein the encryption secret key is a secret key recorded when the encrypted file to be processed is encrypted;
and if the external file name is matched with the external file name, executing the step of outputting the prompt information for deleting the external file name.
Optionally, before the step of restoring the file name of the encrypted file to be processed to the original file name of the encrypted file to be processed based on the corresponding relationship, the method further includes:
judging whether the folder in which the encrypted file to be processed is located contains a file with the same name as the original file name;
if not, the step of restoring the file name of the encrypted file to be processed into the original file name of the encrypted file to be processed based on the corresponding relation is executed;
if so, processing the original file name of the encrypted file to be processed according to a preset rule to obtain a target file name, and setting the target file name as the file name of the encrypted file to be processed.
Optionally, after the step of setting the file name of the encrypted file to be processed as the external file name, the method further includes:
and when a display instruction for the encrypted file to be processed is acquired, displaying the external file name of the encrypted file to be processed at a preset position.
Optionally, the step of displaying the external filename of the to-be-processed encrypted file at the preset position includes:
and in the file shortcut display column, after the original file name of the encrypted file to be processed, displaying the external file name according to a preset form.
In a second aspect, an embodiment of the present invention provides a processing apparatus for encrypting a file name, where the apparatus includes:
the file acquisition module is used for acquiring an encrypted file to be processed;
the prompt module is used for outputting prompt information for setting an external file name;
the external file name acquisition module is used for acquiring an external file name input by a user based on the external file name setting prompt information;
and the external file name setting module is used for setting the file name of the encrypted file to be processed as the external file name.
Optionally, the apparatus further comprises:
the relationship determination module is used for determining the corresponding relationship between the external file name and the original file name of the encrypted file to be processed after the step of setting the file name of the encrypted file to be processed as the external file name by the external file name setting module;
and the relation storage module is used for storing the corresponding relation.
Optionally, the apparatus further comprises:
the deletion prompting module is used for outputting external file name deletion prompting information when acquiring an external file name deletion instruction aiming at the encrypted file to be processed after the corresponding relation is stored in the relation storage module;
the deleting module is used for deleting the external file name when the deleting operation of the user based on the external file name deleting prompt information is acquired;
and the restoring module is used for restoring the file name of the encrypted file to be processed into the original file name of the encrypted file to be processed based on the corresponding relation.
Optionally, the apparatus further comprises:
the key prompt module is used for outputting the key input prompt information of the encrypted file to be processed before outputting the prompt information for deleting the external file name when the deletion prompt module acquires the external file name deletion instruction for the encrypted file to be processed;
the key acquisition module is used for acquiring a key input by a user based on the key input prompt message;
the key verification module is used for verifying whether the key is matched with an encryption key of the pre-recorded encrypted file to be processed, wherein the encryption key is a key recorded when the encrypted file to be processed is encrypted;
and the instruction receiving module is used for triggering the deletion prompting module to execute the step of outputting the external file name deletion prompting information when the keys are matched.
Optionally, the apparatus further comprises:
the judging module is used for judging whether the folder in which the encrypted file to be processed is located contains a file with the same name as the original file name or not before the file name of the encrypted file to be processed is restored to the original file name of the encrypted file to be processed by the restoring module based on the corresponding relation;
a first result processing module, configured to, if the determination result is negative, perform the step of restoring the file name of the encrypted file to be processed to the original file name of the encrypted file to be processed based on the correspondence;
and the second result processing module is used for processing the original file name of the encrypted file to be processed according to a preset rule to obtain a target file name and setting the target file name as the file name of the encrypted file to be processed under the condition that the judgment result is positive.
Optionally, the apparatus further comprises:
and the external file name display module is used for displaying the external file name of the encrypted file to be processed at a preset position when a display instruction for the encrypted file to be processed is acquired after the step of setting the file name of the encrypted file to be processed as the external file name by the external file name setting module.
Optionally, the external filename display module includes:
and the external file name display sub-module is used for displaying the external file name in a file shortcut display column according to a preset form after the original file name of the encrypted file to be processed.
In a third aspect, an embodiment of the present invention provides an electronic device, including a processor, a communication interface, a memory, and a communication bus, where the processor and the communication interface complete communication between the memory and the processor through the communication bus;
a memory for storing a computer program;
and a processor for implementing any one of the above-described steps of the method for processing the file name of the encrypted file when executing the program stored in the memory.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when being executed by a processor, the computer program implements the steps of any one of the above-mentioned methods for processing an encrypted file name.
In the scheme provided by the embodiment of the invention, the encrypted file to be processed is acquired, the prompt information for setting the external file name is output, the external file name input by the user based on the prompt information for setting the external file name is acquired, and the file name of the encrypted file to be processed is set as the external file name. The scheme provided by the embodiment of the invention processes the file name of the encrypted file, so that the file name displayed outside the encrypted file is the external file name instead of the original file name, thereby protecting the confidential information contained in the original file name of the encrypted file and improving the confidentiality of the encrypted file. Of course, not all of the advantages described above need to be achieved at the same time in the practice of any one product or method of the invention.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a processing method for encrypting a file name according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating setting of prompt information for an external filename according to an embodiment of the present invention;
fig. 3 is a flowchart of a corresponding relationship storage manner according to the embodiment shown in fig. 1 according to an embodiment of the present invention;
fig. 4 is a flowchart of deleting an external file name according to the embodiment shown in fig. 3;
fig. 5 is a schematic diagram illustrating a prompt message for deleting an external filename according to an embodiment of the present invention;
FIG. 6 is a flowchart of verification of external filename modification permission according to the embodiment of the present invention shown in FIG. 4;
FIG. 7 is a flowchart of restoring an original file name according to the embodiment shown in FIG. 4;
fig. 8 is a schematic diagram illustrating a display manner of an external filename according to an embodiment of the present invention;
FIG. 9 is a block diagram of a processing apparatus for encrypting a file name according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to protect confidential information contained in an original file name of an encrypted file and improve the confidentiality of the encrypted file, the embodiment of the invention provides a processing method and device of the file name of the encrypted file, electronic equipment and a computer-readable storage medium.
First, a method for processing an encrypted file name according to an embodiment of the present invention is described below.
The processing method for the file name of the encrypted file provided by the embodiment of the invention can be applied to any electronic device which needs to process the file name of the encrypted file, for example, a computer, a mobile phone, a smart watch, and the like, and is not limited specifically herein. For convenience of description, the electronic device is hereinafter simply referred to.
As shown in fig. 1, a processing method for encrypting a file name of a file includes:
s101, acquiring an encrypted file to be processed;
s102, outputting prompt information for setting external file names;
s103, acquiring an external file name input by a user based on the external file name setting prompt information;
s104, setting the file name of the encrypted file to be processed as the external file name.
Therefore, in the scheme provided by the embodiment of the invention, the electronic equipment can acquire the encrypted file to be processed, output the prompt information for setting the external file name, acquire the external file name input by the user based on the prompt information for setting the external file name, and set the file name of the encrypted file to be processed as the external file name. The scheme provided by the embodiment of the invention processes the file name of the encrypted file, so that the file name displayed outside the encrypted file is the external file name instead of the original file name, thereby protecting the confidential information contained in the original file name of the encrypted file and improving the confidentiality of the encrypted file.
When the user needs to process the file name of the encrypted file to further improve the confidentiality of the encrypted file, the user can send out a file name processing operation through a user interface provided by the electronic device. For example, the electronic device may display a processing button, and the like, and when a user operates the button in a manner of clicking, long-pressing, or the like, a file name processing operation may be issued, and the electronic device captures the user operation, and further determines an encrypted file corresponding to the user operation as an encrypted file to be processed, that is, an encrypted file to be processed.
Thus, in step S101, the electronic device can also obtain the encrypted file to be processed. It is reasonable that the file may be an encrypted file stored in the electronic device, may be an encrypted file downloaded from a network, or may be an encrypted file acquired from another electronic device.
For example, the electronic device downloads an encrypted file from the network, the file name of the encrypted file includes specific information of time, place, or transaction, the file name of the encrypted file may cause the information of the time, place, or transaction to be leaked, so that the confidentiality of the encrypted file is lowered, and the user needs to process the file name of the encrypted file, so that the electronic device may determine the encrypted file whose file name needs to be processed as the encrypted file to be processed.
After acquiring the encrypted file to be processed, the electronic device may prompt the user to input an external filename that is desired to be displayed, and in step S102, the electronic device may output external filename setting prompt information to prompt the user to input the external filename. For example, in a schematic diagram of the external file name setting prompt information shown in fig. 2, the user may be prompted to input the external file name desired to be set, and the input content is determined by the user. The input area 210 after the external filename is an external filename input area in the external filename setting prompt information output by the electronic device, and the user can input the external filename to be set in the external filename input area.
After the user inputs the external file name, the electronic device may also obtain the external file name input by the user, that is, execute step S103. For the external file name, generally, the file name cannot be the same as the file name of other files in the folder where the to-be-processed encrypted file is located, which easily causes confusion of file information. Therefore, if the external file name input by the user is the same as the file names of other files in the folder where the to-be-processed encrypted file is located, the electronic device can prompt the user that the external file name is used and prompt the user to replace the external file name.
After the electronic device obtains the external file name input by the user, step S104 may be executed, that is, the external file name is set as the file name of the encrypted file to be processed. For example, after the electronic device outputs the prompt information for setting the external filename, the user inputs "activity arrangement" based on the prompt information for setting the external filename, and the electronic device may acquire the content "activity arrangement" input by the user, and may set "activity arrangement" as the external filename of the to-be-processed encrypted file.
As an implementation manner of the embodiment of the present invention, as shown in fig. 3, after the step S104, the method may further include:
s301, determining a corresponding relation between the external file name and an original file name of the encrypted file to be processed;
in the steps of S101 to S104, the electronic device sets the file name of the to-be-processed encrypted file provided by the user as the external file name of the to-be-processed encrypted file, so as to protect the information carried by the original file name of the to-be-processed encrypted file. In the subsequent process of using the to-be-processed encrypted file, the user may need to restore the external file name to the original file name of the to-be-processed encrypted file, or may need to determine the original file name of the to-be-processed encrypted file, so that the original file name of the to-be-processed encrypted file may not be deleted, but may be stored.
To further facilitate subsequent restoration of the external filename of the encrypted file to be processed to the original filename, in an embodiment, the electronic device may determine a correspondence between the external filename and the original filename of the encrypted file to be processed for subsequent operations.
S302, storing the corresponding relation.
After determining the corresponding relationship, in order to restore the original file name of the encrypted file to be processed when needed, the electronic device may execute the step S302, that is, store the corresponding relationship determined in the step S301, where the storing manner may be preset, and the corresponding relationship may be stored in the attribute information, configuration information, or a designated storage location of the encrypted file to be processed, which is not limited specifically herein.
For example, when storing the corresponding relationship between the original file name and the external file name, the following method may be adopted: in the attribute information of the encrypted file to be processed, C is stored under the option of an external file name, and B is stored under the option of an original file name. By storing the corresponding relation between the original file name B and the external file name C in the mode, when the electronic equipment acquires an operation instruction of a user for checking the original file name of the encrypted file with the file name C, the original file name of the encrypted file with the file name C can be determined to be B according to the corresponding relation.
As can be seen, in this embodiment, after setting the file name of the encrypted file to be processed as the external file name, the electronic device may determine the corresponding relationship between the external file name and the original file name of the encrypted file to be processed, and store the corresponding relationship. Thus, the original file name of the encrypted file to be processed can be quickly determined when needed subsequently.
As an implementation manner of the embodiment of the present invention, as shown in fig. 4, after the step S302, the method may further include:
s401, outputting external file name deletion prompt information when an external file name deletion instruction for the encrypted file to be processed is acquired;
when the user needs to delete the set external file name, a delete instruction for the external file name can be issued. For example, the user may perform a double-click operation at a filename position displayed in the shortcut display field of the encrypted file to issue a delete instruction for deleting the external filename.
When the electronic device acquires an external file name deletion instruction sent by a user, it indicates that the user needs to delete the set external file name at the moment, so that the electronic device can output external file name deletion prompt information to prompt the user to delete the set external file name.
For example, the external file name of an encrypted file is set as "active arrangement", when the user needs to delete the file name of the encrypted file, the user may issue an external file name deletion instruction, and when the electronic device obtains the external file name deletion instruction, a deletion prompt message as shown in fig. 5 may be displayed to prompt the user to delete the external file name "active arrangement" input in 510.
S402, deleting the external file name when the deletion operation of the user based on the external file name deletion prompt information is acquired;
when the electronic equipment displays prompt information for deleting the external file name, the user can delete the set external file name according to the prompt information, and the electronic equipment can acquire the deletion operation performed by the user and further delete the external file name.
For example, the external file name of the encrypted file is "activity arrangement", and when the user performs the deletion operation according to the external file name deletion prompt information, the electronic device may acquire the operation of deleting the "activity arrangement" by the user, and further delete the "activity arrangement" of the external file name.
S403, restoring the file name of the encrypted file to be processed into the original file name of the encrypted file to be processed based on the corresponding relation.
After the external file name of the encrypted file is deleted, the electronic device may execute the step S403, determine an original file name corresponding to the external file name of the encrypted file according to the stored correspondence between the external file name of the encrypted file and the original file name, and set the original file name as the file name of the encrypted file.
For example, based on the example in step S401, if the original file name of the encrypted file whose external file name is set as "activity arrangement" is "unit important file", when the electronic device obtains an operation of deleting "activity arrangement" by the user, the electronic device may delete the external file name of the encrypted file as "activity arrangement", and then, according to the correspondence between the external file name of the encrypted file and the original file name, the electronic device may set the file name of the encrypted file as "unit important file".
As can be seen, in this embodiment, after storing the correspondence, the electronic device may output external filename deletion prompt information when acquiring an external filename deletion instruction for the encrypted file to be processed, delete the external filename when acquiring a deletion operation performed by a user based on the external filename deletion prompt information, and further restore the filename of the encrypted file to be processed to the original filename of the encrypted file to be processed based on the correspondence. Therefore, the file name of the encrypted file can be restored to the original file name of the encrypted file under the condition that the user needs to delete the set external file name, the information carried in the original file name is reserved, and the user can conveniently manage the encrypted file based on the original file name.
As an implementation manner of the embodiment of the present invention, as shown in fig. 6, before the step S401, the method may further include:
s601, outputting key input prompt information of the encrypted file to be processed;
when a user needs to delete the to-be-processed encrypted file with the set external file name, that is, when the external file name needs to be restored to the original file name, in order to ensure the security of the encrypted file and avoid malicious damage to the encrypted file, the electronic device can verify whether the user has the file name modification authority, and the electronic device can output key input prompt information of the to-be-processed encrypted file to prompt the user to input a key for verification.
S602, acquiring a key input by the user based on the key input prompt message;
the user can input the key according to the key input prompt message output by the electronic equipment, and the electronic equipment can acquire the key input by the user based on the key input prompt message. For example, the electronic device displays a key input box as the key input prompt message, and the user inputs "asdf" in the key input box, so that the electronic device can acquire the key "asdf" input by the user.
S603, verifying whether the secret key is matched with the pre-recorded encryption secret key of the encrypted file to be processed, and if so, executing the step of outputting the prompt information for deleting the external file name; if not, the user is prompted to re-enter the key.
The encryption key is a key recorded when the electronic equipment encrypts the to-be-processed encrypted file. That is, when the user encrypts the to-be-processed encrypted file, the user sets an encryption key for the to-be-processed encrypted file, and the electronic device can record the encryption key, where the encryption key is the key recorded when the electronic device encrypts the to-be-processed encrypted file.
For example, when encrypting the file J1, the key input by the user is "zxcv", the electronic device may encrypt the file J1 based on the key to obtain the encrypted file J1#, and the recorded key "zxcv" is the encryption key of the encrypted file J1 #.
After the key input by the user based on the key input prompt information is obtained, the electronic equipment can verify the key and judge whether the key can be matched with the encryption key of the encrypted file to be processed. If the key does not match the encryption key of the encrypted file to be processed, which indicates that the key input by the user is incorrect, the electronic device may prompt the user to re-input the key.
For example, if the encryption key recorded by the electronic device is "123456" and the key input by the user based on the key input prompting message is "132456" when the encrypted file to be processed is encrypted, the electronic device may determine that the key does not match the recorded encryption key, and the electronic device may prompt the user to re-input the key.
When the key input by the user based on the key input prompt information is matched with the encryption key of the encrypted file to be processed, it indicates that the user has the authority to modify the file name of the encrypted file to be processed, so the electronic device can execute the step of outputting the prompt information for deleting the external file name to prompt the user to delete the external file name.
It can be seen that, in this embodiment, before outputting the prompt information for deleting the external filename, the electronic device may output the prompt information for inputting the key of the encrypted file to be processed, obtain the key input by the user based on the prompt information for inputting the key, further verify whether the key matches the pre-recorded encryption key of the encrypted file to be processed, and if so, execute the step of outputting the prompt information for deleting the external filename. Therefore, only when the key input by the user is matched with the pre-recorded encryption key of the encrypted file to be processed, the file name of the encrypted file to be processed can be deleted, and the security of the encrypted file is further improved.
As an implementation manner of the embodiment of the present invention, as shown in fig. 7, before the step S403, the method may further include:
s701, judging whether the folder where the encrypted file to be processed is located contains a file with the same name as the original file name, if not, executing the step of restoring the file name of the encrypted file to be processed to the original file name of the encrypted file to be processed based on the corresponding relation; if yes, go to step S702;
because the file names of other files in the folder where the encrypted file to be processed is located may be the same as the original file name of the encrypted file to be processed, in order to avoid the problem of repeated naming, the electronic device may obtain the file names of other files in the folder where the encrypted file to be processed is located, and further determine whether the folder where the encrypted file to be processed is located contains the file with the same original file name.
When the folder in which the to-be-processed encrypted file is located does not contain the file with the same name as the original file name of the to-be-processed encrypted file, the electronic equipment can set the external file name of the to-be-processed file as the original file name of the to-be-processed file.
When the folder in which the encrypted file to be processed is located contains a file with the same name as its original file name, if the file name outside the file to be processed is set as its original file name, the problem of duplicate naming may occur, and in order to avoid this, the electronic device may execute step S702.
S702, processing the original file name of the encrypted file to be processed according to a preset rule to obtain a target file name, and setting the target file name as the file name of the encrypted file to be processed.
If the determination result in the step S701 is yes, the folder in which the encrypted file to be processed is located includes a file having the same name as the original file name of the encrypted file to be processed, and then the electronic device may process the original file name of the encrypted file to be processed according to a preset rule to obtain a target file name, and further set the target file name as the file name of the encrypted file to be processed, so as to avoid the problem of renaming.
For example, if the original file name of the encrypted file to be processed is "company-employee information table", and if a file with the file name of "company-employee information table" already exists in the folder in which the encrypted file to be processed exists, the electronic device may add "(1)" to the original file name of the encrypted file to be processed, and obtain the target file name "company-employee information table (1)".
Therefore, in the embodiment, when the folder in which the to-be-processed encrypted file is located contains the file with the same name as the original file name of the to-be-processed encrypted file, the file name can be set for the to-be-processed encrypted file smoothly, and the problem of repeated naming caused by the existence of the file with the same file name as the original file name of the to-be-processed encrypted file in the folder can be prevented.
As an implementation manner of the embodiment of the present invention, after the step S104, the method may further include:
and when a display instruction for the encrypted file to be processed is acquired, displaying the external file name of the encrypted file to be processed at a preset position.
After the file name of the encrypted file to be processed is set as the external file name, the electronic device can display the encrypted file to be processed after obtaining a display instruction sent by a user for the encrypted file to be processed, and in order to enable the user to know the external file name of the encrypted file to be processed, the electronic device can display the external file name of the encrypted file to be processed at a preset position.
For example, if the external filename of the to-be-processed encrypted file X is Z, when the user sends a display instruction for the to-be-processed encrypted file X, the electronic device obtains the display instruction, and may display the external filename Z at the upper right corner of the interface on which the to-be-processed encrypted file X is displayed.
As can be seen, in this embodiment, after setting the file name of the encrypted file to be processed as the external file name, when the electronic device obtains the display instruction for the encrypted file to be processed, the external file name of the encrypted file to be processed may be displayed at a preset position. Therefore, the user can check the external file name conveniently while checking the encrypted file to be processed.
As an implementation manner of the embodiment of the present invention, the step of displaying the external filename of the to-be-processed encrypted file at the preset position may include:
and in the file shortcut display column, after the original file name of the encrypted file to be processed, displaying the external file name according to a preset form.
When the electronic device displays a file, a file shortcut display bar is generally displayed above the interface, where some commonly used operation buttons may be included. In one embodiment, the electronic device can display the external file name of the encrypted file to be processed in the file shortcut display bar, so that the user can conveniently check the file name.
In order to inform the user of the external file name and the original file name of the encrypted file to be processed, the electronic device may display the external file name of the encrypted file to be processed in a preset form in the file shortcut display field after the original file name of the encrypted file to be processed.
The preset form may be determined according to factors such as user requirements, for example, the preset form may be displayed in brackets, displayed in bold, displayed in different colors, and the like, and is not limited specifically herein.
For example: as shown in fig. 8, the electronic device may put the external file name in parentheses in the shortcut display field of the encrypted file to be processed, and display the external file name after the original file name.
Therefore, in the embodiment, the electronic device can display the external file name in the file shortcut display field according to the preset form after the original file name of the encrypted file to be processed, so that the user can simultaneously view the original file name and the external file name of the encrypted file to be processed, and the user can conveniently record the file name and the like.
According to the method for processing the file name of the encrypted file provided in the foregoing embodiment of the present invention, correspondingly, another embodiment of the present invention further provides a processing apparatus for processing the file name of the encrypted file, a schematic structural diagram of which is shown in fig. 9, and the method includes:
a file obtaining module 901, configured to obtain an encrypted file to be processed;
a prompt module 902, configured to output prompt information for setting an external filename;
an external filename acquisition module 903, configured to acquire an external filename input by a user based on the external filename setting prompt information;
an external file name setting module 904, configured to set the file name of the encrypted file to be processed as the external file name.
Therefore, in the scheme provided by the embodiment of the invention, the encrypted file to be processed is acquired, the prompt information for setting the external file name is output, the external file name input by the user based on the prompt information for setting the external file name is acquired, and the file name of the encrypted file to be processed is set as the external file name. The scheme provided by the embodiment of the invention processes the file name of the encrypted file, so that the file name displayed outside the encrypted file is the external file name instead of the original file name, thereby protecting the confidential information contained in the original file name of the encrypted file and improving the confidentiality of the encrypted file.
As an implementation manner of the embodiment of the present invention, the apparatus further includes:
the relationship determination module is used for determining the corresponding relationship between the external file name and the original file name of the encrypted file to be processed after the step of setting the file name of the encrypted file to be processed as the external file name by the external file name setting module;
and the relation storage module is used for storing the corresponding relation.
As an implementation manner of the embodiment of the present invention, the apparatus further includes:
the deletion prompting module is used for outputting external file name deletion prompting information when acquiring an external file name deletion instruction aiming at the encrypted file to be processed after the corresponding relation is stored in the relation storage module;
the deleting module is used for deleting the external file name when the deleting operation of the user based on the external file name deleting prompt information is acquired;
and the restoring module is used for restoring the file name of the encrypted file to be processed into the original file name of the encrypted file to be processed based on the corresponding relation.
As an implementation manner of the embodiment of the present invention, the apparatus further includes:
the key prompt module is used for outputting the key input prompt information of the encrypted file to be processed before outputting the prompt information for deleting the external file name when the deletion prompt module acquires the external file name deletion instruction for the encrypted file to be processed;
the key acquisition module is used for acquiring a key input by a user based on the key input prompt message;
the key verification module is used for verifying whether the key is matched with an encryption key of the pre-recorded encrypted file to be processed, wherein the encryption key is a key recorded when the encrypted file to be processed is encrypted;
and the instruction receiving module is used for triggering the deletion prompting module to execute the step of outputting the external file name deletion prompting information when the keys are matched.
As an implementation manner of the embodiment of the present invention, the apparatus further includes:
the judging module is used for judging whether the folder in which the encrypted file to be processed is located contains a file with the same name as the original file name or not before the file name of the encrypted file to be processed is restored to the original file name of the encrypted file to be processed by the restoring module based on the corresponding relation;
a first result processing module, configured to, if the determination result is negative, perform the step of restoring the file name of the encrypted file to be processed to the original file name of the encrypted file to be processed based on the correspondence;
and the second result processing module is used for processing the original file name of the encrypted file to be processed according to a preset rule to obtain a target file name and setting the target file name as the file name of the encrypted file to be processed under the condition that the judgment result is positive.
As an implementation manner of the embodiment of the present invention, the apparatus further includes:
and the external file name display module is used for displaying the external file name of the encrypted file to be processed at a preset position when a display instruction for the encrypted file to be processed is acquired after the step of setting the file name of the encrypted file to be processed as the external file name by the external file name setting module.
As an implementation manner of the embodiment of the present invention, the external filename display module further includes:
and the external file name display sub-module is used for displaying the external file name in a file shortcut display column according to a preset form after the original file name of the encrypted file to be processed.
The embodiment of the present invention further provides an electronic device, as shown in fig. 10, the electronic device includes a processor 1001, a communication interface 1002, a memory 1003 and a communication bus 1004, wherein the processor 1001, the communication interface 1002 and the memory 1003 complete mutual communication through the communication bus 1004;
a memory 1003 for storing a computer program;
the processor 1001 is configured to implement the following steps when executing the program stored in the memory:
acquiring an encrypted file to be processed;
outputting prompt information for setting external file names;
acquiring an external file name input by a user based on the external file name setting prompt information;
and setting the file name of the encrypted file to be processed as the external file name.
Therefore, in the scheme provided by the embodiment of the invention, the encrypted file to be processed is acquired, the prompt information for setting the external file name is output, the external file name input by the user based on the prompt information for setting the external file name is acquired, and the file name of the encrypted file to be processed is set as the external file name. The scheme provided by the embodiment of the invention processes the file name of the encrypted file, so that the file name displayed outside the encrypted file is the external file name instead of the original file name, thereby protecting the confidential information contained in the original file name of the encrypted file and improving the confidentiality of the encrypted file.
As an implementation manner of the embodiment of the present invention, after the step of setting the file name of the encrypted file to be processed as the external file name, the method may further include:
determining the corresponding relation between the external file name and the original file name of the encrypted file to be processed;
and storing the corresponding relation.
As an implementation manner of the embodiment of the present invention, before the step of outputting the prompt information for deleting the external filename, the method further includes:
outputting key input prompt information of the encrypted file to be processed;
acquiring a key input by a user based on the key input prompt message;
verifying whether the secret key is matched with a pre-recorded encryption secret key of the encrypted file to be processed, wherein the encryption secret key is a secret key recorded when the encrypted file to be processed is encrypted;
and if the external file name is matched with the external file name, executing the step of outputting the prompt information for deleting the external file name.
As an implementation manner of the embodiment of the present invention, before the step of restoring the file name of the encrypted file to be processed to the original file name of the encrypted file to be processed based on the correspondence relationship, the method further includes:
judging whether the folder in which the encrypted file to be processed is located contains a file with the same name as the original file name;
if not, the step of restoring the file name of the encrypted file to be processed into the original file name of the encrypted file to be processed based on the corresponding relation is executed;
if so, processing the original file name of the encrypted file to be processed according to a preset rule to obtain a target file name, and setting the target file name as the file name of the encrypted file to be processed.
As an implementation manner of the embodiment of the present invention, after the step of setting the file name of the encrypted file to be processed as the external file name, the method further includes:
and when a display instruction for the encrypted file to be processed is acquired, displaying the external file name of the encrypted file to be processed at a preset position.
As an implementation manner of the embodiment of the present invention, the step of displaying the original file name of the encrypted file to be processed at the preset position includes:
and in the file shortcut display column, after the original file name of the encrypted file to be processed, displaying the external file name according to a preset form.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the electronic equipment and other equipment.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
In another embodiment of the present invention, a computer-readable storage medium is further provided, in which a computer program is stored, and the computer program, when executed by a processor, implements the steps of any one of the above methods for processing an encrypted file name.
Therefore, in the scheme provided by the embodiment of the invention, the encrypted file to be processed is acquired, the prompt information for setting the external file name is output, the external file name input by the user based on the prompt information for setting the external file name is acquired, and the file name of the encrypted file to be processed is set as the external file name. The scheme provided by the embodiment of the invention processes the file name of the encrypted file, so that the file name displayed outside the encrypted file is the external file name instead of the original file name, thereby protecting the confidential information contained in the original file name of the encrypted file and improving the confidentiality of the encrypted file.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the embodiments of the apparatus, the electronic device, and the computer-readable storage medium, since they are substantially similar to the embodiments of the method, the description is simple, and the relevant points can be referred to the partial description of the embodiments of the method.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (16)

1. A method for processing a file name of an encrypted file, the method comprising:
acquiring an encrypted file to be processed;
outputting prompt information for setting external file names;
acquiring an external file name input by a user based on the external file name setting prompt information;
and setting the file name of the encrypted file to be processed as the external file name.
2. The method according to claim 1, wherein after the step of setting the file name of the encrypted file to be processed as the external file name, the method further comprises:
determining the corresponding relation between the external file name and the original file name of the encrypted file to be processed;
and storing the corresponding relation.
3. The method of claim 2, wherein after the step of storing the correspondence, the method further comprises:
when an external file name deleting instruction for the encrypted file to be processed is acquired, outputting external file name deleting prompt information;
deleting the external file name when acquiring the deletion operation of the user based on the external file name deletion prompt information;
and restoring the file name of the encrypted file to be processed into the original file name of the encrypted file to be processed based on the corresponding relation.
4. The method according to claim 3, wherein before the step of outputting the external filename deletion prompt information, the method further comprises:
outputting key input prompt information of the encrypted file to be processed;
acquiring a key input by a user based on the key input prompt message;
verifying whether the secret key is matched with a pre-recorded encryption secret key of the encrypted file to be processed, wherein the encryption secret key is a secret key recorded when the encrypted file to be processed is encrypted;
and if the external file name is matched with the external file name, executing the step of outputting the prompt information for deleting the external file name.
5. The method according to claim 3, wherein before the step of restoring the file name of the encrypted file to be processed to the original file name of the encrypted file to be processed based on the correspondence relationship, the method further comprises:
judging whether the folder in which the encrypted file to be processed is located contains a file with the same name as the original file name;
if not, the step of restoring the file name of the encrypted file to be processed into the original file name of the encrypted file to be processed based on the corresponding relation is executed;
if so, processing the original file name of the encrypted file to be processed according to a preset rule to obtain a target file name, and setting the target file name as the file name of the encrypted file to be processed.
6. The method according to claim 1, wherein after the step of setting the file name of the encrypted file to be processed as the external file name, the method further comprises:
and when a display instruction for the encrypted file to be processed is acquired, displaying the external file name of the encrypted file to be processed at a preset position.
7. The method according to claim 6, wherein the step of displaying the external file name of the encrypted file to be processed at the preset position comprises:
and in the file shortcut display column, after the original file name of the encrypted file to be processed, displaying the external file name according to a preset form.
8. A processing apparatus that encrypts a file name, the apparatus comprising:
the file acquisition module is used for acquiring an encrypted file to be processed;
the prompt module is used for outputting prompt information for setting an external file name;
the external file name acquisition module is used for acquiring an external file name input by a user based on the external file name setting prompt information;
and the external file name setting module is used for setting the file name of the encrypted file to be processed as the external file name.
9. The apparatus of claim 8, further comprising:
the relationship determination module is used for determining the corresponding relationship between the external file name and the original file name of the encrypted file to be processed after the step of setting the file name of the encrypted file to be processed as the external file name by the external file name setting module;
and the relation storage module is used for storing the corresponding relation.
10. The apparatus of claim 9, further comprising:
the deletion prompting module is used for outputting external file name deletion prompting information when acquiring an external file name deletion instruction aiming at the encrypted file to be processed after the corresponding relation is stored in the relation storage module;
the deleting module is used for deleting the external file name when the deleting operation of the user based on the external file name deleting prompt information is acquired;
and the restoring module is used for restoring the file name of the encrypted file to be processed into the original file name of the encrypted file to be processed based on the corresponding relation.
11. The apparatus of claim 10, further comprising:
the key prompt module is used for outputting the key input prompt information of the encrypted file to be processed before outputting the prompt information for deleting the external file name when the deletion prompt module acquires the external file name deletion instruction for the encrypted file to be processed;
the key acquisition module is used for acquiring a key input by a user based on the key input prompt message;
the key verification module is used for verifying whether the key is matched with an encryption key of the pre-recorded encrypted file to be processed, wherein the encryption key is a key recorded when the encrypted file to be processed is encrypted;
and the instruction receiving module is used for triggering the deletion prompting module to execute the step of outputting the external file name deletion prompting information when the keys are matched.
12. The apparatus of claim 10, further comprising:
the judging module is used for judging whether the folder in which the encrypted file to be processed is located contains a file with the same name as the original file name or not before the file name of the encrypted file to be processed is restored to the original file name of the encrypted file to be processed by the restoring module based on the corresponding relation;
a first result processing module, configured to, if the determination result is negative, perform the step of restoring the file name of the encrypted file to be processed to the original file name of the encrypted file to be processed based on the correspondence;
and the second result processing module is used for processing the original file name of the encrypted file to be processed according to a preset rule to obtain a target file name and setting the target file name as the file name of the encrypted file to be processed under the condition that the judgment result is positive.
13. The apparatus of claim 8, further comprising:
and the external file name display module is used for displaying the external file name of the encrypted file to be processed at a preset position when a display instruction for the encrypted file to be processed is acquired after the step of setting the file name of the encrypted file to be processed as the external file name by the external file name setting module.
14. The apparatus of claim 13, wherein the external filename display module comprises:
and the external file name display sub-module is used for displaying the external file name in a file shortcut display column according to a preset form after the original file name of the encrypted file to be processed.
15. An electronic device is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing mutual communication by the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any of claims 1 to 7 when executing a program stored in the memory.
16. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of claims 1 to 7.
CN201910636792.4A 2019-07-15 2019-07-15 Encrypted file name processing method and device, electronic equipment and storage medium Pending CN112231717A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910636792.4A CN112231717A (en) 2019-07-15 2019-07-15 Encrypted file name processing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910636792.4A CN112231717A (en) 2019-07-15 2019-07-15 Encrypted file name processing method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112231717A true CN112231717A (en) 2021-01-15

Family

ID=74111153

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910636792.4A Pending CN112231717A (en) 2019-07-15 2019-07-15 Encrypted file name processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112231717A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230017368A1 (en) * 2021-07-16 2023-01-19 EMC IP Holding Company LLC File System Content Obfuscation in High Security Environments

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008250369A (en) * 2007-03-29 2008-10-16 Sorun Corp Management method of secrete data file, management system and proxy server therefor
CN104573536A (en) * 2015-01-28 2015-04-29 深圳市中兴移动通信有限公司 File protection method and device
WO2015184834A1 (en) * 2014-12-18 2015-12-10 中兴通讯股份有限公司 Encryption/decryption method and device for file of embedded type storage device, and terminal
CN106778295A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 File storage, display methods, device and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008250369A (en) * 2007-03-29 2008-10-16 Sorun Corp Management method of secrete data file, management system and proxy server therefor
WO2015184834A1 (en) * 2014-12-18 2015-12-10 中兴通讯股份有限公司 Encryption/decryption method and device for file of embedded type storage device, and terminal
CN104573536A (en) * 2015-01-28 2015-04-29 深圳市中兴移动通信有限公司 File protection method and device
CN106778295A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 File storage, display methods, device and terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230017368A1 (en) * 2021-07-16 2023-01-19 EMC IP Holding Company LLC File System Content Obfuscation in High Security Environments
US11947696B2 (en) * 2021-07-16 2024-04-02 EMC IP Holding Company LLC File system content obfuscation in high security environments

Similar Documents

Publication Publication Date Title
US11270267B2 (en) Sensitive information management
CN107431924B (en) Device theft protection associating device identifiers with user identifiers
WO2017143879A1 (en) File permission management method and device
WO2016154898A1 (en) Mobile terminal privacy protection method, protection apparatus, and mobile terminal
KR20130088171A (en) Method and device for protecting stored data in device
CN108400868B (en) Seed key storage method and device and mobile terminal
Tamma et al. Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices
CN103699830A (en) Operating system unlocking method and operating system unlocking device
US11496446B1 (en) Protecting personally identifiable information submitted through a browser
CN107390991B (en) A kind of processing method and mobile terminal of screenshot
WO2017020386A1 (en) Fingerprint verification method and apparatus
WO2023071990A1 (en) Privacy protection method and system
WO2015176531A1 (en) Terminal data writing and reading methods and devices
WO2017000638A1 (en) Network file access control method and device
US11797706B2 (en) Mobile device network traffic modification and user based restrictions on data access
CN106685945B (en) Service request processing method, service handling number verification method and terminal thereof
CN106100851A (en) Password management system, intelligent wristwatch and cipher management method thereof
CN111125020A (en) Block chain-based information security management method, system and server
CN107092834A (en) A kind of finger print data management method and terminal
Pieterse et al. Smartphone data evaluation model: Identifying authentic smartphone data
CN112231717A (en) Encrypted file name processing method and device, electronic equipment and storage medium
US9292698B1 (en) Method and system for remote forensic data collection
CN106778344B (en) A kind of data permission control method and terminal
JP6717131B2 (en) Control program, control method, information processing device, decoding program, decoding method, and terminal device
KR101745390B1 (en) Data leakage prevention apparatus and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination