CN118051923A - File intelligent unlocking method and device, computer equipment and storage medium - Google Patents

File intelligent unlocking method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN118051923A
CN118051923A CN202311813103.5A CN202311813103A CN118051923A CN 118051923 A CN118051923 A CN 118051923A CN 202311813103 A CN202311813103 A CN 202311813103A CN 118051923 A CN118051923 A CN 118051923A
Authority
CN
China
Prior art keywords
file
parameter information
equipment
unlocked
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311813103.5A
Other languages
Chinese (zh)
Inventor
李欣睿
黄斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202311813103.5A priority Critical patent/CN118051923A/en
Publication of CN118051923A publication Critical patent/CN118051923A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephone Function (AREA)

Abstract

The invention provides a method, a device, computer equipment and a storage medium for intelligently unlocking a file, wherein the method comprises the steps of acquiring parameter information of equipment to be associated; detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated; determining an encrypted file corresponding to the parameter information as a file to be unlocked; and controlling the file to be unlocked. By detecting the encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated, the file system in the mobile terminal is associated with the intelligent household equipment, so that the encrypted file is unlocked when the mobile terminal approaches the intelligent household equipment, the condition of complicated steps when the encrypted file is accessed is effectively avoided, and the experience effect of a user is enhanced.

Description

File intelligent unlocking method and device, computer equipment and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and apparatus for intelligently unlocking a file, a computer device, and a storage medium.
Background
Along with the rapid development of technology and the improvement of living standard of people, intelligent household equipment has become an indispensable part of daily life of people. Various intelligent household devices such as intelligent door locks, intelligent illumination, intelligent sound equipment and the like are gradually accepted and favored by consumers with the advantages of convenience, intelligence, high efficiency and the like.
However, although smart home devices have been widely used, the existing mobile phone file system generally only supports a single unlocking mode, such as a password, a fingerprint, and the like, and cannot be linked with the smart home, so that a user needs complicated operation steps when accessing some proprietary or encrypted files, and experience is not convenient enough.
Disclosure of Invention
Based on the foregoing, it is necessary to provide a method, an apparatus, a computer device and a storage medium for intelligently unlocking a file.
An intelligent unlocking method for a file, comprising the following steps:
acquiring parameter information of equipment to be associated;
Detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated;
determining an encrypted file corresponding to the parameter information as a file to be unlocked;
And controlling the file to be unlocked.
In one embodiment, the parameter information includes an identification number, and the encrypted file corresponding to the parameter information is at least one;
the step of detecting the encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated comprises the following steps:
And acquiring the encrypted file corresponding to the identification number of the equipment to be associated according to the identification number of the equipment to be associated based on the corresponding relation between the identification number and the encrypted file.
In one embodiment, the method further comprises:
Acquiring a user unlocking instruction;
the step of determining that the encrypted file corresponding to the parameter information is the file to be unlocked comprises the following steps:
and determining one of the encrypted files as the file to be unlocked from at least one encrypted file corresponding to the parameter information according to the user unlocking instruction.
In one embodiment, after the step of detecting the encrypted file corresponding to the parameter information according to the parameter information of the device to be associated, the method further includes:
Acquiring a file list, wherein the file list records at least one encrypted file corresponding to the parameter information;
And controlling the file list to be displayed.
In one embodiment, the method further comprises:
generating a first key based on the identification number;
And encrypting the file to be unlocked through the first key.
In one embodiment, the step of controlling the unlocking of the file to be unlocked includes:
generating a second key based on the identification number;
And controlling the file to be unlocked through the second key.
In one embodiment, the step of obtaining parameter information of the device to be associated includes:
detecting whether a preset wireless signal of the equipment to be associated exists in a preset range;
And when the preset wireless signal of the equipment to be associated exists in the preset range, acquiring the parameter information of the equipment to be associated.
An intelligent unlocking device for a file, comprising:
the identification module is used for acquiring parameter information of the equipment to be associated;
The storage module is used for detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated;
The unlocking determining module is used for determining an encrypted file corresponding to the parameter information as a file to be unlocked;
and the control module is used for controlling the unlocking of the file to be unlocked.
A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor when executing the computer program performs the steps of:
acquiring parameter information of equipment to be associated;
Detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated;
determining an encrypted file corresponding to the parameter information as a file to be unlocked;
And controlling the file to be unlocked.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
acquiring parameter information of equipment to be associated;
Detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated;
determining an encrypted file corresponding to the parameter information as a file to be unlocked;
And controlling the file to be unlocked.
According to the intelligent unlocking method, the intelligent unlocking device, the computer equipment and the storage medium for the files, the parameter information of the equipment to be associated is obtained, the encrypted files corresponding to the parameter information are detected according to the parameter information of the equipment to be associated, the encrypted files corresponding to the parameter information are determined to be the files to be unlocked, and then the files to be unlocked are controlled to be unlocked. In this way, by detecting the encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated, the file system in the mobile terminal is associated with the intelligent household equipment, so that the encrypted file is unlocked when the mobile terminal approaches the intelligent household equipment, the condition of complicated steps when accessing the encrypted file is effectively avoided, and the experience effect of a user is enhanced.
Drawings
FIG. 1 is a flow chart of a method for intelligently unlocking a file in one embodiment;
FIG. 2 is a block diagram of an intelligent unlocking device for files in one embodiment;
FIG. 3 is an internal block diagram of a computer device in one embodiment;
Fig. 4 is a flow chart of a method for intelligently unlocking a file in another embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
Example 1
In this embodiment, as shown in fig. 1, there is provided a method for intelligently unlocking a file, which includes:
step 110, obtaining parameter information of the device to be associated.
It should be understood that the device to be associated refers to an intelligent home device to be associated by a file system in the mobile terminal, wherein the type of the intelligent home device to be associated by the file system is set by a user. In this embodiment, the device to be associated is monitored to obtain the parameter information of the device to be associated. In some embodiments, the device to be associated first sends its parameter information to the mobile terminal, and the mobile terminal stores the parameter information of the device to be associated. In some embodiments, the parameter information of the device to be associated is collected and stored. In summary, when the smart home devices to be associated are set, the stored parameter information of the devices to be associated can be called for use.
And 120, detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated.
In this embodiment, after obtaining the parameter information of the device to be associated, at this time, an encrypted file corresponding to the parameter information needs to be detected in a file system according to the parameter information, where the file system has a plurality of encrypted files. In some embodiments, encrypting a file generally refers to a technique of encrypting the file using an encryption algorithm to achieve security protection of the file. It can be applied to different scenes such as protection of private documents, security of document transmission, security of electronic commerce transactions, etc.
And 130, determining the encrypted file corresponding to the parameter information as the file to be unlocked.
In this embodiment, after detecting an encrypted file corresponding to parameter information, the encrypted file is determined as a file to be unlocked, where the file to be unlocked is a file to be unlocked, that is, the encrypted or locked file is unlocked in a specific manner, so that the encrypted or locked file can be normally opened, edited, saved and shared, and the traditional file restriction can be broken through, so that the user can manage and utilize the file more freely.
In some embodiments, the number of the encrypted files corresponding to the parameter information may be one or more, and when the number of the encrypted files corresponding to the parameter information is one, the encrypted files are determined as files to be unlocked. When the number of the encrypted files corresponding to the parameter information is a plurality of, determining one of the encrypted files as the file to be unlocked from the plurality of encrypted files. In some embodiments, whether an encrypted file corresponding to the parameter information exists in the file system is detected according to the parameter information of the device to be associated, and when the encrypted file corresponding to the parameter information exists in the file system, the encrypted file corresponding to the parameter information is determined to be the file to be unlocked.
And 140, controlling the file to be unlocked.
In the embodiment, the unlocking of the file to be unlocked is controlled through the asymmetric encryption algorithm, namely the encrypted file is decrypted, and the security of unlocking the encrypted file is higher through the setting of the asymmetric encryption algorithm, so that unauthorized users are prevented from accessing and tampering with the file content, and the risk of information leakage is greatly reduced. In some embodiments, the unlocking of the file to be unlocked can also be controlled by a symmetric encryption algorithm and a hash algorithm.
In the above embodiment, the parameter information of the device to be associated is obtained, the encrypted file corresponding to the parameter information is detected according to the parameter information of the device to be associated, the encrypted file corresponding to the parameter information is determined to be the file to be unlocked, and then the file to be unlocked is controlled to be unlocked. In this way, by detecting the encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated, the file system in the mobile terminal is associated with the intelligent household equipment, so that the encrypted file is unlocked when the mobile terminal approaches the intelligent household equipment, the condition of complicated steps when accessing the encrypted file is effectively avoided, and the experience effect of a user is enhanced.
In one embodiment, the parameter information includes an identification number, and the encrypted file corresponding to the parameter information is at least one;
the step of detecting the encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated comprises the following steps:
And acquiring the encrypted file corresponding to the identification number of the equipment to be associated according to the identification number of the equipment to be associated based on the corresponding relation between the identification number and the encrypted file.
In this embodiment, the parameter information includes an identification number, where the identification number is an identification number of a device to be associated, that is, a device ID (Identity Document) of the smart home device. In some embodiments, the number of encrypted files corresponding to the parameter information may be one or more.
It should be understood that there is a correspondence between the identification numbers and the encrypted files, such that each identification number corresponds to at least one encrypted file, that is, each identification number corresponds to one encrypted file, or each identification number corresponds to a plurality of encrypted files. In this embodiment, an encrypted file corresponding to the identification number is detected according to the identification number of the device to be associated, that is, based on the correspondence between the identification number and the encrypted file, the identification number of the device to be associated is compared with the identification number corresponding to each encrypted file, so as to obtain at least one encrypted file corresponding to the identification number of the device to be associated. In some embodiments, when the number of encrypted files corresponding to the identification number of the device to be associated is one, then the encrypted file is determined to be the file to be unlocked. When the number of the encrypted files corresponding to the identification number of the equipment to be associated is a plurality of, selecting one of the encrypted files from the plurality of encrypted files, and determining the encrypted file as the file to be unlocked. In summary, it can be known that by detecting the encrypted file corresponding to the parameter information according to the parameter information of the device to be associated, the file system in the mobile terminal is associated with the smart home device, so that the encrypted file is unlocked when the mobile terminal approaches the smart home device, the complicated steps when accessing the encrypted file are effectively avoided, and the experience effect of the user is enhanced.
In one embodiment, the method further comprises:
Acquiring a user unlocking instruction;
the step of determining that the encrypted file corresponding to the parameter information is the file to be unlocked comprises the following steps:
and determining one of the encrypted files as the file to be unlocked from at least one encrypted file corresponding to the parameter information according to the user unlocking instruction.
It should be understood that, after the encrypted file corresponding to the identification number of the device to be associated is acquired, the number of the encrypted files corresponding to the identification number of the device to be associated may be one or more. After obtaining at least one encrypted file corresponding to the identification number of the device to be associated, the user selects at least one encrypted file corresponding to the identification number of the device to be associated, so as to confirm the selected file to be unlocked. In this embodiment, a user unlocking instruction is obtained, that is, an instruction that a user selects an encrypted file from at least one encrypted file corresponding to an identification number of a device to be associated to unlock the device, and determines that the encrypted file is the file to be unlocked from the at least one encrypted file according to the user unlocking instruction.
In one embodiment, after the step of detecting the encrypted file corresponding to the parameter information according to the parameter information of the device to be associated, the method further includes:
Acquiring a file list, wherein the file list records at least one encrypted file corresponding to the parameter information;
And controlling the file list to be displayed.
It should be understood that after detecting the encrypted file corresponding to the identification number according to the identification number of the device to be associated, at least one encrypted file corresponding to the identification number is obtained, and at least one encrypted file corresponding to the identification number is recorded in the file list. In this embodiment, after detecting an encrypted file corresponding to the parameter information according to the parameter information of the device to be associated, the user selects an encrypted file from at least one encrypted file corresponding to the identification number in the file list as the file to be unlocked by obtaining the file list and controlling the file list to be displayed, and effectively manages at least one encrypted file corresponding to the identification number.
In one embodiment, the method further comprises:
generating a first key based on the identification number;
And encrypting the file to be unlocked through the first key.
In this embodiment, after obtaining parameter information of a device to be associated, that is, an identification number of the device to be associated is obtained, the identification number is parsed to obtain a first key, where the first key may also be referred to as a public key. It should be appreciated that the public key is used to encrypt data, and that when encrypting a file, the file is encrypted by the public key, resulting in an encrypted file.
In one embodiment, the step of controlling the unlocking of the file to be unlocked includes:
generating a second key based on the identification number;
And controlling the file to be unlocked through the second key.
In this embodiment, the identification number is parsed to obtain a second key, which may also be referred to herein as a private key. It should be understood that, the private key is used for decrypting data, and when an encrypted file is determined to be a file to be unlocked from at least one encrypted file, the file to be unlocked is unlocked by the private key, so as to obtain an unlocked file. It should be appreciated that the security of the asymmetric encryption algorithm depends on the confidentiality of the private key, and that the encrypted file can be successfully unlocked, i.e. decrypted, by the correct private key when the encrypted file is unlocked. Thus, the security and reliability of the file system are effectively improved. And the parameter information of the equipment to be associated is acquired, and the security performance of unlocking the encrypted file is improved by unlocking the encrypted file corresponding to the equipment to be associated. In some embodiments, the process of generating the first key and the second key based on the identification number is: the method comprises the steps of obtaining an initial public key and an initial private key, associating an identification number with the initial public key and the initial private key, namely embedding the identification number into the initial public key and the initial public key, and obtaining a first key and a second key corresponding to the identification number of equipment to be associated so as to be used in the subsequent encryption and decryption processes.
In one embodiment, the step of obtaining parameter information of the device to be associated includes:
detecting whether a preset wireless signal of the equipment to be associated exists in a preset range;
And when the preset wireless signal of the equipment to be associated exists in the preset range, acquiring the parameter information of the equipment to be associated.
It should be understood that the predetermined range is preset, and the device to be associated is set with a preset wireless signal in advance. In some embodiments, the preset wireless signal includes a bluetooth signal, a wireless local area network signal, or an NFC signal, where the preset wireless signal is mainly used to detect whether a device to be associated exists in a preset range, that is, detect whether an intelligent home device to be associated exists in the preset range. In this embodiment, whether a preset wireless signal of the device to be associated exists in a preset range is detected, when the preset wireless signal of the device to be associated exists in the preset range, parameter information of the device to be associated is obtained, then an encrypted file corresponding to the identification number is detected according to the identification number of the device to be associated, the encrypted file corresponding to the identification number is determined to be the file to be unlocked according to a user unlocking instruction, and then the unlocking of the file to be unlocked is controlled. In this way, the corresponding parameter information of the equipment to be associated is obtained by identifying the preset wireless signal of the equipment to be associated, the encrypted file is searched according to the parameter information, and the encrypted file to be unlocked is unlocked according to the unlocking instruction of the user, so that flexible unlocking of different intelligent household equipment and safety protection of the encrypted file are realized. For example, when the user holds the mobile terminal close to the smart home device and both the mobile terminal and the smart home device are within a preset range, the mobile terminal detects that a preset wireless signal of the device to be associated exists within the preset range, and the user selects an encrypted file corresponding to the identification number and controls the encrypted file to unlock.
In some embodiments, when a preset wireless signal of the device to be associated exists in a preset range, parameter information of the device to be associated is automatically obtained, and at least one encrypted file corresponding to the identification number is controlled to be unlocked. Therefore, the corresponding parameter information of the equipment to be associated is obtained by identifying the preset wireless signal of the equipment to be associated, and the encrypted file to be unlocked is retrieved according to the parameter information, so that the encrypted file to be unlocked can be unlocked, unlocking of the encrypted file when the mobile terminal approaches the intelligent household equipment is realized, the complicated steps when the encrypted file is accessed are effectively avoided, and the experience effect of a user is enhanced. For example, when the user holds the mobile terminal close to the intelligent home equipment and the mobile terminal and the intelligent home equipment are both in the preset range, the mobile terminal detects that the preset wireless signal of the equipment to be associated exists in the preset range, and controls the encrypted file corresponding to the identification number to be automatically unlocked and then pushed to the user for selection.
It should be understood that, although the steps in the flowchart of fig. 1 are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 1 may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of other steps or sub-steps of other steps.
Example two
In this embodiment, as shown in fig. 4, there is provided a method for intelligently unlocking a file, which includes:
Step one, a user needs to set a file system associated with intelligent household equipment at a mobile phone end. In the setup process, the user needs to input personal information and select the type of smart home device to be associated. The information is stored in the cloud server and bound with the mobile phone equipment ID of the user. The type of the intelligent home equipment can be selected and specified by a user so as to determine the encryption mode of the encrypted file, for example, the content related to the wifi password, and the equipment ID of the router is specified to be encrypted; the encryption file of the smart bed designates the encryption using the device ID of the smart bed.
And secondly, when the user approaches the intelligent household equipment, the intelligent household equipment automatically senses the mobile phone equipment of the user through the Bluetooth, wi-Fi and other identification modules, and a file system of the mobile phone end is activated. The file system is activated by the approach of the user to the intelligent household equipment, so that the convenience of unlocking the encrypted file is improved, and the flexible unlocking of different intelligent household equipment is realized by identifying the type of the intelligent household equipment and searching the encrypted file associated with the type of the intelligent household equipment.
And thirdly, encrypting by using an identification number (namely, an equipment ID) of the intelligent household equipment as a key in the encryption process, namely, forming a corresponding public key and a corresponding private key after the identification number is processed, comparing the identification number with an encrypted file in a file system, wherein the decryption can be performed only by using the corresponding key provided by the intelligent household equipment in the decryption process, the file system can search an encrypted file associated with the identification number according to the identification number of the intelligent household equipment which is close to a user, and displaying an unlocked file list on a mobile terminal screen, wherein the file list records at least one encrypted file corresponding to parameter information.
And step four, the user can select the file to be unlocked according to the requirement. In the unlocking process, the file system calls the control module to unlock the file. The control module will decrypt and restore the file by an encryption algorithm so that it can be read and edited by the user. The encryption algorithm is an asymmetric encryption algorithm, the asymmetric encryption algorithm uses a public key and a private key, and the private key is unique to the intelligent household equipment, so that an encrypted file can be decrypted only by using the private key owned by the equipment. The control module is used for unlocking the encrypted file associated with the intelligent household equipment, so that the safety performance of unlocking the encrypted file is improved.
And fifthly, in the whole unlocking process, the file system and the control module encrypt and protect the unlocked file, and prevent unauthorized users from accessing and tampering with the file content. Meanwhile, the file system performs data synchronization with the cloud server at regular intervals, and updates the unlocked file list and user information. It should be understood that before the file in the file system of the mobile phone terminal is unlocked, the content in the file cannot be obtained, but after the mobile phone terminal is unlocked by using the password, the file content of the mobile phone terminal can be obtained. In the application, the file is encrypted by the public key to obtain the encrypted file, and the encrypted file is decrypted by the private key during decryption. Therefore, the encryption and decryption modes are changed from using passwords to using public keys and private keys corresponding to the identification numbers of the intelligent household equipment, and the safety and reliability of the file system are effectively improved. And the identification number of the intelligent home equipment is obtained, and the corresponding encrypted file is unlocked, so that the safety performance of unlocking the encrypted file is improved.
According to the method, the file system is activated by the approach of the user to the intelligent home equipment, so that the convenience of unlocking the encrypted file is improved, and the flexible unlocking of different intelligent home equipment is realized by identifying the type of the intelligent home equipment and retrieving the associated encrypted file. And the control module is used for unlocking the encrypted file associated with the intelligent household equipment, so that the safety performance of unlocking the encrypted file is improved.
According to the intelligent home equipment unlocking method and device, through the sensing and automatic searching functions of the intelligent home equipment and the unlocking operation of the control module, flexible unlocking of different intelligent home equipment and safety protection of encrypted files are achieved. In addition, the method also has the voice unlocking function, improves the use convenience of users, has simple, quick, safe and reliable whole implementation process, and has wide application prospect and market prospect.
In the specific implementation process, the identification module can realize communication and identification with intelligent home equipment through Bluetooth, wi-Fi or NFC and other technologies; the control module can be embedded software or hardware used for unlocking the corresponding encrypted file according to the identification result; the storage module may be an internal memory or an external memory, and is used for storing different types of encrypted files and associated information of the smart home devices.
The invention improves the interactivity and user experience between the mobile terminal and the intelligent home, and realizes the function of unlocking different types of encrypted files when the mobile phone approaches different intelligent home devices through the linkage of the identification module and the storage module. Meanwhile, the implementation of the invention has wide application prospect and can be widely applied to various intelligent household devices.
Example III
In this embodiment, as shown in fig. 2, an intelligent unlocking device for a file is provided, which includes:
An identification module 210, configured to obtain parameter information of a device to be associated;
A storage module 220, configured to detect an encrypted file corresponding to the parameter information according to the parameter information of the device to be associated;
the unlocking determining module 230 is configured to determine that an encrypted file corresponding to the parameter information is a file to be unlocked;
and the control module 240 is used for controlling the unlocking of the file to be unlocked.
In one embodiment, the storage module 220 is further configured to obtain, according to the identification number of the device to be associated, an encrypted file corresponding to the identification number of the device to be associated, based on a correspondence between the identification number and the encrypted file, where the parameter information includes the identification number, and the encrypted file corresponding to the parameter information is at least one.
In one embodiment, the intelligent file unlocking device further comprises:
The instruction acquisition module is used for acquiring a user unlocking instruction;
In one embodiment, the unlock determining module 230 is further configured to determine, according to the user unlock instruction, one of the encrypted files corresponding to the parameter information as the file to be unlocked.
In one embodiment, the intelligent file unlocking device further comprises:
The list acquisition module is used for acquiring a file list, wherein the file list records at least one encrypted file corresponding to the parameter information;
And the list display module is used for controlling the file list to be displayed.
In one embodiment, the intelligent file unlocking device further comprises:
an encryption module for generating a first key based on the identification number;
And encrypting the file to be unlocked through the first key.
In one embodiment, the encryption module is further configured to generate a second key based on the identification number;
in one embodiment, the control module 240 is further configured to control unlocking of the file to be unlocked by using the second key.
In one embodiment, the identification module 210 includes:
The detection unit is used for detecting whether the preset wireless signal of the equipment to be associated exists in a preset range;
And the acquisition unit is used for acquiring the parameter information of the equipment to be associated when the preset wireless signal of the equipment to be associated exists in the preset range.
For specific limitation of the intelligent unlocking device for the file, reference may be made to the limitation of the intelligent unlocking method for the file hereinabove, and the description thereof will not be repeated here. The units in the intelligent unlocking device can be realized in whole or in part by software, hardware and a combination thereof. The units can be embedded in hardware or independent of a processor in the computer equipment, and can also be stored in a memory in the computer equipment in a software mode, so that the processor can call and execute the operations corresponding to the units.
Example IV
In this embodiment, a computer device is provided. The internal structure thereof can be shown in fig. 3. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program, and is deployed with a database for storing parameter information of devices to be associated. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The network interface of the computer device is used to communicate with other computer devices in which application software is deployed. The computer program, when executed by a processor, implements a method for intelligently unlocking a file. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in FIG. 3 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory storing a computer program and a processor that when executing the computer program performs the steps of:
acquiring parameter information of equipment to be associated;
Detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated;
determining an encrypted file corresponding to the parameter information as a file to be unlocked;
And controlling the file to be unlocked.
In one embodiment, the processor when executing the computer program further performs the steps of:
And acquiring an encrypted file corresponding to the identification number of the equipment to be associated according to the identification number of the equipment to be associated based on the corresponding relation between the identification number and the encrypted file, wherein the parameter information comprises the identification number, and at least one encrypted file corresponding to the parameter information.
In one embodiment, the processor when executing the computer program further performs the steps of:
Acquiring a user unlocking instruction;
and determining one of the encrypted files as the file to be unlocked from at least one encrypted file corresponding to the parameter information according to the user unlocking instruction.
In one embodiment, the processor when executing the computer program further performs the steps of:
Acquiring a file list, wherein the file list records at least one encrypted file corresponding to the parameter information;
And controlling the file list to be displayed.
In one embodiment, the processor when executing the computer program further performs the steps of:
generating a first key based on the identification number;
And encrypting the file to be unlocked through the first key.
In one embodiment, the processor when executing the computer program further performs the steps of:
generating a second key based on the identification number;
And controlling the file to be unlocked through the second key.
In one embodiment, the processor when executing the computer program further performs the steps of:
detecting whether a preset wireless signal of the equipment to be associated exists in a preset range;
And when the preset wireless signal of the equipment to be associated exists in the preset range, acquiring the parameter information of the equipment to be associated.
Example five
In this embodiment, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of:
acquiring parameter information of equipment to be associated;
Detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated;
determining an encrypted file corresponding to the parameter information as a file to be unlocked;
And controlling the file to be unlocked.
In one embodiment, the computer program when executed by the processor further performs the steps of:
And acquiring an encrypted file corresponding to the identification number of the equipment to be associated according to the identification number of the equipment to be associated based on the corresponding relation between the identification number and the encrypted file, wherein the parameter information comprises the identification number, and at least one encrypted file corresponding to the parameter information.
In one embodiment, the computer program when executed by the processor further performs the steps of:
Acquiring a user unlocking instruction;
and determining one of the encrypted files as the file to be unlocked from at least one encrypted file corresponding to the parameter information according to the user unlocking instruction.
In one embodiment, the computer program when executed by the processor further performs the steps of:
Acquiring a file list, wherein the file list records at least one encrypted file corresponding to the parameter information;
And controlling the file list to be displayed.
In one embodiment, the computer program when executed by the processor further performs the steps of:
generating a first key based on the identification number;
And encrypting the file to be unlocked through the first key.
In one embodiment, the computer program when executed by the processor further performs the steps of:
generating a second key based on the identification number;
And controlling the file to be unlocked through the second key.
In one embodiment, the computer program when executed by the processor further performs the steps of:
detecting whether a preset wireless signal of the equipment to be associated exists in a preset range;
And when the preset wireless signal of the equipment to be associated exists in the preset range, acquiring the parameter information of the equipment to be associated.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous link (SYNCHLINK) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the application, which are described in detail and are not to be construed as limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.

Claims (10)

1. The intelligent unlocking method for the file is characterized by comprising the following steps of:
acquiring parameter information of equipment to be associated;
Detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated;
determining an encrypted file corresponding to the parameter information as a file to be unlocked;
And controlling the file to be unlocked.
2. The method for intelligently unlocking a file according to claim 1, wherein the parameter information includes an identification number, and the encrypted file corresponding to the parameter information is at least one;
the step of detecting the encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated comprises the following steps:
And acquiring the encrypted file corresponding to the identification number of the equipment to be associated according to the identification number of the equipment to be associated based on the corresponding relation between the identification number and the encrypted file.
3. The intelligent unlocking method for files according to claim 1, further comprising:
Acquiring a user unlocking instruction;
the step of determining that the encrypted file corresponding to the parameter information is the file to be unlocked comprises the following steps:
and determining one of the encrypted files as the file to be unlocked from at least one encrypted file corresponding to the parameter information according to the user unlocking instruction.
4. The method for intelligently unlocking a file according to claim 1, wherein after the step of detecting an encrypted file corresponding to the parameter information according to the parameter information of the device to be associated, the method further comprises:
Acquiring a file list, wherein the file list records at least one encrypted file corresponding to the parameter information;
And controlling the file list to be displayed.
5. The method for intelligently unlocking a file according to claim 2, further comprising:
generating a first key based on the identification number;
And encrypting the file to be unlocked through the first key.
6. The method for intelligently unlocking a file according to claim 2, wherein the step of controlling the unlocking of the file to be unlocked comprises:
generating a second key based on the identification number;
And controlling the file to be unlocked through the second key.
7. The method for intelligently unlocking a file according to any one of claims 1 to 6, wherein the step of obtaining parameter information of the device to be associated comprises:
detecting whether a preset wireless signal of the equipment to be associated exists in a preset range;
And when the preset wireless signal of the equipment to be associated exists in the preset range, acquiring the parameter information of the equipment to be associated.
8. An intelligent unlocking device for a file, which is characterized by comprising:
the identification module is used for acquiring parameter information of the equipment to be associated;
The storage module is used for detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated;
The unlocking determining module is used for determining an encrypted file corresponding to the parameter information as a file to be unlocked;
and the control module is used for controlling the unlocking of the file to be unlocked.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 7 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 7.
CN202311813103.5A 2023-12-26 2023-12-26 File intelligent unlocking method and device, computer equipment and storage medium Pending CN118051923A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311813103.5A CN118051923A (en) 2023-12-26 2023-12-26 File intelligent unlocking method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311813103.5A CN118051923A (en) 2023-12-26 2023-12-26 File intelligent unlocking method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN118051923A true CN118051923A (en) 2024-05-17

Family

ID=91049120

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311813103.5A Pending CN118051923A (en) 2023-12-26 2023-12-26 File intelligent unlocking method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN118051923A (en)

Similar Documents

Publication Publication Date Title
CN110706379B (en) Access control method and device based on block chain
CN109325342B (en) Identity information management method, device, computer equipment and storage medium
US8064883B2 (en) Mobile terminal having anti-theft function and anti-theft method
WO2017143879A1 (en) File permission management method and device
WO2015081777A1 (en) Method and device for encrypting information of an application
EP2835997B1 (en) Cell phone data encryption method and decryption method
CN103106372A (en) Lightweight class privacy data encryption method and system for Android system
US20120284534A1 (en) Memory Device and Method for Accessing the Same
US8706158B2 (en) Mobile phone for authenticating SIM card and method thereof
US20120096280A1 (en) Secured storage device with two-stage symmetric-key algorithm
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
CN104954534A (en) Control method and control device for communication terminal, and corresponding communication terminal
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN106919850B (en) File encryption and decryption method and device
JP2015516615A (en) Method, apparatus and mobile terminal for information security management of mobile terminal
CN105787319A (en) Iris recognition-based portable terminal and method for same
CN110807186B (en) Method, device, equipment and storage medium for safe storage of storage equipment
CN112241633B (en) Bidirectional authentication implementation method and system for non-contact smart card
CN118051923A (en) File intelligent unlocking method and device, computer equipment and storage medium
CN106570420B (en) Secret code-based intelligent equipment privacy protection implementation method and system
US20090172778A1 (en) Rule-based security system and method
CN104182706B (en) A kind of time slot scrambling, device and the mobile terminal of mobile terminal storage card
US9882879B1 (en) Using steganography to protect cryptographic information on a mobile device
CN102521164B (en) Access control method of mobile memory, mobile memory and system
KR100952300B1 (en) Terminal and Memory for secure data management of storage, and Method the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination