CN118051923A - File intelligent unlocking method and device, computer equipment and storage medium - Google Patents
File intelligent unlocking method and device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN118051923A CN118051923A CN202311813103.5A CN202311813103A CN118051923A CN 118051923 A CN118051923 A CN 118051923A CN 202311813103 A CN202311813103 A CN 202311813103A CN 118051923 A CN118051923 A CN 118051923A
- Authority
- CN
- China
- Prior art keywords
- file
- parameter information
- equipment
- unlocked
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000004590 computer program Methods 0.000 claims description 26
- 238000013459 approach Methods 0.000 abstract description 9
- 230000000694 effects Effects 0.000 abstract description 5
- 230000008569 process Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005286 illumination Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Landscapes
- Telephone Function (AREA)
Abstract
The invention provides a method, a device, computer equipment and a storage medium for intelligently unlocking a file, wherein the method comprises the steps of acquiring parameter information of equipment to be associated; detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated; determining an encrypted file corresponding to the parameter information as a file to be unlocked; and controlling the file to be unlocked. By detecting the encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated, the file system in the mobile terminal is associated with the intelligent household equipment, so that the encrypted file is unlocked when the mobile terminal approaches the intelligent household equipment, the condition of complicated steps when the encrypted file is accessed is effectively avoided, and the experience effect of a user is enhanced.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and apparatus for intelligently unlocking a file, a computer device, and a storage medium.
Background
Along with the rapid development of technology and the improvement of living standard of people, intelligent household equipment has become an indispensable part of daily life of people. Various intelligent household devices such as intelligent door locks, intelligent illumination, intelligent sound equipment and the like are gradually accepted and favored by consumers with the advantages of convenience, intelligence, high efficiency and the like.
However, although smart home devices have been widely used, the existing mobile phone file system generally only supports a single unlocking mode, such as a password, a fingerprint, and the like, and cannot be linked with the smart home, so that a user needs complicated operation steps when accessing some proprietary or encrypted files, and experience is not convenient enough.
Disclosure of Invention
Based on the foregoing, it is necessary to provide a method, an apparatus, a computer device and a storage medium for intelligently unlocking a file.
An intelligent unlocking method for a file, comprising the following steps:
acquiring parameter information of equipment to be associated;
Detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated;
determining an encrypted file corresponding to the parameter information as a file to be unlocked;
And controlling the file to be unlocked.
In one embodiment, the parameter information includes an identification number, and the encrypted file corresponding to the parameter information is at least one;
the step of detecting the encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated comprises the following steps:
And acquiring the encrypted file corresponding to the identification number of the equipment to be associated according to the identification number of the equipment to be associated based on the corresponding relation between the identification number and the encrypted file.
In one embodiment, the method further comprises:
Acquiring a user unlocking instruction;
the step of determining that the encrypted file corresponding to the parameter information is the file to be unlocked comprises the following steps:
and determining one of the encrypted files as the file to be unlocked from at least one encrypted file corresponding to the parameter information according to the user unlocking instruction.
In one embodiment, after the step of detecting the encrypted file corresponding to the parameter information according to the parameter information of the device to be associated, the method further includes:
Acquiring a file list, wherein the file list records at least one encrypted file corresponding to the parameter information;
And controlling the file list to be displayed.
In one embodiment, the method further comprises:
generating a first key based on the identification number;
And encrypting the file to be unlocked through the first key.
In one embodiment, the step of controlling the unlocking of the file to be unlocked includes:
generating a second key based on the identification number;
And controlling the file to be unlocked through the second key.
In one embodiment, the step of obtaining parameter information of the device to be associated includes:
detecting whether a preset wireless signal of the equipment to be associated exists in a preset range;
And when the preset wireless signal of the equipment to be associated exists in the preset range, acquiring the parameter information of the equipment to be associated.
An intelligent unlocking device for a file, comprising:
the identification module is used for acquiring parameter information of the equipment to be associated;
The storage module is used for detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated;
The unlocking determining module is used for determining an encrypted file corresponding to the parameter information as a file to be unlocked;
and the control module is used for controlling the unlocking of the file to be unlocked.
A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor when executing the computer program performs the steps of:
acquiring parameter information of equipment to be associated;
Detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated;
determining an encrypted file corresponding to the parameter information as a file to be unlocked;
And controlling the file to be unlocked.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
acquiring parameter information of equipment to be associated;
Detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated;
determining an encrypted file corresponding to the parameter information as a file to be unlocked;
And controlling the file to be unlocked.
According to the intelligent unlocking method, the intelligent unlocking device, the computer equipment and the storage medium for the files, the parameter information of the equipment to be associated is obtained, the encrypted files corresponding to the parameter information are detected according to the parameter information of the equipment to be associated, the encrypted files corresponding to the parameter information are determined to be the files to be unlocked, and then the files to be unlocked are controlled to be unlocked. In this way, by detecting the encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated, the file system in the mobile terminal is associated with the intelligent household equipment, so that the encrypted file is unlocked when the mobile terminal approaches the intelligent household equipment, the condition of complicated steps when accessing the encrypted file is effectively avoided, and the experience effect of a user is enhanced.
Drawings
FIG. 1 is a flow chart of a method for intelligently unlocking a file in one embodiment;
FIG. 2 is a block diagram of an intelligent unlocking device for files in one embodiment;
FIG. 3 is an internal block diagram of a computer device in one embodiment;
Fig. 4 is a flow chart of a method for intelligently unlocking a file in another embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
Example 1
In this embodiment, as shown in fig. 1, there is provided a method for intelligently unlocking a file, which includes:
step 110, obtaining parameter information of the device to be associated.
It should be understood that the device to be associated refers to an intelligent home device to be associated by a file system in the mobile terminal, wherein the type of the intelligent home device to be associated by the file system is set by a user. In this embodiment, the device to be associated is monitored to obtain the parameter information of the device to be associated. In some embodiments, the device to be associated first sends its parameter information to the mobile terminal, and the mobile terminal stores the parameter information of the device to be associated. In some embodiments, the parameter information of the device to be associated is collected and stored. In summary, when the smart home devices to be associated are set, the stored parameter information of the devices to be associated can be called for use.
And 120, detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated.
In this embodiment, after obtaining the parameter information of the device to be associated, at this time, an encrypted file corresponding to the parameter information needs to be detected in a file system according to the parameter information, where the file system has a plurality of encrypted files. In some embodiments, encrypting a file generally refers to a technique of encrypting the file using an encryption algorithm to achieve security protection of the file. It can be applied to different scenes such as protection of private documents, security of document transmission, security of electronic commerce transactions, etc.
And 130, determining the encrypted file corresponding to the parameter information as the file to be unlocked.
In this embodiment, after detecting an encrypted file corresponding to parameter information, the encrypted file is determined as a file to be unlocked, where the file to be unlocked is a file to be unlocked, that is, the encrypted or locked file is unlocked in a specific manner, so that the encrypted or locked file can be normally opened, edited, saved and shared, and the traditional file restriction can be broken through, so that the user can manage and utilize the file more freely.
In some embodiments, the number of the encrypted files corresponding to the parameter information may be one or more, and when the number of the encrypted files corresponding to the parameter information is one, the encrypted files are determined as files to be unlocked. When the number of the encrypted files corresponding to the parameter information is a plurality of, determining one of the encrypted files as the file to be unlocked from the plurality of encrypted files. In some embodiments, whether an encrypted file corresponding to the parameter information exists in the file system is detected according to the parameter information of the device to be associated, and when the encrypted file corresponding to the parameter information exists in the file system, the encrypted file corresponding to the parameter information is determined to be the file to be unlocked.
And 140, controlling the file to be unlocked.
In the embodiment, the unlocking of the file to be unlocked is controlled through the asymmetric encryption algorithm, namely the encrypted file is decrypted, and the security of unlocking the encrypted file is higher through the setting of the asymmetric encryption algorithm, so that unauthorized users are prevented from accessing and tampering with the file content, and the risk of information leakage is greatly reduced. In some embodiments, the unlocking of the file to be unlocked can also be controlled by a symmetric encryption algorithm and a hash algorithm.
In the above embodiment, the parameter information of the device to be associated is obtained, the encrypted file corresponding to the parameter information is detected according to the parameter information of the device to be associated, the encrypted file corresponding to the parameter information is determined to be the file to be unlocked, and then the file to be unlocked is controlled to be unlocked. In this way, by detecting the encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated, the file system in the mobile terminal is associated with the intelligent household equipment, so that the encrypted file is unlocked when the mobile terminal approaches the intelligent household equipment, the condition of complicated steps when accessing the encrypted file is effectively avoided, and the experience effect of a user is enhanced.
In one embodiment, the parameter information includes an identification number, and the encrypted file corresponding to the parameter information is at least one;
the step of detecting the encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated comprises the following steps:
And acquiring the encrypted file corresponding to the identification number of the equipment to be associated according to the identification number of the equipment to be associated based on the corresponding relation between the identification number and the encrypted file.
In this embodiment, the parameter information includes an identification number, where the identification number is an identification number of a device to be associated, that is, a device ID (Identity Document) of the smart home device. In some embodiments, the number of encrypted files corresponding to the parameter information may be one or more.
It should be understood that there is a correspondence between the identification numbers and the encrypted files, such that each identification number corresponds to at least one encrypted file, that is, each identification number corresponds to one encrypted file, or each identification number corresponds to a plurality of encrypted files. In this embodiment, an encrypted file corresponding to the identification number is detected according to the identification number of the device to be associated, that is, based on the correspondence between the identification number and the encrypted file, the identification number of the device to be associated is compared with the identification number corresponding to each encrypted file, so as to obtain at least one encrypted file corresponding to the identification number of the device to be associated. In some embodiments, when the number of encrypted files corresponding to the identification number of the device to be associated is one, then the encrypted file is determined to be the file to be unlocked. When the number of the encrypted files corresponding to the identification number of the equipment to be associated is a plurality of, selecting one of the encrypted files from the plurality of encrypted files, and determining the encrypted file as the file to be unlocked. In summary, it can be known that by detecting the encrypted file corresponding to the parameter information according to the parameter information of the device to be associated, the file system in the mobile terminal is associated with the smart home device, so that the encrypted file is unlocked when the mobile terminal approaches the smart home device, the complicated steps when accessing the encrypted file are effectively avoided, and the experience effect of the user is enhanced.
In one embodiment, the method further comprises:
Acquiring a user unlocking instruction;
the step of determining that the encrypted file corresponding to the parameter information is the file to be unlocked comprises the following steps:
and determining one of the encrypted files as the file to be unlocked from at least one encrypted file corresponding to the parameter information according to the user unlocking instruction.
It should be understood that, after the encrypted file corresponding to the identification number of the device to be associated is acquired, the number of the encrypted files corresponding to the identification number of the device to be associated may be one or more. After obtaining at least one encrypted file corresponding to the identification number of the device to be associated, the user selects at least one encrypted file corresponding to the identification number of the device to be associated, so as to confirm the selected file to be unlocked. In this embodiment, a user unlocking instruction is obtained, that is, an instruction that a user selects an encrypted file from at least one encrypted file corresponding to an identification number of a device to be associated to unlock the device, and determines that the encrypted file is the file to be unlocked from the at least one encrypted file according to the user unlocking instruction.
In one embodiment, after the step of detecting the encrypted file corresponding to the parameter information according to the parameter information of the device to be associated, the method further includes:
Acquiring a file list, wherein the file list records at least one encrypted file corresponding to the parameter information;
And controlling the file list to be displayed.
It should be understood that after detecting the encrypted file corresponding to the identification number according to the identification number of the device to be associated, at least one encrypted file corresponding to the identification number is obtained, and at least one encrypted file corresponding to the identification number is recorded in the file list. In this embodiment, after detecting an encrypted file corresponding to the parameter information according to the parameter information of the device to be associated, the user selects an encrypted file from at least one encrypted file corresponding to the identification number in the file list as the file to be unlocked by obtaining the file list and controlling the file list to be displayed, and effectively manages at least one encrypted file corresponding to the identification number.
In one embodiment, the method further comprises:
generating a first key based on the identification number;
And encrypting the file to be unlocked through the first key.
In this embodiment, after obtaining parameter information of a device to be associated, that is, an identification number of the device to be associated is obtained, the identification number is parsed to obtain a first key, where the first key may also be referred to as a public key. It should be appreciated that the public key is used to encrypt data, and that when encrypting a file, the file is encrypted by the public key, resulting in an encrypted file.
In one embodiment, the step of controlling the unlocking of the file to be unlocked includes:
generating a second key based on the identification number;
And controlling the file to be unlocked through the second key.
In this embodiment, the identification number is parsed to obtain a second key, which may also be referred to herein as a private key. It should be understood that, the private key is used for decrypting data, and when an encrypted file is determined to be a file to be unlocked from at least one encrypted file, the file to be unlocked is unlocked by the private key, so as to obtain an unlocked file. It should be appreciated that the security of the asymmetric encryption algorithm depends on the confidentiality of the private key, and that the encrypted file can be successfully unlocked, i.e. decrypted, by the correct private key when the encrypted file is unlocked. Thus, the security and reliability of the file system are effectively improved. And the parameter information of the equipment to be associated is acquired, and the security performance of unlocking the encrypted file is improved by unlocking the encrypted file corresponding to the equipment to be associated. In some embodiments, the process of generating the first key and the second key based on the identification number is: the method comprises the steps of obtaining an initial public key and an initial private key, associating an identification number with the initial public key and the initial private key, namely embedding the identification number into the initial public key and the initial public key, and obtaining a first key and a second key corresponding to the identification number of equipment to be associated so as to be used in the subsequent encryption and decryption processes.
In one embodiment, the step of obtaining parameter information of the device to be associated includes:
detecting whether a preset wireless signal of the equipment to be associated exists in a preset range;
And when the preset wireless signal of the equipment to be associated exists in the preset range, acquiring the parameter information of the equipment to be associated.
It should be understood that the predetermined range is preset, and the device to be associated is set with a preset wireless signal in advance. In some embodiments, the preset wireless signal includes a bluetooth signal, a wireless local area network signal, or an NFC signal, where the preset wireless signal is mainly used to detect whether a device to be associated exists in a preset range, that is, detect whether an intelligent home device to be associated exists in the preset range. In this embodiment, whether a preset wireless signal of the device to be associated exists in a preset range is detected, when the preset wireless signal of the device to be associated exists in the preset range, parameter information of the device to be associated is obtained, then an encrypted file corresponding to the identification number is detected according to the identification number of the device to be associated, the encrypted file corresponding to the identification number is determined to be the file to be unlocked according to a user unlocking instruction, and then the unlocking of the file to be unlocked is controlled. In this way, the corresponding parameter information of the equipment to be associated is obtained by identifying the preset wireless signal of the equipment to be associated, the encrypted file is searched according to the parameter information, and the encrypted file to be unlocked is unlocked according to the unlocking instruction of the user, so that flexible unlocking of different intelligent household equipment and safety protection of the encrypted file are realized. For example, when the user holds the mobile terminal close to the smart home device and both the mobile terminal and the smart home device are within a preset range, the mobile terminal detects that a preset wireless signal of the device to be associated exists within the preset range, and the user selects an encrypted file corresponding to the identification number and controls the encrypted file to unlock.
In some embodiments, when a preset wireless signal of the device to be associated exists in a preset range, parameter information of the device to be associated is automatically obtained, and at least one encrypted file corresponding to the identification number is controlled to be unlocked. Therefore, the corresponding parameter information of the equipment to be associated is obtained by identifying the preset wireless signal of the equipment to be associated, and the encrypted file to be unlocked is retrieved according to the parameter information, so that the encrypted file to be unlocked can be unlocked, unlocking of the encrypted file when the mobile terminal approaches the intelligent household equipment is realized, the complicated steps when the encrypted file is accessed are effectively avoided, and the experience effect of a user is enhanced. For example, when the user holds the mobile terminal close to the intelligent home equipment and the mobile terminal and the intelligent home equipment are both in the preset range, the mobile terminal detects that the preset wireless signal of the equipment to be associated exists in the preset range, and controls the encrypted file corresponding to the identification number to be automatically unlocked and then pushed to the user for selection.
It should be understood that, although the steps in the flowchart of fig. 1 are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 1 may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of other steps or sub-steps of other steps.
Example two
In this embodiment, as shown in fig. 4, there is provided a method for intelligently unlocking a file, which includes:
Step one, a user needs to set a file system associated with intelligent household equipment at a mobile phone end. In the setup process, the user needs to input personal information and select the type of smart home device to be associated. The information is stored in the cloud server and bound with the mobile phone equipment ID of the user. The type of the intelligent home equipment can be selected and specified by a user so as to determine the encryption mode of the encrypted file, for example, the content related to the wifi password, and the equipment ID of the router is specified to be encrypted; the encryption file of the smart bed designates the encryption using the device ID of the smart bed.
And secondly, when the user approaches the intelligent household equipment, the intelligent household equipment automatically senses the mobile phone equipment of the user through the Bluetooth, wi-Fi and other identification modules, and a file system of the mobile phone end is activated. The file system is activated by the approach of the user to the intelligent household equipment, so that the convenience of unlocking the encrypted file is improved, and the flexible unlocking of different intelligent household equipment is realized by identifying the type of the intelligent household equipment and searching the encrypted file associated with the type of the intelligent household equipment.
And thirdly, encrypting by using an identification number (namely, an equipment ID) of the intelligent household equipment as a key in the encryption process, namely, forming a corresponding public key and a corresponding private key after the identification number is processed, comparing the identification number with an encrypted file in a file system, wherein the decryption can be performed only by using the corresponding key provided by the intelligent household equipment in the decryption process, the file system can search an encrypted file associated with the identification number according to the identification number of the intelligent household equipment which is close to a user, and displaying an unlocked file list on a mobile terminal screen, wherein the file list records at least one encrypted file corresponding to parameter information.
And step four, the user can select the file to be unlocked according to the requirement. In the unlocking process, the file system calls the control module to unlock the file. The control module will decrypt and restore the file by an encryption algorithm so that it can be read and edited by the user. The encryption algorithm is an asymmetric encryption algorithm, the asymmetric encryption algorithm uses a public key and a private key, and the private key is unique to the intelligent household equipment, so that an encrypted file can be decrypted only by using the private key owned by the equipment. The control module is used for unlocking the encrypted file associated with the intelligent household equipment, so that the safety performance of unlocking the encrypted file is improved.
And fifthly, in the whole unlocking process, the file system and the control module encrypt and protect the unlocked file, and prevent unauthorized users from accessing and tampering with the file content. Meanwhile, the file system performs data synchronization with the cloud server at regular intervals, and updates the unlocked file list and user information. It should be understood that before the file in the file system of the mobile phone terminal is unlocked, the content in the file cannot be obtained, but after the mobile phone terminal is unlocked by using the password, the file content of the mobile phone terminal can be obtained. In the application, the file is encrypted by the public key to obtain the encrypted file, and the encrypted file is decrypted by the private key during decryption. Therefore, the encryption and decryption modes are changed from using passwords to using public keys and private keys corresponding to the identification numbers of the intelligent household equipment, and the safety and reliability of the file system are effectively improved. And the identification number of the intelligent home equipment is obtained, and the corresponding encrypted file is unlocked, so that the safety performance of unlocking the encrypted file is improved.
According to the method, the file system is activated by the approach of the user to the intelligent home equipment, so that the convenience of unlocking the encrypted file is improved, and the flexible unlocking of different intelligent home equipment is realized by identifying the type of the intelligent home equipment and retrieving the associated encrypted file. And the control module is used for unlocking the encrypted file associated with the intelligent household equipment, so that the safety performance of unlocking the encrypted file is improved.
According to the intelligent home equipment unlocking method and device, through the sensing and automatic searching functions of the intelligent home equipment and the unlocking operation of the control module, flexible unlocking of different intelligent home equipment and safety protection of encrypted files are achieved. In addition, the method also has the voice unlocking function, improves the use convenience of users, has simple, quick, safe and reliable whole implementation process, and has wide application prospect and market prospect.
In the specific implementation process, the identification module can realize communication and identification with intelligent home equipment through Bluetooth, wi-Fi or NFC and other technologies; the control module can be embedded software or hardware used for unlocking the corresponding encrypted file according to the identification result; the storage module may be an internal memory or an external memory, and is used for storing different types of encrypted files and associated information of the smart home devices.
The invention improves the interactivity and user experience between the mobile terminal and the intelligent home, and realizes the function of unlocking different types of encrypted files when the mobile phone approaches different intelligent home devices through the linkage of the identification module and the storage module. Meanwhile, the implementation of the invention has wide application prospect and can be widely applied to various intelligent household devices.
Example III
In this embodiment, as shown in fig. 2, an intelligent unlocking device for a file is provided, which includes:
An identification module 210, configured to obtain parameter information of a device to be associated;
A storage module 220, configured to detect an encrypted file corresponding to the parameter information according to the parameter information of the device to be associated;
the unlocking determining module 230 is configured to determine that an encrypted file corresponding to the parameter information is a file to be unlocked;
and the control module 240 is used for controlling the unlocking of the file to be unlocked.
In one embodiment, the storage module 220 is further configured to obtain, according to the identification number of the device to be associated, an encrypted file corresponding to the identification number of the device to be associated, based on a correspondence between the identification number and the encrypted file, where the parameter information includes the identification number, and the encrypted file corresponding to the parameter information is at least one.
In one embodiment, the intelligent file unlocking device further comprises:
The instruction acquisition module is used for acquiring a user unlocking instruction;
In one embodiment, the unlock determining module 230 is further configured to determine, according to the user unlock instruction, one of the encrypted files corresponding to the parameter information as the file to be unlocked.
In one embodiment, the intelligent file unlocking device further comprises:
The list acquisition module is used for acquiring a file list, wherein the file list records at least one encrypted file corresponding to the parameter information;
And the list display module is used for controlling the file list to be displayed.
In one embodiment, the intelligent file unlocking device further comprises:
an encryption module for generating a first key based on the identification number;
And encrypting the file to be unlocked through the first key.
In one embodiment, the encryption module is further configured to generate a second key based on the identification number;
in one embodiment, the control module 240 is further configured to control unlocking of the file to be unlocked by using the second key.
In one embodiment, the identification module 210 includes:
The detection unit is used for detecting whether the preset wireless signal of the equipment to be associated exists in a preset range;
And the acquisition unit is used for acquiring the parameter information of the equipment to be associated when the preset wireless signal of the equipment to be associated exists in the preset range.
For specific limitation of the intelligent unlocking device for the file, reference may be made to the limitation of the intelligent unlocking method for the file hereinabove, and the description thereof will not be repeated here. The units in the intelligent unlocking device can be realized in whole or in part by software, hardware and a combination thereof. The units can be embedded in hardware or independent of a processor in the computer equipment, and can also be stored in a memory in the computer equipment in a software mode, so that the processor can call and execute the operations corresponding to the units.
Example IV
In this embodiment, a computer device is provided. The internal structure thereof can be shown in fig. 3. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program, and is deployed with a database for storing parameter information of devices to be associated. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The network interface of the computer device is used to communicate with other computer devices in which application software is deployed. The computer program, when executed by a processor, implements a method for intelligently unlocking a file. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in FIG. 3 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory storing a computer program and a processor that when executing the computer program performs the steps of:
acquiring parameter information of equipment to be associated;
Detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated;
determining an encrypted file corresponding to the parameter information as a file to be unlocked;
And controlling the file to be unlocked.
In one embodiment, the processor when executing the computer program further performs the steps of:
And acquiring an encrypted file corresponding to the identification number of the equipment to be associated according to the identification number of the equipment to be associated based on the corresponding relation between the identification number and the encrypted file, wherein the parameter information comprises the identification number, and at least one encrypted file corresponding to the parameter information.
In one embodiment, the processor when executing the computer program further performs the steps of:
Acquiring a user unlocking instruction;
and determining one of the encrypted files as the file to be unlocked from at least one encrypted file corresponding to the parameter information according to the user unlocking instruction.
In one embodiment, the processor when executing the computer program further performs the steps of:
Acquiring a file list, wherein the file list records at least one encrypted file corresponding to the parameter information;
And controlling the file list to be displayed.
In one embodiment, the processor when executing the computer program further performs the steps of:
generating a first key based on the identification number;
And encrypting the file to be unlocked through the first key.
In one embodiment, the processor when executing the computer program further performs the steps of:
generating a second key based on the identification number;
And controlling the file to be unlocked through the second key.
In one embodiment, the processor when executing the computer program further performs the steps of:
detecting whether a preset wireless signal of the equipment to be associated exists in a preset range;
And when the preset wireless signal of the equipment to be associated exists in the preset range, acquiring the parameter information of the equipment to be associated.
Example five
In this embodiment, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of:
acquiring parameter information of equipment to be associated;
Detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated;
determining an encrypted file corresponding to the parameter information as a file to be unlocked;
And controlling the file to be unlocked.
In one embodiment, the computer program when executed by the processor further performs the steps of:
And acquiring an encrypted file corresponding to the identification number of the equipment to be associated according to the identification number of the equipment to be associated based on the corresponding relation between the identification number and the encrypted file, wherein the parameter information comprises the identification number, and at least one encrypted file corresponding to the parameter information.
In one embodiment, the computer program when executed by the processor further performs the steps of:
Acquiring a user unlocking instruction;
and determining one of the encrypted files as the file to be unlocked from at least one encrypted file corresponding to the parameter information according to the user unlocking instruction.
In one embodiment, the computer program when executed by the processor further performs the steps of:
Acquiring a file list, wherein the file list records at least one encrypted file corresponding to the parameter information;
And controlling the file list to be displayed.
In one embodiment, the computer program when executed by the processor further performs the steps of:
generating a first key based on the identification number;
And encrypting the file to be unlocked through the first key.
In one embodiment, the computer program when executed by the processor further performs the steps of:
generating a second key based on the identification number;
And controlling the file to be unlocked through the second key.
In one embodiment, the computer program when executed by the processor further performs the steps of:
detecting whether a preset wireless signal of the equipment to be associated exists in a preset range;
And when the preset wireless signal of the equipment to be associated exists in the preset range, acquiring the parameter information of the equipment to be associated.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous link (SYNCHLINK) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the application, which are described in detail and are not to be construed as limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.
Claims (10)
1. The intelligent unlocking method for the file is characterized by comprising the following steps of:
acquiring parameter information of equipment to be associated;
Detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated;
determining an encrypted file corresponding to the parameter information as a file to be unlocked;
And controlling the file to be unlocked.
2. The method for intelligently unlocking a file according to claim 1, wherein the parameter information includes an identification number, and the encrypted file corresponding to the parameter information is at least one;
the step of detecting the encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated comprises the following steps:
And acquiring the encrypted file corresponding to the identification number of the equipment to be associated according to the identification number of the equipment to be associated based on the corresponding relation between the identification number and the encrypted file.
3. The intelligent unlocking method for files according to claim 1, further comprising:
Acquiring a user unlocking instruction;
the step of determining that the encrypted file corresponding to the parameter information is the file to be unlocked comprises the following steps:
and determining one of the encrypted files as the file to be unlocked from at least one encrypted file corresponding to the parameter information according to the user unlocking instruction.
4. The method for intelligently unlocking a file according to claim 1, wherein after the step of detecting an encrypted file corresponding to the parameter information according to the parameter information of the device to be associated, the method further comprises:
Acquiring a file list, wherein the file list records at least one encrypted file corresponding to the parameter information;
And controlling the file list to be displayed.
5. The method for intelligently unlocking a file according to claim 2, further comprising:
generating a first key based on the identification number;
And encrypting the file to be unlocked through the first key.
6. The method for intelligently unlocking a file according to claim 2, wherein the step of controlling the unlocking of the file to be unlocked comprises:
generating a second key based on the identification number;
And controlling the file to be unlocked through the second key.
7. The method for intelligently unlocking a file according to any one of claims 1 to 6, wherein the step of obtaining parameter information of the device to be associated comprises:
detecting whether a preset wireless signal of the equipment to be associated exists in a preset range;
And when the preset wireless signal of the equipment to be associated exists in the preset range, acquiring the parameter information of the equipment to be associated.
8. An intelligent unlocking device for a file, which is characterized by comprising:
the identification module is used for acquiring parameter information of the equipment to be associated;
The storage module is used for detecting an encrypted file corresponding to the parameter information according to the parameter information of the equipment to be associated;
The unlocking determining module is used for determining an encrypted file corresponding to the parameter information as a file to be unlocked;
and the control module is used for controlling the unlocking of the file to be unlocked.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 7 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311813103.5A CN118051923A (en) | 2023-12-26 | 2023-12-26 | File intelligent unlocking method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311813103.5A CN118051923A (en) | 2023-12-26 | 2023-12-26 | File intelligent unlocking method and device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN118051923A true CN118051923A (en) | 2024-05-17 |
Family
ID=91049120
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311813103.5A Pending CN118051923A (en) | 2023-12-26 | 2023-12-26 | File intelligent unlocking method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118051923A (en) |
-
2023
- 2023-12-26 CN CN202311813103.5A patent/CN118051923A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110706379B (en) | Access control method and device based on block chain | |
CN109325342B (en) | Identity information management method, device, computer equipment and storage medium | |
US8064883B2 (en) | Mobile terminal having anti-theft function and anti-theft method | |
WO2017143879A1 (en) | File permission management method and device | |
WO2015081777A1 (en) | Method and device for encrypting information of an application | |
EP2835997B1 (en) | Cell phone data encryption method and decryption method | |
CN103106372A (en) | Lightweight class privacy data encryption method and system for Android system | |
US20120284534A1 (en) | Memory Device and Method for Accessing the Same | |
US8706158B2 (en) | Mobile phone for authenticating SIM card and method thereof | |
US20120096280A1 (en) | Secured storage device with two-stage symmetric-key algorithm | |
US20170201528A1 (en) | Method for providing trusted service based on secure area and apparatus using the same | |
CN104954534A (en) | Control method and control device for communication terminal, and corresponding communication terminal | |
CN109977039A (en) | HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing | |
CN106919850B (en) | File encryption and decryption method and device | |
JP2015516615A (en) | Method, apparatus and mobile terminal for information security management of mobile terminal | |
CN105787319A (en) | Iris recognition-based portable terminal and method for same | |
CN110807186B (en) | Method, device, equipment and storage medium for safe storage of storage equipment | |
CN112241633B (en) | Bidirectional authentication implementation method and system for non-contact smart card | |
CN118051923A (en) | File intelligent unlocking method and device, computer equipment and storage medium | |
CN106570420B (en) | Secret code-based intelligent equipment privacy protection implementation method and system | |
US20090172778A1 (en) | Rule-based security system and method | |
CN104182706B (en) | A kind of time slot scrambling, device and the mobile terminal of mobile terminal storage card | |
US9882879B1 (en) | Using steganography to protect cryptographic information on a mobile device | |
CN102521164B (en) | Access control method of mobile memory, mobile memory and system | |
KR100952300B1 (en) | Terminal and Memory for secure data management of storage, and Method the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |