CN107180197A - file operation method and device - Google Patents

file operation method and device Download PDF

Info

Publication number
CN107180197A
CN107180197A CN201610134363.3A CN201610134363A CN107180197A CN 107180197 A CN107180197 A CN 107180197A CN 201610134363 A CN201610134363 A CN 201610134363A CN 107180197 A CN107180197 A CN 107180197A
Authority
CN
China
Prior art keywords
file
encrypted
key
encryption
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610134363.3A
Other languages
Chinese (zh)
Inventor
蒋嘉林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201610134363.3A priority Critical patent/CN107180197A/en
Publication of CN107180197A publication Critical patent/CN107180197A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

This application discloses the file operation method and device for mobile terminal.One embodiment of methods described includes:CIPHERING REQUEST of the user to file is received, the CIPHERING REQUEST includes the key for encrypting;File to be encrypted is encrypted using the key;The key and default encryption identification are added in the file of encryption generation, file has been encrypted with the file format identical formed with file to be encrypted, wherein, whether the encryption identification is used to be that encryption file is identified to file.This embodiment improves the convenience of file operation.

Description

File operation method and device
Technical field
The application is related to field of computer technology, and in particular to Internet technical field, especially relates to And file operation method and device.
Background technology
User is when using intelligent terminal, the usually data storage in intelligent terminal.For some The file of secrecy is, it is necessary to which file is encrypted using encryption software.
However, being solved in the prior art in the technology of encryption and decryption is carried out to file to file Decrypting process could be completed by needing user or system to carry out multi-pass operation when close, and text has been significantly greatly increased The complexity of part operation, accordingly it is desirable to be improved to file encryption-decryption operation, so that literary Part decryption is more convenient.
The content of the invention
The purpose of the application is to propose a kind of improved file operation method for mobile terminal And device, to solve the technical problem that background section above is mentioned.
In a first aspect, this application provides a kind of file operation method for mobile terminal, institute The method of stating includes:CIPHERING REQUEST of the user to file is received, the CIPHERING REQUEST includes being used to add Close key;File to be encrypted is encrypted using the key;In the file of encryption generation The middle addition key and default encryption identification, to form the tray with file to be encrypted Formula identical has encrypted file, wherein, whether the encryption identification is used to be encryption text to file Part is identified.
Second aspect, this application provides another file operation method for mobile terminal, Characterized in that, methods described includes:Receive file open request;Determine be in the file It is no include encryption identification, the encryption identification after file is encrypted using preset-key, With formation and file to be encrypted in the file together generated with the preset-key added to encryption File format identical has encrypted file;If comprising, execution file decryption operation, and open File after decryption.
It is in certain embodiments, described to determine whether comprising predetermined encryption mark in the file, Including:Whether the thread added on startup by the mobile terminal includes institute to the file Encryption identification is stated to be judged.
In certain embodiments, the execution file decryption operation, including:Receive user's input Key;Determine user input key whether with the preset-key that is extracted from the file Match somebody with somebody;If matching, the file is decrypted using the preset-key.
In certain embodiments, methods described also includes:If the file includes encryption identification, Then generate the encryption information for indicating that opened file is encrypted;Detect closing of a file life Order;When detecting closing of a file order, detect encryption information to determine whether to have beaten described Open file is encrypted;If it is determined that the opened file is encrypted, then it is described in closing The file is encrypted during file, using the preset-key and by the encryption identification with With formation and the file of the file in the file that the preset-key is together generated added to encryption Form identical has encrypted file.
In certain embodiments, it is described to detect encryption information to determine whether to have opened text to described Part is encrypted, including:By the thread detect encryption information with determine whether to it is described File is opened to be encrypted.
The third aspect, this application provides a kind of file operation device for mobile terminal, institute Stating device includes:Receiving unit, for receiving CIPHERING REQUEST of the user to file, the encryption Request includes the key for encrypting;Ciphering unit, for using the key to text to be encrypted Part is encrypted;Adding device, for encryption generation file in add the key and Default encryption identification, file has been encrypted with the file format identical formed with file to be encrypted, Wherein, whether the encryption identification is used to be that encryption file is identified to file.
Fourth aspect, this application provides another file operation device for mobile terminal, Described device includes:Receiving unit, for receiving file open request;First determining unit, For determining encryption identification whether is included in the file, the encryption identification is using default close File is encrypted key is together added in the file of encryption generation with the preset-key afterwards File has been encrypted with the file format identical formed with file to be encrypted;Opening unit, is used for If including encryption identification in the file, file decryption operation is performed, and open after decryption File.
In certain embodiments, first determining unit is further used for by described mobile whole Hold whether the thread added on startup judges the file comprising the encryption identification.
In certain embodiments, the opening unit includes:Key reception subelement, for connecing Receive user's input key;Cipher key match subelement, for whether determining user's input key Matched with the preset-key extracted from the file;Subelement is decrypted, if for the user Input key is matched with the preset-key extracted from the file, then using the preset-key The file is decrypted.
In certain embodiments, described device also includes:Generation unit, if for the file Including encryption identification, then the encryption information for indicating that opened file is encrypted is generated; Detection unit, for detecting closing of a file order;Second determining unit, text is detected for working as During part shutdown command, detect encryption information to determine whether the opened file is encrypted; Ciphering unit, for if it is determined that the opened file is encrypted, then in the closing text The file is encrypted during part, using the preset-key and by the encryption identification and institute State in the file that preset-key is together generated added to encryption to form the tray with the file Formula identical has encrypted file.
In certain embodiments, second determining unit is further used for examining by the thread Encryption information is surveyed to determine whether the opened file is encrypted.
File operation method and device that the application is provided, during encryption by for the key of encryption and In the cryptograph files generated for indicating the encryption identification of encryption file to be applied directly to using key, The encryption file formed in this way can by file in itself in encryption identification and key Carry out subsequent decryption operation so that the file after encryption can be performed on different mobile terminal, So as to improve the convenience of file decryption;In decryption, determine file to add by encryption identification Ciphertext part is to determine to need that file is decrypted, while the key carried in itself by file is i.e. Authority Verification and decryption can be carried out, so that this method can be performed on different mobile terminal, Substantially increase the convenience of file decryption.
Brief description of the drawings
Retouched by reading with reference to the detailed of being made to non-limiting example of being made of the following drawings State, other features, objects and advantages will become more apparent upon:
Fig. 1 is that the application can apply to exemplary system architecture figure therein;
Fig. 2 is one embodiment of the file operation method for mobile terminal according to the application Flow chart;
Fig. 3 is another implementation of the file operation method for mobile terminal according to the application The flow chart of example;
Fig. 4 is one embodiment of the corresponding file operation device of file operation method shown in Fig. 2 Structural representation;
Fig. 5 is one embodiment of the corresponding file operation device of file operation method shown in Fig. 3 Structural representation;
Fig. 6 is adapted for for realizing the terminal device of the embodiment of the present application or the computer of server The structural representation of system.
Embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is appreciated that , specific embodiment described herein is used only for explaining related invention, rather than to the hair Bright restriction.It also should be noted that, illustrate only for the ease of description, in accompanying drawing with About the related part of invention.
It should be noted that in the case where not conflicting, embodiment and embodiment in the application In feature can be mutually combined.Describe this in detail below with reference to the accompanying drawings and in conjunction with the embodiments Application.
Fig. 1 shows the reality of the file operation method that can apply the application or file operation device Apply the exemplary system architecture 100 of example.
As shown in figure 1, system architecture 100 can include mobile terminal device 101,102, net Network 103 and server 104.Network 103 is used in mobile terminal device 101,102 and service The medium of communication link is provided between device 104.Network 103 can include various connection types, Such as wired, wireless communication link or fiber optic cables etc..
User can use mobile terminal device 101,102 by network 103 and server 104 Interaction, to receive or send message etc..It can be provided with mobile terminal device 101,102 each The telecommunication customer end application for being used for opening file is planted, such as audio/video player application, picture show Show class application, the application of text editing class etc..
Mobile terminal device 101,102 can be with display screen and support each of browsing file Kind of mobile electronic device, including but not limited to smart mobile phone, tablet personal computer, E-book reader, (Moving Picture Experts Group Audio Layer III, dynamic image is special for MP3 player Family's compression standard audio aspect 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio aspect 4) player etc..
Server 104 can be to provide the server of various services, such as to mobile terminal device 101st, the file shown on 102 provides the background server supported.Background server can be to text Part remotely store or can be sent when receiving file open request to mobile terminal File is so that mobile electronic device gets file.
It should be noted that the file operation method that the embodiment of the present application is provided is general by moving Terminal device 101,102 is performed, and correspondingly, file operation device is generally positioned at mobile terminal In equipment 101,102.In some cases, the file operation side that the embodiment of the present application is provided Method and file operation device can not also be related to server 104.
It should be understood that the number of the mobile terminal device, network and server in Fig. 1 is only Schematically.According to needs are realized, can have any number of mobile terminal device, network And server.
With continued reference to Fig. 2, the file operation side for mobile terminal according to the application is shown The flow 200 of one embodiment of method.The described file operation method for mobile terminal, Comprise the following steps:
Step 201, CIPHERING REQUEST of the user to file is received.
In the present embodiment, electronic equipment (such as Fig. 1 of file operation method operation thereon In mobile terminal) CIPHERING REQUEST of the user to file can be received first.User is in initiation pair During the CIPHERING REQUEST of file to be encrypted, key can be inputted simultaneously, and the key will add in follow-up Used in close flow.
Step 202, file to be encrypted is encrypted using key.
In the present embodiment, based on the key received in step 201 in CIPHERING REQUEST, electronics Then file to be encrypted is encrypted using the key for equipment.Generally, electronic equipment can make The plaintext in file to be encrypted is encrypted with AES, it is above-mentioned close to be converted into ciphertext Key can as performed AES encryption parameter.Specific AES can be symmetrical Algorithm, asymmetric arithmetic and hash algorithm etc. are various available for the algorithm that file is encrypted. File is encrypted and belongs to art technology by known known encryption parameter and AES The known technology of personnel, is repeated no more here.
Step 203, addition key and default encryption identification in the file of encryption generation, File has been encrypted with the file format identical formed with file to be encrypted.
In the present embodiment, generated text file to be encrypted is encrypted based on step 202 Part, electronic equipment can add the above-mentioned key and encryption identification for being used to encrypt thereto.Should Encryption identification can use binary identification.In addition, electronic equipment can give birth to encryption Into file, key and encryption identification change into binary stream, and will convert into two respectively System stream is merged, and finally converts back the binary stream merged and tray to be encrypted Formula identical file.Generally, the content of above-mentioned encryption identification can be " cafe " or " desc " Deng string representation.When being added, encryption identification can be added in file header, so as to The File header information of file can be analyzed during follow-up opening file, so as to judge that file is No encryption.
For example, the file after encryption can be converted into binary stream byte [] textStream, key Binary stream byte [] keystream is converted into, the binary stream that encryption identification is converted into can be Byte [] flagStream, then the binary stream after merging can be flagStream+ Keystream+textStream, afterwards, the binary stream being merged into can be converted into it is to be encrypted File identical file type identical file.
The method that above-described embodiment of the application is provided passes through for the key of encryption and for referring to Show that the encryption identification of encryption file is applied directly in the cryptograph files using key generation, key is hidden Be hidden in encryption file in cause encryption file be transplanted to an other equipment use same system according to It can so use, transplantability is high, enhances the convenience of file operation.Also, using in text Encryption identification is added in part to be identified to whether file is encrypted, and unencrypted file will not be produced Influence.
With further reference to Fig. 3, it illustrates the flow of another of file operation method embodiment 300.The flow 300 of this document operating method, comprises the following steps:
Step 301, file open request is received.
In the present embodiment, electronic equipment (such as Fig. 1 of file operation method operation thereon Shown mobile terminal) can by being detected to the file open request that user sends, User is sent after file open request by deliberate action, and electronic equipment can receive this document Open request.Generally, user can be by carrying out double touch operation to file destination Initiate file open request.
Step 302, determine whether include encryption identification in file.
In the present embodiment, the file open request received based on step 301, electronic equipment The file content of file pointed by file open request can be parsed, with to this document In whether encryption identification is judged.Generally, the encryption identification is using preset-key to file Be encrypted it is rear, with preset-key together added in the file of encryption generation with formation with it is to be added The file format identical of ciphertext part has encrypted file.That is, when containing encryption identification in file, This document can then be determined for the file Jing Guo encryption, it is necessary to use and file format pair File is decrypted before opening file for the application answered.
Step 303, if comprising execution file decryption is operated, and opens the file after decryption.
In the present embodiment, file is decrypted electronic equipment, and is opened after the completion of decryption File after decryption.Open decryption after file can it is preassembled by electronic equipment, with File is opened in the corresponding application of this document, and can also send the file to server makes server The content that translating the file into directly to show sends back electronic equipment.
In some optional implementations of the present embodiment, the execution file decryption in step 303 Operation generally includes following steps:Electronic equipment can receive user's input key first.Generally Electronic equipment can generate control, and user to electronic equipment can input key by the control, The key be i.e. user input key, afterwards electronic equipment can receive the user input it is close Key.Afterwards, whether electronic equipment can determine above-mentioned user's input key with being extracted from file Preset-key matching.Electronic equipment can preset the rule of matching, when two keys are full It can assert that both match when this is regular enough.Generally, the rule of matching can be set as at two Both matchings are assert when the content of key is identical, can also be set as that the content in two keys expires Both matchings are assert during other matched rules of foot.Afterwards, however, it is determined that both match, electronic equipment The preset-key extracted from file can be used to removing encryption identification in file and presetting close Other parts outside key are decrypted, so that the file after being decrypted so that can be used corresponding Application program open file.In the implementation, the key carried in itself by file Authority Verification and decryption are carried out, so that this method can be performed on different mobile terminal, Substantially increase the convenience of file decryption.
, in step 302, can be by moving in some optional implementations of the present embodiment The thread that dynamic terminal is added on startup detects encryption information to determine whether to enter opened file Row encryption.Encryption thread based on backstage encryption identification is identified with determine file whether be File is encrypted so that identification process is transparent to user, so that it is dry to avoid the operation to user from producing Disturb.
In some optional implementations of the present embodiment, above-mentioned file operation method also include with Lower step:
First, if above-mentioned file includes encryption identification, electronic equipment can be generated for indicating The encryption information that opened file is encrypted.Generally, the step can perform step 302 Shi Zhihang.Whether the encryption information of step generation can be as subsequent step to decrypting and opening The foundation that file afterwards is encrypted again.
Secondly, electronic equipment can be detected to closing of a file order.Generally, the step for It can start to perform after File Open.Generally, closing of a file order can be that user closes use The instruction sent when the operation of application program of file is opened.
Then, when electronic equipment can detect closing of a file order, encryption information is examined Survey to determine whether opened file is encrypted.Because encryption information can serve to indicate that pair Opened file is encrypted, and electronic equipment can determine closing when detecting the encryption information Need that this document is encrypted when closing the file opened.
Optionally, electronic equipment can detect encryption information determine whether pair by above-mentioned thread Opened file is encrypted.Because the execution of the encryption thread on backstage is transparent to user, so that The operation to user is avoided to produce interference.
Finally, however, it is determined that opened file is encrypted, then electronic equipment can be somebody's turn to do closing File is encrypted again during file, even if be encrypted and will added to file with above-mentioned preset-key Secret mark is known in the file together generated added to encryption with preset-key to be formed and above-mentioned file File format identical has encrypted file.
In the implementation, if determining that file is encryption by encryption identification when closing file File, then key pair encryption file file being encrypted before automatic use is encrypted, And encrypted again in addition encryption identification and the file of the big encryption generation of key with generating again File, operating procedure is succinct, reduces user operation time.
The method that above-described embodiment of the application is provided is by using the encryption mark added hereof Knowledge is identified to whether file is encrypted, and influence will not be produced on unencrypted file, is more facilitated.
With further reference to Fig. 4, as the realization to method shown in above-mentioned Fig. 2, the application is provided A kind of one embodiment of file operation device, the device embodiment and the method shown in Fig. 2 Embodiment is corresponding, and the device specifically can apply in various electronic equipments.
As shown in figure 4, the file device 400 described in the present embodiment includes:Receiving unit 401, Ciphering unit 402, adding device 403.Wherein, receiving unit 401 is used to receive user to text The CIPHERING REQUEST of part, the CIPHERING REQUEST includes the key for encrypting;Ciphering unit 402 is used for File to be encrypted is encrypted using key;Adding device 403 is used for the text in encryption generation Key and default encryption identification are added in part, to form the file format with file to be encrypted Identical has encrypted file, wherein, whether encryption identification is used to be that encryption file is carried out to file Identification.
In the present embodiment, receiving unit 401, ciphering unit 402, the tool of adding device 403 Body processing may be referred to step 201, step 202, the step 203 of Fig. 2 correspondence embodiments.
With further reference to Fig. 5, as the realization to method shown in above-mentioned Fig. 3, the application is provided A kind of one embodiment of file operation device, the device embodiment and the method shown in Fig. 3 Embodiment is corresponding, and the device specifically can apply in various electronic equipments.
As shown in figure 5, the file device 500 described in the present embodiment includes:Receiving unit 501, First determining unit 502, opening unit 503.Wherein, receiving unit 501 is used to receive file Open request;First determining unit 502 is used to determine encryption identification whether to be included in file, plus Secret mark is known after file is encrypted using preset-key and preset-key is together added to and added File has been encrypted with the file format identical formed with file to be encrypted in the file of close generation; If opening unit 503 is used in file include encryption identification, file decryption operation is performed, and Open the file after decryption.
In the present embodiment, receiving unit 501, the first determining unit 502, opening unit 503 Specific processing may be referred to Fig. 3 correspondence embodiment step 301, step 302, step 303.
In some optional implementations of the present embodiment, above-mentioned first determining unit 502 enters one Walk for whether the thread added on startup by mobile terminal to enter to file comprising encryption identification Row judges.Specific processing may be referred to corresponding implementation in Fig. 3 correspondence embodiments.
In some optional implementations of the present embodiment, opening unit 503 can include:It is close Key receiving subelement (not shown), for receiving user's input key;Cipher key match subelement is (not Show), for determining whether user's input key matches with the preset-key extracted from file; Decrypt subelement (not shown), if for user input key with extracted from file it is default close Key is matched, then above-mentioned file is decrypted using preset-key.Specific processing may be referred to figure Corresponding implementation in 3 correspondence embodiments.
In some optional implementations of the present embodiment, above-mentioned first determining unit 502 enters one Walk for whether the thread added on startup by mobile terminal to enter to file comprising encryption identification Row judges.Specific processing may be referred to corresponding implementation in Fig. 3 correspondence embodiments.
In some optional implementations of the present embodiment, above-mentioned file operation device 500 is also wrapped Include:Generation unit (not shown), if including encryption identification for file, is generated for indicating The encryption information that opened file is encrypted;Detection unit (not shown), for detecting text Part shutdown command;Second determining unit (not shown), for when detecting closing of a file order, Encryption information is detected to determine whether opened file is encrypted;Ciphering unit (not shown), For if it is determined that opened file is encrypted, then when closing file, using above-mentioned default Key-pair file is encrypted and by encryption identification and preset-key together added to encryption generation File has been encrypted with the file format identical formed with file in file.Specific processing can be joined Examine corresponding implementation in Fig. 3 correspondence embodiments.
In some optional implementations of the present embodiment, above-mentioned second determining unit is further used Detect encryption information to determine whether to having beaten in the thread added on startup by mobile terminal Open file is encrypted.Specific processing may be referred to corresponding realization side in Fig. 3 correspondence embodiments Formula.
Below with reference to Fig. 6, it illustrates suitable for for realizing the mobile terminal of the embodiment of the present application The structural representation of the computer system 600 of equipment.
As shown in fig. 6, computer system 600 includes CPU (CPU) 601, its Can according to the program being stored in read-only storage (ROM) 602 or from storage part 608 The program that is loaded into random access storage device (RAM) 603 and perform various appropriate actions And processing.In RAM 603, the system that is also stored with 600 operates required various program sums According to.CPU 601, ROM 602 and RAM 603 are connected with each other by bus 604.Input / output (I/O) interface 605 is also connected to bus 604.
I/O interfaces 605 are connected to lower component:Include the importation of touch-screen, button etc. 606;Output par, c 607 including liquid crystal display (LCD) etc. and loudspeaker etc.; Storage part 608 including hard disk etc.;And communications portion 609.Communications portion 609 is via all Network such as internet performs communication process.Driver 610 is connect also according to needing to be connected to I/O Mouth 605.Detachable media 611, such as storage card etc., as needed installed in driver On 610, in order to which the computer program read from it is mounted into storage part as needed 608。
Especially, in accordance with an embodiment of the present disclosure, the process described above with reference to flow chart can be with It is implemented as computer software programs.For example, embodiment of the disclosure includes a kind of computer journey Sequence product, it includes being tangibly embodied in the computer program on machine readable media, the meter Calculation machine program bag, which contains, is used for the program code of the method shown in execution flow chart.Implement such In example, the computer program can be downloaded and installed by communications portion 609 from network, And/or be mounted from detachable media 611.
Flow chart and block diagram in accompanying drawing, it is illustrated that according to the system of the various embodiments of the application, Architectural framework in the cards, function and the operation of method and computer program product.This point On, each square frame in flow chart or block diagram can represent a module, program segment or code A part, the part of the module, program segment or code is used for comprising one or more The executable instruction of logic function as defined in realizing.It should also be noted that being used as replacement at some In realization, the function of being marked in square frame can also be with different from the order marked in accompanying drawing hair It is raw.For example, two square frames succeedingly represented can essentially be performed substantially in parallel, they Sometimes it can also perform in the opposite order, this is depending on involved function.It is also noted that It is, each square frame in block diagram and/or flow chart and the square frame in block diagram and/or flow chart Combination, can be realized with the special hardware based system of defined function or operation is performed, Or can be realized with the combination of specialized hardware and computer instruction.
Being described in unit involved in the embodiment of the present application can be real by way of software It is existing, it can also be realized by way of hardware.Described unit can also be arranged on processing In device, for example, can be described as:A kind of processor includes receiving unit, ciphering unit, added Plus unit.Wherein, the title of these units is not constituted to the unit in itself under certain conditions Restriction, for example, ciphering unit be also described as " using the key to text to be encrypted The unit that part is encrypted ".
As on the other hand, present invention also provides a kind of nonvolatile computer storage media, The nonvolatile computer storage media can be described in above-described embodiment included in device Nonvolatile computer storage media;Can also be individualism, without non-in supplying terminal Volatile computer storage medium.Above-mentioned nonvolatile computer storage media be stored with one or The multiple programs of person, when one or more of programs are performed by an equipment so that described Equipment:CIPHERING REQUEST of the user to file is received, the CIPHERING REQUEST includes close for what is encrypted Key;File to be encrypted is encrypted using the key;Added in the file of encryption generation The key and default encryption identification are identical with the file format of file to be encrypted to be formed Encryption file, wherein, the encryption identification be used for file whether be encryption file carry out Identification.Or, above-mentioned nonvolatile computer storage media is stored with one or more program, When one or more of programs are performed by an equipment so that the equipment:Receive text Part opens request;Determine whether include encryption identification in the file, the encryption identification makes Together added to encryption generation after file is encrypted with preset-key, with the preset-key File in encrypted file with the file format identical of file to be encrypted to be formed;If comprising, File decryption operation is then performed, and opens the file after decryption.
Above description is only the preferred embodiment of the application and saying to institute's application technology principle It is bright.It will be appreciated by those skilled in the art that invention scope involved in the application, is not limited In the technical scheme of the particular combination of above-mentioned technical characteristic, do not departed from while should cover yet In the case of the inventive concept, it is combined by above-mentioned technical characteristic or its equivalent feature Formed by other technical schemes.Such as features described above and (but not limited to) disclosed herein Technical characteristic with similar functions carries out technical scheme formed by replacement mutually.

Claims (12)

1. a kind of file operation method for mobile terminal, it is characterised in that methods described bag Include:
CIPHERING REQUEST of the user to file is received, the CIPHERING REQUEST includes the key for encrypting;
File to be encrypted is encrypted using the key;
The key and default encryption identification are added in the file of encryption generation, to be formed File has been encrypted with the file format identical of file to be encrypted, wherein, the encryption identification is used In to file whether be encryption file be identified.
2. a kind of file operation method for mobile terminal, it is characterised in that methods described bag Include:
Receive file open request;
Determine encryption identification whether is included in the file, the encryption identification is using default close File is encrypted key is together added in the file of encryption generation with the preset-key afterwards File has been encrypted with the file format identical formed with file to be encrypted;
If comprising, execution file decryption operation, and open the file after decryption.
3. method according to claim 2, it is characterised in that the determination file In whether comprising predetermined encryption mark, including:
Whether the thread added on startup by the mobile terminal is to the file comprising described Encryption identification is judged.
4. method according to claim 3, it is characterised in that the execution file decryption Operation, including:
Receive user's input key;
Determine user input key whether with the preset-key that is extracted from the file Match somebody with somebody;
If matching, the file is decrypted using the preset-key.
5. method according to claim 2, it is characterised in that methods described also includes:
If the file includes encryption identification, generate for indicating to add opened file Close encryption information;
Detect closing of a file order;
When detecting closing of a file order, detect encryption information to determine whether to have beaten described Open file is encrypted;
If it is determined that the opened file is encrypted, then when closing the file, use The preset-key file is encrypted and by the encryption identification and the preset-key In the file together generated added to encryption with the file format identical of formation and the file Encrypt file.
6. method according to claim 5, it is characterised in that the detection encryption information To determine whether the opened file is encrypted, including:
Detect encryption information to determine whether to add the opened file by the thread It is close.
7. a kind of file operation device for mobile terminal, it is characterised in that described device bag Include:
Receiving unit, for receiving CIPHERING REQUEST of the user to file, the CIPHERING REQUEST includes Key for encryption;
Ciphering unit, for file to be encrypted to be encrypted using the key;
Adding device, for encryption generation file in add the key and it is default plus Secret mark is known, and file has been encrypted with the file format identical formed with file to be encrypted, wherein, Whether the encryption identification is used to be that encryption file is identified to file.
8. a kind of file operation device for mobile terminal, it is characterised in that described device bag Include:
Receiving unit, for receiving file open request;
First determining unit, it is described to add for determining encryption identification whether is included in the file Secret mark is known together is added after file is encrypted using preset-key, with the preset-key Text has been encrypted with the file format identical formed with file to be encrypted into the file of encryption generation Part;
Opening unit, if for including encryption identification in the file, performing file decryption behaviour Make, and open the file after decryption.
9. device according to claim 8, it is characterised in that first determining unit Whether the thread for being further used for adding on startup by the mobile terminal wraps to the file Judged containing the encryption identification.
10. device according to claim 8, it is characterised in that the opening unit bag Include:
Key reception subelement, for receiving user's input key;
Cipher key match subelement, for determine user input key whether with from the file The preset-key matching of middle extraction;
Decrypt subelement, if for the user input key with extracted from the file it is pre- If cipher key match, then using the preset-key to being decrypted in the file.
11. device according to claim 8, it is characterised in that described device also includes:
Generation unit, if including encryption identification for the file, is generated for indicating to institute Open the encryption information that file is encrypted;
Detection unit, for detecting closing of a file order;
Second determining unit, for when detecting closing of a file order, detection encryption information with Determine whether the opened file is encrypted;
Ciphering unit, for if it is determined that the opened file is encrypted, then in closing institute The file is encrypted when stating file, using the preset-key and by the encryption identification With formation and the text of the file in the file together generated with the preset-key added to encryption Part form identical has encrypted file.
12. device according to claim 11, it is characterised in that described second determines list Member is further used for detecting encryption information to determine whether to have opened text to described by the thread Part is encrypted.
CN201610134363.3A 2016-03-09 2016-03-09 file operation method and device Pending CN107180197A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610134363.3A CN107180197A (en) 2016-03-09 2016-03-09 file operation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610134363.3A CN107180197A (en) 2016-03-09 2016-03-09 file operation method and device

Publications (1)

Publication Number Publication Date
CN107180197A true CN107180197A (en) 2017-09-19

Family

ID=59829560

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610134363.3A Pending CN107180197A (en) 2016-03-09 2016-03-09 file operation method and device

Country Status (1)

Country Link
CN (1) CN107180197A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108427889A (en) * 2018-01-10 2018-08-21 链家网(北京)科技有限公司 Document handling method and device
CN110929303A (en) * 2019-11-29 2020-03-27 江苏芯盛智能科技有限公司 Data processing method, device and system and solid state disk
CN111143291A (en) * 2019-11-19 2020-05-12 厦门天锐科技股份有限公司 Encrypted file searching method and device and electronic equipment
CN111159743A (en) * 2019-12-30 2020-05-15 掌阅科技股份有限公司 File encryption method of electronic book reader, computing device and storage medium
CN112464293A (en) * 2020-09-06 2021-03-09 厦门天锐科技股份有限公司 Method and device for determining file modification state
CN113268456A (en) * 2021-05-20 2021-08-17 济南浪潮数据技术有限公司 File processing method, system, equipment and computer readable storage medium
CN113407434A (en) * 2020-03-16 2021-09-17 腾讯科技(深圳)有限公司 Processing method and device for debugging file
TWI750473B (en) * 2018-05-17 2021-12-21 大陸商上海耕岩智能科技有限公司 Screen unlocking method and device for synchronously verifying fingerprint information
CN116150796A (en) * 2023-04-18 2023-05-23 安羚科技(杭州)有限公司 Data protection method and device for data leakage prevention system
CN117240585A (en) * 2023-10-18 2023-12-15 北京海泰方圆科技股份有限公司 Data encryption method, device and medium
CN117240585B (en) * 2023-10-18 2024-05-17 北京海泰方圆科技股份有限公司 Data encryption method, device and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609667A (en) * 2012-02-22 2012-07-25 浙江机电职业技术学院 Automatic file encryption and decryption system and automatic file encryption and decryption method based on filter drive program
US20130152219A1 (en) * 2011-12-09 2013-06-13 Hon Hai Precision Industry Co., Ltd. Electronic device with file locking function and method thereof
CN103218576A (en) * 2013-04-07 2013-07-24 福建伊时代信息科技股份有限公司 System and method for preventing electronic files from being copied

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130152219A1 (en) * 2011-12-09 2013-06-13 Hon Hai Precision Industry Co., Ltd. Electronic device with file locking function and method thereof
CN102609667A (en) * 2012-02-22 2012-07-25 浙江机电职业技术学院 Automatic file encryption and decryption system and automatic file encryption and decryption method based on filter drive program
CN103218576A (en) * 2013-04-07 2013-07-24 福建伊时代信息科技股份有限公司 System and method for preventing electronic files from being copied

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108427889A (en) * 2018-01-10 2018-08-21 链家网(北京)科技有限公司 Document handling method and device
TWI750473B (en) * 2018-05-17 2021-12-21 大陸商上海耕岩智能科技有限公司 Screen unlocking method and device for synchronously verifying fingerprint information
CN111143291A (en) * 2019-11-19 2020-05-12 厦门天锐科技股份有限公司 Encrypted file searching method and device and electronic equipment
CN110929303A (en) * 2019-11-29 2020-03-27 江苏芯盛智能科技有限公司 Data processing method, device and system and solid state disk
CN111159743A (en) * 2019-12-30 2020-05-15 掌阅科技股份有限公司 File encryption method of electronic book reader, computing device and storage medium
CN111159743B (en) * 2019-12-30 2023-01-13 掌阅科技股份有限公司 File encryption method of electronic book reader, computing device and storage medium
CN113407434A (en) * 2020-03-16 2021-09-17 腾讯科技(深圳)有限公司 Processing method and device for debugging file
CN112464293A (en) * 2020-09-06 2021-03-09 厦门天锐科技股份有限公司 Method and device for determining file modification state
CN113268456A (en) * 2021-05-20 2021-08-17 济南浪潮数据技术有限公司 File processing method, system, equipment and computer readable storage medium
CN113268456B (en) * 2021-05-20 2023-12-08 济南浪潮数据技术有限公司 File processing method, system, equipment and computer readable storage medium
CN116150796A (en) * 2023-04-18 2023-05-23 安羚科技(杭州)有限公司 Data protection method and device for data leakage prevention system
CN116150796B (en) * 2023-04-18 2023-12-08 安羚科技(杭州)有限公司 Data protection method and device for data leakage prevention system
CN117240585A (en) * 2023-10-18 2023-12-15 北京海泰方圆科技股份有限公司 Data encryption method, device and medium
CN117240585B (en) * 2023-10-18 2024-05-17 北京海泰方圆科技股份有限公司 Data encryption method, device and medium

Similar Documents

Publication Publication Date Title
CN107180197A (en) file operation method and device
KR100753932B1 (en) contents encryption method, system and method for providing contents through network using the encryption method
CN104660589B (en) Method, system and terminal for encrypting control and information analysis of information
US9240883B2 (en) Multi-key cryptography for encrypting file system acceleration
US8880879B2 (en) Accelerated cryptography with an encryption attribute
WO2016045469A1 (en) Information encryption method and mobile terminal
CN1889419B (en) Method and apparatus for realizing encrypting
CN107659397A (en) A kind of sensitive information transmission method and system
CN109767375A (en) The method and system of image watermark insertion and retrospect
CN105809042A (en) Information protection method and device, information display method and device, and terminal
CN106067874B (en) It is a kind of by the method for data record to server end, terminal and server
CN104270516B (en) Decryption method and mobile terminal
JP2006260521A (en) Document management system, information processing apparatus, method, and computer program
CN107809436A (en) Authority discrimination method, encryption method, the apparatus and system of Internet video access
CN108199847A (en) Security processing method, computer equipment and storage medium
CN110232021A (en) The method and device of page test
CN107342966A (en) Authority credentials distribution method and device
CN106685897A (en) Safe input method, device and system
US20170200020A1 (en) Data management system, program recording medium, communication terminal, and data management server
CN114666135A (en) Data encryption method and device, electronic equipment and storage medium
CN113722741A (en) Data encryption method and device and data decryption method and device
CN108052828A (en) Generation method, device, terminal and the storage medium of record screen file
CN104580255B (en) Authentication method and system of the identification equipment based on recognizable code stream to terminal device
CN106682525A (en) File protection method and file protection device
WO2016150023A1 (en) Fingerprint decrypting method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170919

RJ01 Rejection of invention patent application after publication