CN107180197A - file operation method and device - Google Patents
file operation method and device Download PDFInfo
- Publication number
- CN107180197A CN107180197A CN201610134363.3A CN201610134363A CN107180197A CN 107180197 A CN107180197 A CN 107180197A CN 201610134363 A CN201610134363 A CN 201610134363A CN 107180197 A CN107180197 A CN 107180197A
- Authority
- CN
- China
- Prior art keywords
- file
- encrypted
- key
- encryption
- preset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
This application discloses the file operation method and device for mobile terminal.One embodiment of methods described includes:CIPHERING REQUEST of the user to file is received, the CIPHERING REQUEST includes the key for encrypting;File to be encrypted is encrypted using the key;The key and default encryption identification are added in the file of encryption generation, file has been encrypted with the file format identical formed with file to be encrypted, wherein, whether the encryption identification is used to be that encryption file is identified to file.This embodiment improves the convenience of file operation.
Description
Technical field
The application is related to field of computer technology, and in particular to Internet technical field, especially relates to
And file operation method and device.
Background technology
User is when using intelligent terminal, the usually data storage in intelligent terminal.For some
The file of secrecy is, it is necessary to which file is encrypted using encryption software.
However, being solved in the prior art in the technology of encryption and decryption is carried out to file to file
Decrypting process could be completed by needing user or system to carry out multi-pass operation when close, and text has been significantly greatly increased
The complexity of part operation, accordingly it is desirable to be improved to file encryption-decryption operation, so that literary
Part decryption is more convenient.
The content of the invention
The purpose of the application is to propose a kind of improved file operation method for mobile terminal
And device, to solve the technical problem that background section above is mentioned.
In a first aspect, this application provides a kind of file operation method for mobile terminal, institute
The method of stating includes:CIPHERING REQUEST of the user to file is received, the CIPHERING REQUEST includes being used to add
Close key;File to be encrypted is encrypted using the key;In the file of encryption generation
The middle addition key and default encryption identification, to form the tray with file to be encrypted
Formula identical has encrypted file, wherein, whether the encryption identification is used to be encryption text to file
Part is identified.
Second aspect, this application provides another file operation method for mobile terminal,
Characterized in that, methods described includes:Receive file open request;Determine be in the file
It is no include encryption identification, the encryption identification after file is encrypted using preset-key,
With formation and file to be encrypted in the file together generated with the preset-key added to encryption
File format identical has encrypted file;If comprising, execution file decryption operation, and open
File after decryption.
It is in certain embodiments, described to determine whether comprising predetermined encryption mark in the file,
Including:Whether the thread added on startup by the mobile terminal includes institute to the file
Encryption identification is stated to be judged.
In certain embodiments, the execution file decryption operation, including:Receive user's input
Key;Determine user input key whether with the preset-key that is extracted from the file
Match somebody with somebody;If matching, the file is decrypted using the preset-key.
In certain embodiments, methods described also includes:If the file includes encryption identification,
Then generate the encryption information for indicating that opened file is encrypted;Detect closing of a file life
Order;When detecting closing of a file order, detect encryption information to determine whether to have beaten described
Open file is encrypted;If it is determined that the opened file is encrypted, then it is described in closing
The file is encrypted during file, using the preset-key and by the encryption identification with
With formation and the file of the file in the file that the preset-key is together generated added to encryption
Form identical has encrypted file.
In certain embodiments, it is described to detect encryption information to determine whether to have opened text to described
Part is encrypted, including:By the thread detect encryption information with determine whether to it is described
File is opened to be encrypted.
The third aspect, this application provides a kind of file operation device for mobile terminal, institute
Stating device includes:Receiving unit, for receiving CIPHERING REQUEST of the user to file, the encryption
Request includes the key for encrypting;Ciphering unit, for using the key to text to be encrypted
Part is encrypted;Adding device, for encryption generation file in add the key and
Default encryption identification, file has been encrypted with the file format identical formed with file to be encrypted,
Wherein, whether the encryption identification is used to be that encryption file is identified to file.
Fourth aspect, this application provides another file operation device for mobile terminal,
Described device includes:Receiving unit, for receiving file open request;First determining unit,
For determining encryption identification whether is included in the file, the encryption identification is using default close
File is encrypted key is together added in the file of encryption generation with the preset-key afterwards
File has been encrypted with the file format identical formed with file to be encrypted;Opening unit, is used for
If including encryption identification in the file, file decryption operation is performed, and open after decryption
File.
In certain embodiments, first determining unit is further used for by described mobile whole
Hold whether the thread added on startup judges the file comprising the encryption identification.
In certain embodiments, the opening unit includes:Key reception subelement, for connecing
Receive user's input key;Cipher key match subelement, for whether determining user's input key
Matched with the preset-key extracted from the file;Subelement is decrypted, if for the user
Input key is matched with the preset-key extracted from the file, then using the preset-key
The file is decrypted.
In certain embodiments, described device also includes:Generation unit, if for the file
Including encryption identification, then the encryption information for indicating that opened file is encrypted is generated;
Detection unit, for detecting closing of a file order;Second determining unit, text is detected for working as
During part shutdown command, detect encryption information to determine whether the opened file is encrypted;
Ciphering unit, for if it is determined that the opened file is encrypted, then in the closing text
The file is encrypted during part, using the preset-key and by the encryption identification and institute
State in the file that preset-key is together generated added to encryption to form the tray with the file
Formula identical has encrypted file.
In certain embodiments, second determining unit is further used for examining by the thread
Encryption information is surveyed to determine whether the opened file is encrypted.
File operation method and device that the application is provided, during encryption by for the key of encryption and
In the cryptograph files generated for indicating the encryption identification of encryption file to be applied directly to using key,
The encryption file formed in this way can by file in itself in encryption identification and key
Carry out subsequent decryption operation so that the file after encryption can be performed on different mobile terminal,
So as to improve the convenience of file decryption;In decryption, determine file to add by encryption identification
Ciphertext part is to determine to need that file is decrypted, while the key carried in itself by file is i.e.
Authority Verification and decryption can be carried out, so that this method can be performed on different mobile terminal,
Substantially increase the convenience of file decryption.
Brief description of the drawings
Retouched by reading with reference to the detailed of being made to non-limiting example of being made of the following drawings
State, other features, objects and advantages will become more apparent upon:
Fig. 1 is that the application can apply to exemplary system architecture figure therein;
Fig. 2 is one embodiment of the file operation method for mobile terminal according to the application
Flow chart;
Fig. 3 is another implementation of the file operation method for mobile terminal according to the application
The flow chart of example;
Fig. 4 is one embodiment of the corresponding file operation device of file operation method shown in Fig. 2
Structural representation;
Fig. 5 is one embodiment of the corresponding file operation device of file operation method shown in Fig. 3
Structural representation;
Fig. 6 is adapted for for realizing the terminal device of the embodiment of the present application or the computer of server
The structural representation of system.
Embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is appreciated that
, specific embodiment described herein is used only for explaining related invention, rather than to the hair
Bright restriction.It also should be noted that, illustrate only for the ease of description, in accompanying drawing with
About the related part of invention.
It should be noted that in the case where not conflicting, embodiment and embodiment in the application
In feature can be mutually combined.Describe this in detail below with reference to the accompanying drawings and in conjunction with the embodiments
Application.
Fig. 1 shows the reality of the file operation method that can apply the application or file operation device
Apply the exemplary system architecture 100 of example.
As shown in figure 1, system architecture 100 can include mobile terminal device 101,102, net
Network 103 and server 104.Network 103 is used in mobile terminal device 101,102 and service
The medium of communication link is provided between device 104.Network 103 can include various connection types,
Such as wired, wireless communication link or fiber optic cables etc..
User can use mobile terminal device 101,102 by network 103 and server 104
Interaction, to receive or send message etc..It can be provided with mobile terminal device 101,102 each
The telecommunication customer end application for being used for opening file is planted, such as audio/video player application, picture show
Show class application, the application of text editing class etc..
Mobile terminal device 101,102 can be with display screen and support each of browsing file
Kind of mobile electronic device, including but not limited to smart mobile phone, tablet personal computer, E-book reader,
(Moving Picture Experts Group Audio Layer III, dynamic image is special for MP3 player
Family's compression standard audio aspect 3), MP4 (Moving Picture Experts Group Audio
Layer IV, dynamic image expert's compression standard audio aspect 4) player etc..
Server 104 can be to provide the server of various services, such as to mobile terminal device
101st, the file shown on 102 provides the background server supported.Background server can be to text
Part remotely store or can be sent when receiving file open request to mobile terminal
File is so that mobile electronic device gets file.
It should be noted that the file operation method that the embodiment of the present application is provided is general by moving
Terminal device 101,102 is performed, and correspondingly, file operation device is generally positioned at mobile terminal
In equipment 101,102.In some cases, the file operation side that the embodiment of the present application is provided
Method and file operation device can not also be related to server 104.
It should be understood that the number of the mobile terminal device, network and server in Fig. 1 is only
Schematically.According to needs are realized, can have any number of mobile terminal device, network
And server.
With continued reference to Fig. 2, the file operation side for mobile terminal according to the application is shown
The flow 200 of one embodiment of method.The described file operation method for mobile terminal,
Comprise the following steps:
Step 201, CIPHERING REQUEST of the user to file is received.
In the present embodiment, electronic equipment (such as Fig. 1 of file operation method operation thereon
In mobile terminal) CIPHERING REQUEST of the user to file can be received first.User is in initiation pair
During the CIPHERING REQUEST of file to be encrypted, key can be inputted simultaneously, and the key will add in follow-up
Used in close flow.
Step 202, file to be encrypted is encrypted using key.
In the present embodiment, based on the key received in step 201 in CIPHERING REQUEST, electronics
Then file to be encrypted is encrypted using the key for equipment.Generally, electronic equipment can make
The plaintext in file to be encrypted is encrypted with AES, it is above-mentioned close to be converted into ciphertext
Key can as performed AES encryption parameter.Specific AES can be symmetrical
Algorithm, asymmetric arithmetic and hash algorithm etc. are various available for the algorithm that file is encrypted.
File is encrypted and belongs to art technology by known known encryption parameter and AES
The known technology of personnel, is repeated no more here.
Step 203, addition key and default encryption identification in the file of encryption generation,
File has been encrypted with the file format identical formed with file to be encrypted.
In the present embodiment, generated text file to be encrypted is encrypted based on step 202
Part, electronic equipment can add the above-mentioned key and encryption identification for being used to encrypt thereto.Should
Encryption identification can use binary identification.In addition, electronic equipment can give birth to encryption
Into file, key and encryption identification change into binary stream, and will convert into two respectively
System stream is merged, and finally converts back the binary stream merged and tray to be encrypted
Formula identical file.Generally, the content of above-mentioned encryption identification can be " cafe " or " desc "
Deng string representation.When being added, encryption identification can be added in file header, so as to
The File header information of file can be analyzed during follow-up opening file, so as to judge that file is
No encryption.
For example, the file after encryption can be converted into binary stream byte [] textStream, key
Binary stream byte [] keystream is converted into, the binary stream that encryption identification is converted into can be
Byte [] flagStream, then the binary stream after merging can be flagStream+
Keystream+textStream, afterwards, the binary stream being merged into can be converted into it is to be encrypted
File identical file type identical file.
The method that above-described embodiment of the application is provided passes through for the key of encryption and for referring to
Show that the encryption identification of encryption file is applied directly in the cryptograph files using key generation, key is hidden
Be hidden in encryption file in cause encryption file be transplanted to an other equipment use same system according to
It can so use, transplantability is high, enhances the convenience of file operation.Also, using in text
Encryption identification is added in part to be identified to whether file is encrypted, and unencrypted file will not be produced
Influence.
With further reference to Fig. 3, it illustrates the flow of another of file operation method embodiment
300.The flow 300 of this document operating method, comprises the following steps:
Step 301, file open request is received.
In the present embodiment, electronic equipment (such as Fig. 1 of file operation method operation thereon
Shown mobile terminal) can by being detected to the file open request that user sends,
User is sent after file open request by deliberate action, and electronic equipment can receive this document
Open request.Generally, user can be by carrying out double touch operation to file destination
Initiate file open request.
Step 302, determine whether include encryption identification in file.
In the present embodiment, the file open request received based on step 301, electronic equipment
The file content of file pointed by file open request can be parsed, with to this document
In whether encryption identification is judged.Generally, the encryption identification is using preset-key to file
Be encrypted it is rear, with preset-key together added in the file of encryption generation with formation with it is to be added
The file format identical of ciphertext part has encrypted file.That is, when containing encryption identification in file,
This document can then be determined for the file Jing Guo encryption, it is necessary to use and file format pair
File is decrypted before opening file for the application answered.
Step 303, if comprising execution file decryption is operated, and opens the file after decryption.
In the present embodiment, file is decrypted electronic equipment, and is opened after the completion of decryption
File after decryption.Open decryption after file can it is preassembled by electronic equipment, with
File is opened in the corresponding application of this document, and can also send the file to server makes server
The content that translating the file into directly to show sends back electronic equipment.
In some optional implementations of the present embodiment, the execution file decryption in step 303
Operation generally includes following steps:Electronic equipment can receive user's input key first.Generally
Electronic equipment can generate control, and user to electronic equipment can input key by the control,
The key be i.e. user input key, afterwards electronic equipment can receive the user input it is close
Key.Afterwards, whether electronic equipment can determine above-mentioned user's input key with being extracted from file
Preset-key matching.Electronic equipment can preset the rule of matching, when two keys are full
It can assert that both match when this is regular enough.Generally, the rule of matching can be set as at two
Both matchings are assert when the content of key is identical, can also be set as that the content in two keys expires
Both matchings are assert during other matched rules of foot.Afterwards, however, it is determined that both match, electronic equipment
The preset-key extracted from file can be used to removing encryption identification in file and presetting close
Other parts outside key are decrypted, so that the file after being decrypted so that can be used corresponding
Application program open file.In the implementation, the key carried in itself by file
Authority Verification and decryption are carried out, so that this method can be performed on different mobile terminal,
Substantially increase the convenience of file decryption.
, in step 302, can be by moving in some optional implementations of the present embodiment
The thread that dynamic terminal is added on startup detects encryption information to determine whether to enter opened file
Row encryption.Encryption thread based on backstage encryption identification is identified with determine file whether be
File is encrypted so that identification process is transparent to user, so that it is dry to avoid the operation to user from producing
Disturb.
In some optional implementations of the present embodiment, above-mentioned file operation method also include with
Lower step:
First, if above-mentioned file includes encryption identification, electronic equipment can be generated for indicating
The encryption information that opened file is encrypted.Generally, the step can perform step 302
Shi Zhihang.Whether the encryption information of step generation can be as subsequent step to decrypting and opening
The foundation that file afterwards is encrypted again.
Secondly, electronic equipment can be detected to closing of a file order.Generally, the step for
It can start to perform after File Open.Generally, closing of a file order can be that user closes use
The instruction sent when the operation of application program of file is opened.
Then, when electronic equipment can detect closing of a file order, encryption information is examined
Survey to determine whether opened file is encrypted.Because encryption information can serve to indicate that pair
Opened file is encrypted, and electronic equipment can determine closing when detecting the encryption information
Need that this document is encrypted when closing the file opened.
Optionally, electronic equipment can detect encryption information determine whether pair by above-mentioned thread
Opened file is encrypted.Because the execution of the encryption thread on backstage is transparent to user, so that
The operation to user is avoided to produce interference.
Finally, however, it is determined that opened file is encrypted, then electronic equipment can be somebody's turn to do closing
File is encrypted again during file, even if be encrypted and will added to file with above-mentioned preset-key
Secret mark is known in the file together generated added to encryption with preset-key to be formed and above-mentioned file
File format identical has encrypted file.
In the implementation, if determining that file is encryption by encryption identification when closing file
File, then key pair encryption file file being encrypted before automatic use is encrypted,
And encrypted again in addition encryption identification and the file of the big encryption generation of key with generating again
File, operating procedure is succinct, reduces user operation time.
The method that above-described embodiment of the application is provided is by using the encryption mark added hereof
Knowledge is identified to whether file is encrypted, and influence will not be produced on unencrypted file, is more facilitated.
With further reference to Fig. 4, as the realization to method shown in above-mentioned Fig. 2, the application is provided
A kind of one embodiment of file operation device, the device embodiment and the method shown in Fig. 2
Embodiment is corresponding, and the device specifically can apply in various electronic equipments.
As shown in figure 4, the file device 400 described in the present embodiment includes:Receiving unit 401,
Ciphering unit 402, adding device 403.Wherein, receiving unit 401 is used to receive user to text
The CIPHERING REQUEST of part, the CIPHERING REQUEST includes the key for encrypting;Ciphering unit 402 is used for
File to be encrypted is encrypted using key;Adding device 403 is used for the text in encryption generation
Key and default encryption identification are added in part, to form the file format with file to be encrypted
Identical has encrypted file, wherein, whether encryption identification is used to be that encryption file is carried out to file
Identification.
In the present embodiment, receiving unit 401, ciphering unit 402, the tool of adding device 403
Body processing may be referred to step 201, step 202, the step 203 of Fig. 2 correspondence embodiments.
With further reference to Fig. 5, as the realization to method shown in above-mentioned Fig. 3, the application is provided
A kind of one embodiment of file operation device, the device embodiment and the method shown in Fig. 3
Embodiment is corresponding, and the device specifically can apply in various electronic equipments.
As shown in figure 5, the file device 500 described in the present embodiment includes:Receiving unit 501,
First determining unit 502, opening unit 503.Wherein, receiving unit 501 is used to receive file
Open request;First determining unit 502 is used to determine encryption identification whether to be included in file, plus
Secret mark is known after file is encrypted using preset-key and preset-key is together added to and added
File has been encrypted with the file format identical formed with file to be encrypted in the file of close generation;
If opening unit 503 is used in file include encryption identification, file decryption operation is performed, and
Open the file after decryption.
In the present embodiment, receiving unit 501, the first determining unit 502, opening unit 503
Specific processing may be referred to Fig. 3 correspondence embodiment step 301, step 302, step 303.
In some optional implementations of the present embodiment, above-mentioned first determining unit 502 enters one
Walk for whether the thread added on startup by mobile terminal to enter to file comprising encryption identification
Row judges.Specific processing may be referred to corresponding implementation in Fig. 3 correspondence embodiments.
In some optional implementations of the present embodiment, opening unit 503 can include:It is close
Key receiving subelement (not shown), for receiving user's input key;Cipher key match subelement is (not
Show), for determining whether user's input key matches with the preset-key extracted from file;
Decrypt subelement (not shown), if for user input key with extracted from file it is default close
Key is matched, then above-mentioned file is decrypted using preset-key.Specific processing may be referred to figure
Corresponding implementation in 3 correspondence embodiments.
In some optional implementations of the present embodiment, above-mentioned first determining unit 502 enters one
Walk for whether the thread added on startup by mobile terminal to enter to file comprising encryption identification
Row judges.Specific processing may be referred to corresponding implementation in Fig. 3 correspondence embodiments.
In some optional implementations of the present embodiment, above-mentioned file operation device 500 is also wrapped
Include:Generation unit (not shown), if including encryption identification for file, is generated for indicating
The encryption information that opened file is encrypted;Detection unit (not shown), for detecting text
Part shutdown command;Second determining unit (not shown), for when detecting closing of a file order,
Encryption information is detected to determine whether opened file is encrypted;Ciphering unit (not shown),
For if it is determined that opened file is encrypted, then when closing file, using above-mentioned default
Key-pair file is encrypted and by encryption identification and preset-key together added to encryption generation
File has been encrypted with the file format identical formed with file in file.Specific processing can be joined
Examine corresponding implementation in Fig. 3 correspondence embodiments.
In some optional implementations of the present embodiment, above-mentioned second determining unit is further used
Detect encryption information to determine whether to having beaten in the thread added on startup by mobile terminal
Open file is encrypted.Specific processing may be referred to corresponding realization side in Fig. 3 correspondence embodiments
Formula.
Below with reference to Fig. 6, it illustrates suitable for for realizing the mobile terminal of the embodiment of the present application
The structural representation of the computer system 600 of equipment.
As shown in fig. 6, computer system 600 includes CPU (CPU) 601, its
Can according to the program being stored in read-only storage (ROM) 602 or from storage part 608
The program that is loaded into random access storage device (RAM) 603 and perform various appropriate actions
And processing.In RAM 603, the system that is also stored with 600 operates required various program sums
According to.CPU 601, ROM 602 and RAM 603 are connected with each other by bus 604.Input
/ output (I/O) interface 605 is also connected to bus 604.
I/O interfaces 605 are connected to lower component:Include the importation of touch-screen, button etc.
606;Output par, c 607 including liquid crystal display (LCD) etc. and loudspeaker etc.;
Storage part 608 including hard disk etc.;And communications portion 609.Communications portion 609 is via all
Network such as internet performs communication process.Driver 610 is connect also according to needing to be connected to I/O
Mouth 605.Detachable media 611, such as storage card etc., as needed installed in driver
On 610, in order to which the computer program read from it is mounted into storage part as needed
608。
Especially, in accordance with an embodiment of the present disclosure, the process described above with reference to flow chart can be with
It is implemented as computer software programs.For example, embodiment of the disclosure includes a kind of computer journey
Sequence product, it includes being tangibly embodied in the computer program on machine readable media, the meter
Calculation machine program bag, which contains, is used for the program code of the method shown in execution flow chart.Implement such
In example, the computer program can be downloaded and installed by communications portion 609 from network,
And/or be mounted from detachable media 611.
Flow chart and block diagram in accompanying drawing, it is illustrated that according to the system of the various embodiments of the application,
Architectural framework in the cards, function and the operation of method and computer program product.This point
On, each square frame in flow chart or block diagram can represent a module, program segment or code
A part, the part of the module, program segment or code is used for comprising one or more
The executable instruction of logic function as defined in realizing.It should also be noted that being used as replacement at some
In realization, the function of being marked in square frame can also be with different from the order marked in accompanying drawing hair
It is raw.For example, two square frames succeedingly represented can essentially be performed substantially in parallel, they
Sometimes it can also perform in the opposite order, this is depending on involved function.It is also noted that
It is, each square frame in block diagram and/or flow chart and the square frame in block diagram and/or flow chart
Combination, can be realized with the special hardware based system of defined function or operation is performed,
Or can be realized with the combination of specialized hardware and computer instruction.
Being described in unit involved in the embodiment of the present application can be real by way of software
It is existing, it can also be realized by way of hardware.Described unit can also be arranged on processing
In device, for example, can be described as:A kind of processor includes receiving unit, ciphering unit, added
Plus unit.Wherein, the title of these units is not constituted to the unit in itself under certain conditions
Restriction, for example, ciphering unit be also described as " using the key to text to be encrypted
The unit that part is encrypted ".
As on the other hand, present invention also provides a kind of nonvolatile computer storage media,
The nonvolatile computer storage media can be described in above-described embodiment included in device
Nonvolatile computer storage media;Can also be individualism, without non-in supplying terminal
Volatile computer storage medium.Above-mentioned nonvolatile computer storage media be stored with one or
The multiple programs of person, when one or more of programs are performed by an equipment so that described
Equipment:CIPHERING REQUEST of the user to file is received, the CIPHERING REQUEST includes close for what is encrypted
Key;File to be encrypted is encrypted using the key;Added in the file of encryption generation
The key and default encryption identification are identical with the file format of file to be encrypted to be formed
Encryption file, wherein, the encryption identification be used for file whether be encryption file carry out
Identification.Or, above-mentioned nonvolatile computer storage media is stored with one or more program,
When one or more of programs are performed by an equipment so that the equipment:Receive text
Part opens request;Determine whether include encryption identification in the file, the encryption identification makes
Together added to encryption generation after file is encrypted with preset-key, with the preset-key
File in encrypted file with the file format identical of file to be encrypted to be formed;If comprising,
File decryption operation is then performed, and opens the file after decryption.
Above description is only the preferred embodiment of the application and saying to institute's application technology principle
It is bright.It will be appreciated by those skilled in the art that invention scope involved in the application, is not limited
In the technical scheme of the particular combination of above-mentioned technical characteristic, do not departed from while should cover yet
In the case of the inventive concept, it is combined by above-mentioned technical characteristic or its equivalent feature
Formed by other technical schemes.Such as features described above and (but not limited to) disclosed herein
Technical characteristic with similar functions carries out technical scheme formed by replacement mutually.
Claims (12)
1. a kind of file operation method for mobile terminal, it is characterised in that methods described bag
Include:
CIPHERING REQUEST of the user to file is received, the CIPHERING REQUEST includes the key for encrypting;
File to be encrypted is encrypted using the key;
The key and default encryption identification are added in the file of encryption generation, to be formed
File has been encrypted with the file format identical of file to be encrypted, wherein, the encryption identification is used
In to file whether be encryption file be identified.
2. a kind of file operation method for mobile terminal, it is characterised in that methods described bag
Include:
Receive file open request;
Determine encryption identification whether is included in the file, the encryption identification is using default close
File is encrypted key is together added in the file of encryption generation with the preset-key afterwards
File has been encrypted with the file format identical formed with file to be encrypted;
If comprising, execution file decryption operation, and open the file after decryption.
3. method according to claim 2, it is characterised in that the determination file
In whether comprising predetermined encryption mark, including:
Whether the thread added on startup by the mobile terminal is to the file comprising described
Encryption identification is judged.
4. method according to claim 3, it is characterised in that the execution file decryption
Operation, including:
Receive user's input key;
Determine user input key whether with the preset-key that is extracted from the file
Match somebody with somebody;
If matching, the file is decrypted using the preset-key.
5. method according to claim 2, it is characterised in that methods described also includes:
If the file includes encryption identification, generate for indicating to add opened file
Close encryption information;
Detect closing of a file order;
When detecting closing of a file order, detect encryption information to determine whether to have beaten described
Open file is encrypted;
If it is determined that the opened file is encrypted, then when closing the file, use
The preset-key file is encrypted and by the encryption identification and the preset-key
In the file together generated added to encryption with the file format identical of formation and the file
Encrypt file.
6. method according to claim 5, it is characterised in that the detection encryption information
To determine whether the opened file is encrypted, including:
Detect encryption information to determine whether to add the opened file by the thread
It is close.
7. a kind of file operation device for mobile terminal, it is characterised in that described device bag
Include:
Receiving unit, for receiving CIPHERING REQUEST of the user to file, the CIPHERING REQUEST includes
Key for encryption;
Ciphering unit, for file to be encrypted to be encrypted using the key;
Adding device, for encryption generation file in add the key and it is default plus
Secret mark is known, and file has been encrypted with the file format identical formed with file to be encrypted, wherein,
Whether the encryption identification is used to be that encryption file is identified to file.
8. a kind of file operation device for mobile terminal, it is characterised in that described device bag
Include:
Receiving unit, for receiving file open request;
First determining unit, it is described to add for determining encryption identification whether is included in the file
Secret mark is known together is added after file is encrypted using preset-key, with the preset-key
Text has been encrypted with the file format identical formed with file to be encrypted into the file of encryption generation
Part;
Opening unit, if for including encryption identification in the file, performing file decryption behaviour
Make, and open the file after decryption.
9. device according to claim 8, it is characterised in that first determining unit
Whether the thread for being further used for adding on startup by the mobile terminal wraps to the file
Judged containing the encryption identification.
10. device according to claim 8, it is characterised in that the opening unit bag
Include:
Key reception subelement, for receiving user's input key;
Cipher key match subelement, for determine user input key whether with from the file
The preset-key matching of middle extraction;
Decrypt subelement, if for the user input key with extracted from the file it is pre-
If cipher key match, then using the preset-key to being decrypted in the file.
11. device according to claim 8, it is characterised in that described device also includes:
Generation unit, if including encryption identification for the file, is generated for indicating to institute
Open the encryption information that file is encrypted;
Detection unit, for detecting closing of a file order;
Second determining unit, for when detecting closing of a file order, detection encryption information with
Determine whether the opened file is encrypted;
Ciphering unit, for if it is determined that the opened file is encrypted, then in closing institute
The file is encrypted when stating file, using the preset-key and by the encryption identification
With formation and the text of the file in the file together generated with the preset-key added to encryption
Part form identical has encrypted file.
12. device according to claim 11, it is characterised in that described second determines list
Member is further used for detecting encryption information to determine whether to have opened text to described by the thread
Part is encrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610134363.3A CN107180197A (en) | 2016-03-09 | 2016-03-09 | file operation method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610134363.3A CN107180197A (en) | 2016-03-09 | 2016-03-09 | file operation method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107180197A true CN107180197A (en) | 2017-09-19 |
Family
ID=59829560
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610134363.3A Pending CN107180197A (en) | 2016-03-09 | 2016-03-09 | file operation method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107180197A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108427889A (en) * | 2018-01-10 | 2018-08-21 | 链家网(北京)科技有限公司 | Document handling method and device |
CN110929303A (en) * | 2019-11-29 | 2020-03-27 | 江苏芯盛智能科技有限公司 | Data processing method, device and system and solid state disk |
CN111143291A (en) * | 2019-11-19 | 2020-05-12 | 厦门天锐科技股份有限公司 | Encrypted file searching method and device and electronic equipment |
CN111159743A (en) * | 2019-12-30 | 2020-05-15 | 掌阅科技股份有限公司 | File encryption method of electronic book reader, computing device and storage medium |
CN112464293A (en) * | 2020-09-06 | 2021-03-09 | 厦门天锐科技股份有限公司 | Method and device for determining file modification state |
CN113268456A (en) * | 2021-05-20 | 2021-08-17 | 济南浪潮数据技术有限公司 | File processing method, system, equipment and computer readable storage medium |
CN113407434A (en) * | 2020-03-16 | 2021-09-17 | 腾讯科技(深圳)有限公司 | Processing method and device for debugging file |
TWI750473B (en) * | 2018-05-17 | 2021-12-21 | 大陸商上海耕岩智能科技有限公司 | Screen unlocking method and device for synchronously verifying fingerprint information |
CN116150796A (en) * | 2023-04-18 | 2023-05-23 | 安羚科技(杭州)有限公司 | Data protection method and device for data leakage prevention system |
CN117240585A (en) * | 2023-10-18 | 2023-12-15 | 北京海泰方圆科技股份有限公司 | Data encryption method, device and medium |
CN117240585B (en) * | 2023-10-18 | 2024-05-17 | 北京海泰方圆科技股份有限公司 | Data encryption method, device and medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102609667A (en) * | 2012-02-22 | 2012-07-25 | 浙江机电职业技术学院 | Automatic file encryption and decryption system and automatic file encryption and decryption method based on filter drive program |
US20130152219A1 (en) * | 2011-12-09 | 2013-06-13 | Hon Hai Precision Industry Co., Ltd. | Electronic device with file locking function and method thereof |
CN103218576A (en) * | 2013-04-07 | 2013-07-24 | 福建伊时代信息科技股份有限公司 | System and method for preventing electronic files from being copied |
-
2016
- 2016-03-09 CN CN201610134363.3A patent/CN107180197A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130152219A1 (en) * | 2011-12-09 | 2013-06-13 | Hon Hai Precision Industry Co., Ltd. | Electronic device with file locking function and method thereof |
CN102609667A (en) * | 2012-02-22 | 2012-07-25 | 浙江机电职业技术学院 | Automatic file encryption and decryption system and automatic file encryption and decryption method based on filter drive program |
CN103218576A (en) * | 2013-04-07 | 2013-07-24 | 福建伊时代信息科技股份有限公司 | System and method for preventing electronic files from being copied |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108427889A (en) * | 2018-01-10 | 2018-08-21 | 链家网(北京)科技有限公司 | Document handling method and device |
TWI750473B (en) * | 2018-05-17 | 2021-12-21 | 大陸商上海耕岩智能科技有限公司 | Screen unlocking method and device for synchronously verifying fingerprint information |
CN111143291A (en) * | 2019-11-19 | 2020-05-12 | 厦门天锐科技股份有限公司 | Encrypted file searching method and device and electronic equipment |
CN110929303A (en) * | 2019-11-29 | 2020-03-27 | 江苏芯盛智能科技有限公司 | Data processing method, device and system and solid state disk |
CN111159743A (en) * | 2019-12-30 | 2020-05-15 | 掌阅科技股份有限公司 | File encryption method of electronic book reader, computing device and storage medium |
CN111159743B (en) * | 2019-12-30 | 2023-01-13 | 掌阅科技股份有限公司 | File encryption method of electronic book reader, computing device and storage medium |
CN113407434A (en) * | 2020-03-16 | 2021-09-17 | 腾讯科技(深圳)有限公司 | Processing method and device for debugging file |
CN112464293A (en) * | 2020-09-06 | 2021-03-09 | 厦门天锐科技股份有限公司 | Method and device for determining file modification state |
CN113268456A (en) * | 2021-05-20 | 2021-08-17 | 济南浪潮数据技术有限公司 | File processing method, system, equipment and computer readable storage medium |
CN113268456B (en) * | 2021-05-20 | 2023-12-08 | 济南浪潮数据技术有限公司 | File processing method, system, equipment and computer readable storage medium |
CN116150796A (en) * | 2023-04-18 | 2023-05-23 | 安羚科技(杭州)有限公司 | Data protection method and device for data leakage prevention system |
CN116150796B (en) * | 2023-04-18 | 2023-12-08 | 安羚科技(杭州)有限公司 | Data protection method and device for data leakage prevention system |
CN117240585A (en) * | 2023-10-18 | 2023-12-15 | 北京海泰方圆科技股份有限公司 | Data encryption method, device and medium |
CN117240585B (en) * | 2023-10-18 | 2024-05-17 | 北京海泰方圆科技股份有限公司 | Data encryption method, device and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107180197A (en) | file operation method and device | |
KR100753932B1 (en) | contents encryption method, system and method for providing contents through network using the encryption method | |
CN104660589B (en) | Method, system and terminal for encrypting control and information analysis of information | |
US9240883B2 (en) | Multi-key cryptography for encrypting file system acceleration | |
US8880879B2 (en) | Accelerated cryptography with an encryption attribute | |
WO2016045469A1 (en) | Information encryption method and mobile terminal | |
CN1889419B (en) | Method and apparatus for realizing encrypting | |
CN107659397A (en) | A kind of sensitive information transmission method and system | |
CN109767375A (en) | The method and system of image watermark insertion and retrospect | |
CN105809042A (en) | Information protection method and device, information display method and device, and terminal | |
CN106067874B (en) | It is a kind of by the method for data record to server end, terminal and server | |
CN104270516B (en) | Decryption method and mobile terminal | |
JP2006260521A (en) | Document management system, information processing apparatus, method, and computer program | |
CN107809436A (en) | Authority discrimination method, encryption method, the apparatus and system of Internet video access | |
CN108199847A (en) | Security processing method, computer equipment and storage medium | |
CN110232021A (en) | The method and device of page test | |
CN107342966A (en) | Authority credentials distribution method and device | |
CN106685897A (en) | Safe input method, device and system | |
US20170200020A1 (en) | Data management system, program recording medium, communication terminal, and data management server | |
CN114666135A (en) | Data encryption method and device, electronic equipment and storage medium | |
CN113722741A (en) | Data encryption method and device and data decryption method and device | |
CN108052828A (en) | Generation method, device, terminal and the storage medium of record screen file | |
CN104580255B (en) | Authentication method and system of the identification equipment based on recognizable code stream to terminal device | |
CN106682525A (en) | File protection method and file protection device | |
WO2016150023A1 (en) | Fingerprint decrypting method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170919 |
|
RJ01 | Rejection of invention patent application after publication |