CN108563959A - File encrypting method, device and computer storage media - Google Patents
File encrypting method, device and computer storage media Download PDFInfo
- Publication number
- CN108563959A CN108563959A CN201810377783.3A CN201810377783A CN108563959A CN 108563959 A CN108563959 A CN 108563959A CN 201810377783 A CN201810377783 A CN 201810377783A CN 108563959 A CN108563959 A CN 108563959A
- Authority
- CN
- China
- Prior art keywords
- file
- sequence
- user
- image
- subject image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Abstract
The invention discloses a kind of file encrypting methods, include the following steps:Receive the CIPHERING REQUEST triggered based on file;Pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and each pictorial element of selection is formed into initial image set;It shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting;Grade setting instruction is received, obtains the secret grade in the grade setting instruction, and show the pre-set text frame of the secret grade corresponding number;The subject image element that initial pictures are concentrated is chosen based on user's operation, and the subject image element is input in the pre-set text frame and forms the corresponding standard cipher sequence of the secret grade;Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.The invention also discloses a kind of document encrypting apparatus and computer storage medias.The present invention improves encrypted interesting and convenience by way of image encryption.
Description
Technical field
The present invention relates to data processing field more particularly to file encrypting method, device and computer storage medias.
Background technology
With the raising of terminal intelligent degree, the increase of memory capacity, people increasingly like by some private datas with
The form of file preserves in the terminal.In order to protect the privacy of user, that is, ensure the safety of the file stored in terminal, to file
The processing such as being encrypted, decrypt seems increasingly important.
The prior art is in the principle to file encryption:Judge whether user has text by verifying information input by user
The operating right of part, that is, most of existing file encryption is all to use encrypting fingerprint or digital encryption, such encryption side
Formula is more dull, in addition, digital encryption needs user to remember corresponding number, if the numerical ciphers of setting are long excessively complicated
It may result in encrypted file and file decryption oprerations be also complex, and encrypting fingerprint can not carry out the transmission of file.Such as
What real file is easily encrypted, and improves the interest of file encryption decryption, and effectively become to subscriber authentication
A technical problem to be solved urgently.
The above is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that the above is existing skill
Art.
Invention content
A kind of file encrypting method of present invention offer, device and computer storage media, it is intended to improve file encryption decryption
Interest, realize the convenient encryption of file.
The present invention provides file encrypting method, and the file encrypting method includes:
Receive the CIPHERING REQUEST triggered based on file;
Pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and each pictorial element of selection is formed
Initial image set;
It shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting;
Grade setting instruction is received, obtains the secret grade in the grade setting instruction, and show the secret grade
The pre-set text frame of corresponding number;
The subject image element that initial pictures are concentrated is chosen based on user's operation, and the subject image element is input to
The corresponding standard cipher sequence of the secret grade is formed in the pre-set text frame;
Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.
Optionally, described that the subject image element that initial pictures are concentrated is chosen based on user's operation, and by the target figure
Pixel element is input in the pre-set text frame the step of forming the secret grade corresponding standard cipher sequence, including:
The subject image element that initial pictures are concentrated is chosen based on user's operation, subject image element is input to default text
In this frame;
It determines that subject image element sorts according to the preset numbers of pre-set text frame, forms the corresponding mark of the secret grade
Quasi- keying sequence.
Optionally, described that standard cipher sequence and file are associated preservation, to complete the step of the cryptographic operation of file
After rapid, including:
The decoding request triggered based on file is received, the standard cipher sequence of file association is obtained, determines standard cipher sequence
The subject image element for including in row;
The decrypted image set for including subject image element is chosen from pre-set image set, is received user and is based on decryption figure
Image set closes the decrypted image sequence chosen;
Decrypted image sequence is compared with standard sequence image;
If decrypted image sequence is matched with standard sequence image, judges that user has operating right, carry out file decryption.
Optionally, described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, is determined
After the step of subject image element for including in standard cipher sequence, including:
Determine subject image element number, generate the prompt message for including subject image element number, with prompt user into
Row decryption oprerations.
Optionally, after described the step of decrypted image sequence is compared with standard sequence image, including:
If decrypted image sequence is mismatched with standard sequence image, judge that user does not have operating right, and prompt to use
Family carries out the secondary decryption oprerations of file;
The decryption number of statistics file locks file if file decryption number is more than predetermined threshold value.
Optionally, the decryption number of the statistics file carries out file if file decryption number is more than predetermined threshold value
After the step of locking, including:
Authentication request is received, the subscriber identity information for including in authentication request is obtained;
Subscriber identity information is compared with pre-stored criteria identity information, if subscriber identity information and pre-stored criteria identity
Information matches then release file locking and carry out file decryption.
Optionally, described that the subject image element that initial pictures are concentrated is chosen based on user's operation, and by the target figure
Pixel element was input in the pre-set text frame after the step of forming the secret grade corresponding standard cipher sequence, packet
It includes:
By the cryptographic Hash of default hash algorithm calculation document, using the cryptographic Hash being calculated as initial Hash value, and protect
Deposit initial Hash value;
It is described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, determines that standard is close
The step of subject image element for including in code sequence, including:
The decoding request triggered based on file is received, by the current cryptographic Hash of default hash algorithm calculation document;
Current cryptographic Hash is compared with initial Hash value;
If current cryptographic Hash is identical as initial Hash value, the standard cipher sequence of file association is obtained, determines that standard is close
The subject image element for including in code sequence.
Optionally, described that pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and by each of selection
After pictorial element forms the step of initial image set, including:
Selecting frequency is higher than the pictorial element of preset value by the selecting frequency for counting each pictorial element in pre-set image set
It is marked.
In addition, to achieve the above object, the present invention also provides a kind of document encrypting apparatus;
The document encrypting apparatus includes:It memory, processor and is stored on the memory and can be in the processing
The file encryption program run on device, wherein:
It is realized such as the step of above-mentioned file encrypting method when the file encryption program is executed by the processor.
In addition, to achieve the above object, the present invention also provides a kind of computer storage medias;
File encryption program is stored on the computer storage media, when the file encryption program is executed by processor
It realizes such as the step of above-mentioned file encrypting method.
File encrypting method of the embodiment of the present invention, device and computer storage media specifically include user and are triggered in terminal
CIPHERING REQUEST, terminal receive the CIPHERING REQUEST that is triggered based on file, terminal from the selection pictorial element in pre-set image set, and
Each pictorial element of selection is formed into initial image set;Terminal shows initial image set on the screen, and generates encryption prompt letter
Breath, to prompt user that setting is encrypted based on initial image set;Grade setting instruction is received, the grade setting instruction is obtained
In secret grade, and show the pre-set text frame of the secret grade corresponding number;Initial pictures are chosen based on user's operation
The subject image element of concentration, and the subject image element is input in the pre-set text frame and forms the secret grade
Corresponding standard cipher sequence;Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.This hair
It is bright that different pictorial elements is applied into encrypting and decrypting processing so that file encryption is not that dull digital alphabet combines, and is made
More interesting, the operation combined and facilitate user of sorting of image must be encrypted so that the encryption of file is more convenient, in addition,
Different subject image element numbers can be arranged in user in the present invention compared with the encryptions such as existing data, by different targets
Pictorial element the forms such as is arranged or is combined and forms standard cipher sequence so that the encryption of file is more intelligent.
Description of the drawings
A kind of Fig. 1 hardware architecture diagrams of terminal of each embodiment to realize the present invention;
Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of file encrypting method first embodiment of the present invention;
Fig. 4 is the flow diagram of file encrypting method second embodiment of the present invention;
Fig. 5 is the flow diagram of file encrypting method 3rd embodiment of the present invention;
Fig. 6 is the flow diagram of file encrypting method fourth embodiment of the present invention;
Fig. 7 is the concrete scene signal for decrypting file in file encrypting method second embodiment of the present invention by pictorial element
Figure;
Fig. 8 is that subscriber identity information is compared with pre-stored criteria identity information in file encrypting method 3rd embodiment of the present invention
Concrete scene schematic diagram.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, using for indicating that the suffix of such as " module ", " component " or " unit " of element is only
The explanation for being conducive to the present invention, itself does not have a specific meaning.Therefore, " module ", " component " or " unit " can mix
Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, tablet
Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
The shiftings such as media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer
The fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special
Except element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware architecture diagram of its mobile terminal of each embodiment to realize the present invention, the shifting
Moving terminal 100 may include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit
108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1
Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram,
Either combine certain components or different components arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, by base station
Downlink information receive after, to processor 110 handle;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating
Frequency unit 101 can also be communicated with network and other equipment by radio communication.Above-mentioned wireless communication can use any communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102
Sub- mail, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can be according to need
It to be omitted in the range for the essence for not changing invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, it is that radio frequency unit 101 or WiFi module 102 are received or
The audio data stored in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103
The relevant audio output of specific function executed with mobile terminal 100 can also be provided (for example, call signal receives sound, disappears
Breath receives sound etc.).Audio output unit 103 may include loud speaker, buzzer etc..
A/V input units 104 are for receiving audio or video signal.A/V input units 104 may include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the image data of the static images or video obtained by image capture apparatus (such as camera) in image capture mode carries out
Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited
Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can
To be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case of telephone calling model.
Microphone 1042 can implement various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition)
The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear
Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, size and the direction of gravity are can detect that when static, can be used to identify the application of mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminal
Family is arranged and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 with
And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect user on it or neighbouring touch operation
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071
Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
It is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, can
To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating lever etc.
It is one or more, do not limit herein specifically.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel
1061 be to realize the function that outputs and inputs of mobile terminal as two independent components, but in certain embodiments, can
The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically
It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example,
External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing
Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with
For the transmission data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can include mainly storing program area
And storage data field, wherein storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection
A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage
Data in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place
Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated
Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main
Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
In addition, in terminal shown in Fig. 1, the text run on the processor 110 is stored on the memory 109
Part encipheror, the terminal call the file encryption program stored in memory 109 by processor 110, and execute following
Operation:
Receive the CIPHERING REQUEST triggered based on file;
Pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and each pictorial element of selection is formed
Initial image set;
It shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting;
Grade setting instruction is received, obtains the secret grade in the grade setting instruction, and show the secret grade
The pre-set text frame of corresponding number;
The subject image element that initial pictures are concentrated is chosen based on user's operation, and the subject image element is input to
The corresponding standard cipher sequence of the secret grade is formed in the pre-set text frame;
Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.
Further, the terminal calls the file encryption program stored in memory 109 by processor 110, with reality
The existing subject image element concentrated based on user's operation selection initial pictures, and the subject image element is input to institute
The step of corresponding standard cipher sequence of the secret grade is formed in pre-set text frame is stated, including:
The subject image element that initial pictures are concentrated is chosen based on user's operation, subject image element is input to default text
In this frame;
It determines that subject image element sorts according to the preset numbers of pre-set text frame, forms the corresponding mark of the secret grade
Quasi- keying sequence.
Further, described standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file
After step, the terminal calls the file encryption program stored in memory 109 by processor 110, to realize following step
Suddenly:
The decoding request triggered based on file is received, the standard cipher sequence of file association is obtained, determines standard cipher sequence
The subject image element for including in row;
The decrypted image set for including subject image element is chosen from pre-set image set, is received user and is based on decryption figure
Image set closes the decrypted image sequence chosen;
Decrypted image sequence is compared with standard sequence image;
If decrypted image sequence is matched with standard sequence image, judges that user has operating right, carry out file decryption.
Further, described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, really
After the step of calibrating the subject image element for including in quasi- keying sequence, the terminal calls memory by processor 110
The file encryption program stored in 109, to realize following steps:
Determine subject image element number, generate the prompt message for including subject image element number, with prompt user into
Row decryption oprerations.
Further, after described the step of decrypted image sequence is compared with standard sequence image, the terminal
The file encryption program stored in memory 109 is called by processor 110, to realize following steps:
If decrypted image sequence is mismatched with standard sequence image, judge that user does not have operating right, and prompt to use
Family carries out the secondary decryption oprerations of file;
The decryption number of statistics file locks file if file decryption number is more than predetermined threshold value.
Further, the decryption number of the statistics file, if file decryption number be more than predetermined threshold value, by file into
After line-locked step, the terminal calls the file encryption program stored in memory 109 by processor 110, with reality
Existing following steps:
Authentication request is received, the subscriber identity information for including in authentication request is obtained;
Subscriber identity information is compared with pre-stored criteria identity information, if subscriber identity information and pre-stored criteria identity
Information matches then release file locking and carry out file decryption.
Further, described that the subject image element that initial pictures are concentrated is chosen based on user's operation, and by the target
Pictorial element was input in the pre-set text frame after the step of forming the secret grade corresponding standard cipher sequence, institute
It states terminal and the file encryption program stored in memory 109 is called by processor 110, to realize following steps:
By the cryptographic Hash of default hash algorithm calculation document, using the cryptographic Hash being calculated as initial Hash value, and protect
Deposit initial Hash value;
It is described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, determines that standard is close
The step of subject image element for including in code sequence, including:
The decoding request triggered based on file is received, by the current cryptographic Hash of default hash algorithm calculation document;
Current cryptographic Hash is compared with initial Hash value;
If current cryptographic Hash is identical as initial Hash value, the standard cipher sequence of file association is obtained, determines that standard is close
The subject image element for including in code sequence.
Further, described that pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and by selection
After the step of each pictorial element composition initial image set, the terminal is called by processor 110 to be stored in memory 109
File encryption program, to realize following steps:
Selecting frequency is higher than the pictorial element of preset value by the selecting frequency for counting each pictorial element in pre-set image set
It is marked.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
Embodiment to facilitate the understanding of the present invention, below to the communications network system that is based on of mobile terminal of the present invention into
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system
System is the LTE system of universal mobile communications technology, which includes communicating UE (User Equipment, the use of connection successively
Family equipment) (the lands Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers
Such as the function of home location register (not shown) etc, and some are preserved in relation to use such as service features, data rates
The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201
Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources
Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And the following new network system etc., it does not limit herein.
Based on above-mentioned terminal hardware structure and communications network system, each implementation of file encrypting method of the present invention is proposed
Example.
The present invention provides a kind of file encrypting method.In the present embodiment, the file encrypting method is optional is applied to eventually
In end, the terminal is chosen as the mobile terminal described in Fig. 1, and the file encrypting method includes:
Receive the CIPHERING REQUEST triggered based on file;
Pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and each pictorial element of selection is formed
Initial image set;
It shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting;
Grade setting instruction is received, obtains the secret grade in the grade setting instruction, and show the secret grade
The pre-set text frame of corresponding number
The subject image element that initial pictures are concentrated is chosen based on user's operation, and the subject image element is input to
The corresponding standard cipher sequence of the secret grade is formed in the pre-set text frame;
Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.
The scheme of image encryption is set in the terminal in the present embodiment, prestores different pictorial elements in terminal, no
Same pictorial element forms pre-set image set, and for user when terminal triggers CIPHERING REQUEST, terminal randomly selects pre-set image collection
Pictorial element in conjunction forms initial image set, and user can carry out arrangement group by the pictorial element for selecting initial pictures to concentrate
It closes pictorial element and forms standard cipher sequence, when user decrypts, the solution of file can be realized by carrying out the reproduction of pictorial element
Close operation.
It should be added that the concrete form for carrying out file encryption in the present invention by image is not construed as limiting, mode
One:Initial pictures concentration includes 6 pictorial elements, and user selects 4 pictorial elements from 6 pictorial elements, and by 4 images
The file encryption mode of combination, for example, user selects 4 pictorial elements to be decoded behaviour in user as subject image element
When making, this 4 pictorial elements are chosen from decrypted image set, you can to realize the decryption of file, the arrangement of 4 pictorial elements
Sequence is not construed as limiting, wherein decrypted image set can be identical as initial image set, can also be comprising 4 pictorial elements
The set of other pictorial elements;Mode two:Initial pictures concentration includes 6 pictorial elements, and user selects from 6 pictorial elements
4 pictorial elements, by 4 pictorial element sequence setting file encryption modes, for example, user clicks this document or file,
Display the prompt box is corresponded in terminal, there are 4 different pictorial elements once to sort sidewards in prompting frame.Initial image set has 4
4 pictorial elements are moved to empty text box by empty text box, user, are clicked corresponding button encryption is arranged, are completed text
The cryptographic operation of part, similarly, when operation is decrypted in user, user by need by 4 pictorial elements according to encryption when
It is arranged, realizes the decryption of file.
Further, compared with simple digital alphabet combined ciphering, user can select to be an image in this programme
Element or multiple images element, when user selects multiple images aes encryption, it is by multiple images that user, which is also an option that,
Element is combined or sorts, and such file encryption mode is more flexible.
With reference to Fig. 3, in the first embodiment of file encrypting method of the present invention, the file encrypting method includes:
Step S10 is received the CIPHERING REQUEST triggered based on file, is selected from pre-set image set according to the CIPHERING REQUEST
Pictorial element is taken, and each pictorial element of selection is formed into initial image set.
User clicks the CIPHERING REQUEST of file triggering file in terminal, wherein the mode of triggering file encryption request is not
Make specific restriction, can click file triggering CIPHERING REQUEST, can also be that user speech triggers CIPHERING REQUEST, terminal receives base
In the CIPHERING REQUEST of file triggering, terminal obtains pre-set image set, and pre-set image set can be the photo in user's photograph album
The set of composition can also be the set of other image identification compositions, and the image number minimum value in pre-set image set is not
Ten can be less than, the upper limit is not specifically limited, and terminal is chosen from random or according to setting the rule in pre-set image set to be schemed
Pixel element, and each pictorial element of selection is formed into initial image set, for example, in pre-set image set including 100 in terminal
Image is opened, terminal randomly chooses 10 pictures in 100 pictures and forms initial image set.
Further, include after step S10:
Selecting frequency is higher than the pictorial element of preset value by the selecting frequency for counting each pictorial element in pre-set image set
It is marked.
Terminal counts the selecting frequency of each pictorial element in pre-set image set, that is, terminal carries out each pictorial element
Record determines that the selecting frequency of each pictorial element, pictorial element of the terminal by selecting frequency higher than preset value are marked,
In, preset value can be arranged as the case may be, for example, user setting is 10 times, to prevent from repeating selecting identical pictorial element,
There is the identical standard cipher sequence for file encryption;The selecting frequency of terminal statistical picture element in the present embodiment,
And according to the selecting frequency of pictorial element, the pictorial element of preset value is less than from the selection selecting frequency in pre-set image set,
And pictorial element is formed into initial image set so that the form of image encryption has more diversity.
Step S20 shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting.
After terminal determines initial image set, initial image set is shown on the screen of terminal, and generates encryption prompt message,
With prompt user carry out grade setting, that is, terminal shows initial image set, and generates prompt message, prompt user into
Row cryptographic operation.
Step S30, reception grade setting instruction, obtains the secret grade in the grade setting instruction, and described in display
The pre-set text frame of secret grade corresponding number.
Terminal shows that secret grade setting prompt, user determine the secret grade of file or file, and display number
Pre-set text frame, that is, the encryption of user setting the first estate, then it is corresponding in terminal to show the corresponding number of the first estate encryption
Pre-set text frame;The encryption of the second grade of user setting, then it is corresponding in terminal to show that the encryption of the second grade corresponds to number
Pre-set text frame then shows 3 text boxes for example, user setting the first estate is encrypted;The second grade of user setting is encrypted, then
Show 6 text boxes, and so on.Wherein pre-set text frame refers to the empty text box that user inputs subject image element.
Step S40 chooses the subject image element that initial pictures are concentrated based on user's operation, and the target image is first
Element, which is input in the pre-set text frame, forms the corresponding standard cipher sequence of the secret grade.
Terminal chooses the subject image element that initial pictures are concentrated based on user's operation, and further, terminal is according to user
Operation determines whether to carry out file encryption for the mode of sequence, if the mode of sequence carries out file encryption, then user can incite somebody to action
Subject image element is moved to the pre-set text frame of corresponding number, and terminal determines subject image element according to the sequence of text box
Sequence, and using the subject image element of ordered arrangement as standard cipher sequence, user needs when carrying out file decryption operation
Subject image element is chosen, and subject image element is sorted in sequence, only user is formed identical as standard cipher sequence
Element sequence when, file decryption just may be implemented, if not sequence but combination mode carry out file encryption, then user exists
When the pictorial element selected in decrypting process is consistent with encrypted pictorial element, so that it may to realize file decryption.
Further, determine that the realization method of the sequence of subject image element includes according to user's operation in step S40:
Step a1 chooses the subject image element that initial pictures are concentrated based on user's operation, subject image element is inputted
Into pre-set text frame.
Step b1 determines that subject image element sorts according to the preset numbers of pre-set text frame, forms the secret grade
Corresponding standard cipher sequence.
User's operation chooses the subject image element that initial pictures are concentrated, and subject image element is input to pre-set text frame
In (wherein, the quantity of pre-set text frame is determined according to secret grade);Target figure is determined according to the preset numbers of pre-set text frame
Pixel element sorts, and forms the corresponding standard cipher sequence of the secret grade, that is, terminal sorts the pictorial element in text box
As the corresponding standard cipher sequence of secret grade.
Due to the diversity of pre-set image set in the present embodiment, the randomness of initial image set is selected, in addition, user can
Secret grade is independently arranged, for terminal according to the pre-set text frame for adding the bright corresponding number of grade display, such user can basis
Corresponding secret grade is arranged in the importance of file so that the safety higher of file.
Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file by step S50.
After the determination of terminal monitoring standard cipher sequence, standard cipher sequence and file are associated preservation by terminal, with
The cryptographic operation of file is completed, terminal can be by decrypted image sequence input by user and standard sequence image when user decrypts
It is compared, carries out the decryption of file.
Encrypting and decrypting processing is applied to by different pictorial elements in the present embodiment so that file encryption is not list
The digital alphabet of tune combines so that encryption is more interesting, and the sequence combination of image facilitates the operation of user so that file
Encryption is more convenient, in addition, different secret grades can be arranged in the present invention, and shows the corresponding text box of secret grade,
User's selection target pictorial element is prompted to input years text box so that the encryption of file is more intelligent, safety higher.
With reference to Fig. 4, the of file encrypting method of the present invention is further provided on the basis of first embodiment of the invention
Two embodiments, are omitted the step in first embodiment in Fig. 4, step S60 in the present embodiment, optionally in the first embodiment
Step S50 after, that is, file encryption complete, user carry out file decryption.
The present embodiment is the decrypting process to encrypting file, and the present embodiment includes:
Step S60 receives the decoding request triggered based on file, obtains the standard cipher sequence of file association, determines mark
The subject image element for including in quasi- keying sequence.
Step S70 chooses the decrypted image set for including subject image element from pre-set image set, receives user's base
In the decrypted image sequence that decrypted image set is chosen.
User triggers the decoding request of file in terminal, wherein for triggering mode without limiting, terminal receives user's base
In the decoding request of file triggering, the standard cipher sequence of file association is obtained, that is, terminal determines that user needs the text decrypted
Part, and the pre-set standard cipher sequence of this document is obtained, terminal determines the target image for including in standard cipher sequence
Element, terminal choose the decrypted image set for including subject image element from pre-set image set, and in conjunction with Fig. 7, terminal obtains
Standard cipher sequence to file is B figures, A figures, C figures and D figures, is known as 4 comprising image primitive in standard cipher sequence, terminal from
A figures, B figures, C figures, D figures, E figures and F figures are chosen in pre-set image set into decrypted image set, wherein decrypted image set
With initial image set can it is identical can not also be identical, user selects 4 pictorial elements in decrypted image set, and by 4
Pictorial element carries out arrangement form decrypted image sequence.
It should be added that decryption prompt can be arranged in user in terminal in the present embodiment, that is, upper display encryption
The pre-set text frame of the corresponding number of grade, to prompt user that operation is decrypted, for example, standard when user forgets to encrypt is close
Code sequence, user can click prompt button, and terminal prompts the pictorial element number of standard cipher sequence, so that user
Input decrypted image sequence.
Decrypted image sequence is compared step S80 with standard sequence image.
Step S90 judges that user has operating right, carries out if decrypted image sequence is matched with standard sequence image
File decryption.
The decrypted image sequence that user decrypts is compared terminal with standard sequence image, and terminal judges decrypted image sequence
Whether row and the pictorial element number for including in standard sequence image are identical, and whether pictorial element is identical, the sequence of pictorial element
Whether identical, if close image sequence is identical as the pictorial element number for including in standard sequence image, pictorial element is identical, image
The sequence of element is identical, then terminal judgement decrypted image sequence is matched with standard sequence image, it is determined that user has operating rights
Limit, and file decryption is carried out, so that user checks file.
Terminal determines the decryption of the file of terminal depending on the user's operation in the present embodiment so that document image is encrypted
Method is more interesting.
Further, further include after step S80:
Step S100 judges that user does not have operating right if decrypted image sequence is mismatched with standard sequence image,
And prompt the secondary decryption oprerations of user's progress file;
Step S110, the decryption number of statistics file lock file if file decryption number is more than predetermined threshold value
It is fixed.
If terminal determines close image sequence and standard sequence figure according to the comparison of decrypted image sequence and standard sequence image
As in include pictorial element number, pictorial element, in the sequence of pictorial element by any one or it is multiple differ, then eventually
End judgement decrypted image sequence and standard sequence image mismatch, and terminal notifying user carries out secondary decryption oprerations, user into
When the secondary decryption oprerations of row, the decryption oprerations number of terminal counting user, if it is more than predetermined threshold value that user, which decrypts number, wherein
Predetermined threshold value can be arranged according to concrete scene, such as be set as 5 times, 10 times, then the file that terminal decrypts user carries out short
The locking of phase.
User is obstructed to file decryption out-of-date in the present embodiment, the operating frequency of terminal counting user, if the behaviour of user
Working frequency is higher, and terminal automatically locks file, to prevent file from revealing.
Further, in the 3rd embodiment of file encrypting method of the present invention, the present embodiment is the base in second embodiment
Itd is proposed on plinth, terminal monitoring to user repeatedly decryption not over when, terminal judgement user forget the standard pre-entered
Sequence image is decrypted, specifically automatically after terminal-pair subscriber authentication:
With reference to Fig. 5, the file encrypting method includes:
Step S120 receives authentication request, obtains the subscriber identity information for including in authentication request.
User triggers authentication request, and terminal receives authentication request, obtains the use for including in authentication request
Family identity information, that is, user can preset authentication button by click and trigger authentication request or user speech
The other forms such as instruction trigger authentication request, and terminal receives authentication request, includes in acquisition authentication request
Subscriber identity information, wherein the subscriber identity information in authentication request can be that user is manually entered, can also be
It is carried when user's triggering authentication request, for example, it is that automatic collection is used that terminal clicks authentication virtual key in user
The fingerprint at family acquires the sound of user as subscriber authentication or terminal, and user voice is analyzed to obtain user's sound
Line is as subscriber authentication.
Subscriber identity information is compared step S130 with pre-stored criteria identity information, if subscriber identity information with it is pre-
Standard identity information matches are deposited, then release file locking and carry out file decryption.
Subscriber identity information is compared terminal with pre-stored criteria identity information, wherein pre-stored criteria identity information is
Refer to the standard identity information gathered in advance for verifying user identity, showing terminal in conjunction with Fig. 8, Fig. 8 obtains authentication
The subscriber identity information for including in request refers to the real-time face feature information of user, and pre-stored criteria identity information refers to that user is pre-
The bare-headed photo information deposited;If subscriber identity information is matched with pre-stored criteria identity information, that is, subscriber identity information and the mark that prestores
Quasi- identity information is identical, for example, collected user fingerprints are matched with pre-stored fingerprint, or the user voice of acquisition and the sound that prestores
For sound after sound compares, two sound are same person, and terminal releases file locking and carries out file decryption.
Subscriber identity information is compared with standard identity information in the present embodiment, the unlock of style of writing of going forward side by side part and solution
It is close, i.e., operation can also be decrypted when user forgets the password of advance facility, under the premise of ensuring information security property, side
Just the operation of user.
With reference to Fig. 6, the present embodiment can be combined with above-described embodiment, and the 4th of file encrypting method of the present invention implements
In example, file is subjected to hash check, to prevent from occurring the problem of file is distorted, specifically, this implementation in file storing process
Example include:
Step S140 is breathed out by the cryptographic Hash of default hash algorithm calculation document using the cryptographic Hash being calculated as initial
Uncommon value, and preserve initial Hash value;
After user setting standard cipher sequence, that is, after file encryption, terminal presses default hash algorithm (default Hash
Algorithm is the file identification of creator's setting according to file size, time, type) cryptographic Hash of calculation document, terminal will calculate
Obtained cryptographic Hash is as initial Hash value, so that user determines whether the file of terminal is tampered according to cryptographic Hash.
The present embodiment and file decryption in second embodiment are combined, step S60, described receive is triggered based on file
Decoding request, obtain the standard cipher sequence of file association, determine the subject image element for including in standard cipher sequence
Step, including:
Step S61 receives the decoding request triggered based on file, by the current Hash of default hash algorithm calculation document
Value;
Current cryptographic Hash is compared by step S62 with initial Hash value;
Step S63 obtains the standard cipher sequence of file association, really if current cryptographic Hash is identical as initial Hash value
Calibrate the subject image element for including in quasi- keying sequence.
Terminal receives the decoding request that trigger based on file, terminal press default hash algorithm (wherein, preset hash algorithm and
The algorithm for calculating initial Hash value is consistent) the current cryptographic Hash of calculation document;Terminal by current cryptographic Hash and initial Hash value into
Row compares;If current cryptographic Hash is identical as initial Hash value, terminal judges file file in the period for being encrypted into decryption
It is not tampered with, at this point, terminal obtains the standard cipher sequence of file association, determines the target image for including in standard cipher sequence
Element, the step of to carry out file decryption, if current cryptographic Hash is differed with initial Hash value, terminal judges that file is being encrypted
It is tampered to file in the period of decryption, at this point, terminal can generate a prompt message.
The encrypting and decrypting of file is combined with cryptographic Hash in the present embodiment, file can be prevented to be tampered, is ensured
The integrality of file, authenticity.
In addition, the embodiment of the present invention also proposes a kind of computer storage media.
File encryption program is stored on the computer storage media, when the file encryption program is executed by processor
Realize that file encryption operates as follows:
Receive the CIPHERING REQUEST triggered based on file;
Pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and each pictorial element of selection is formed
Initial image set;
It shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting;
Grade setting instruction is received, obtains the secret grade in the grade setting instruction, and show the secret grade
The pre-set text frame of corresponding number;
The subject image element that initial pictures are concentrated is chosen based on user's operation, and the subject image element is input to
The corresponding standard cipher sequence of the secret grade is formed in the pre-set text frame;
Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.
Further, following operation is also realized when the file encryption program is executed by processor:
It is described that the subject image element that initial pictures are concentrated is chosen based on user's operation and the subject image element is defeated
The step of entering into the pre-set text frame to be formed the secret grade corresponding standard cipher sequence, including:
The subject image element that initial pictures are concentrated is chosen based on user's operation, subject image element is input to default text
In this frame;
It determines that subject image element sorts according to the preset numbers of pre-set text frame, forms the corresponding mark of the secret grade
Quasi- keying sequence.
Further, following operation is also realized when the file encryption program is executed by processor:
It is described that standard cipher sequence and file are associated preservation, the step of cryptographic operation to complete file after,
Including:
The decoding request triggered based on file is received, the standard cipher sequence of file association is obtained, determines standard cipher sequence
The subject image element for including in row;
The decrypted image set for including subject image element is chosen from pre-set image set, is received user and is based on decryption figure
Image set closes the decrypted image sequence chosen;
Decrypted image sequence is compared with standard sequence image;
If decrypted image sequence is matched with standard sequence image, judges that user has operating right, carry out file decryption.
Further, following operation is also realized when the file encryption program is executed by processor:
It is described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, determines that standard is close
After the step of subject image element for including in code sequence, including:
Determine subject image element number, generate the prompt message for including subject image element number, with prompt user into
Row decryption oprerations.
Further, following operation is also realized when the file encryption program is executed by processor:
After described the step of decrypted image sequence is compared with standard sequence image, including:
If decrypted image sequence is mismatched with standard sequence image, judge that user does not have operating right, and prompt to use
Family carries out the secondary decryption oprerations of file;
The decryption number of statistics file locks file if file decryption number is more than predetermined threshold value.
Further, following operation is also realized when the file encryption program is executed by processor:
The decryption number of the statistics file, if file decryption number is more than predetermined threshold value, by file into line-locked
After step, including:
Authentication request is received, the subscriber identity information for including in authentication request is obtained;
Subscriber identity information is compared with pre-stored criteria identity information, if subscriber identity information and pre-stored criteria identity
Information matches then release file locking and carry out file decryption.
Further, following operation is also realized when the file encryption program is executed by processor:
It is described that the subject image element that initial pictures are concentrated is chosen based on user's operation and the subject image element is defeated
After the step of entering into the pre-set text frame to be formed the secret grade corresponding standard cipher sequence, including:
By the cryptographic Hash of default hash algorithm calculation document, using the cryptographic Hash being calculated as initial Hash value, and protect
Deposit initial Hash value;
It is described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, determines that standard is close
The step of subject image element for including in code sequence, including:
The decoding request triggered based on file is received, by the current cryptographic Hash of default hash algorithm calculation document;
Current cryptographic Hash is compared with initial Hash value;
If current cryptographic Hash is identical as initial Hash value, the standard cipher sequence of file association is obtained, determines that standard is close
The subject image element for including in code sequence.
Further, following operation is also realized when the file encryption program is executed by processor:
It is described to receive the CIPHERING REQUEST triggered based on file;Figure is chosen from pre-set image set according to the CIPHERING REQUEST
Pixel element, and after the step of each pictorial element of selection is formed initial image set, including:
Selecting frequency is higher than the pictorial element of preset value by the selecting frequency for counting each pictorial element in pre-set image set
It is marked.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality
Body/operation/object is distinguished with another entity/operation/object, without necessarily requiring or implying these entity/operations/
There are any actual relationship or orders between object;The terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or system including a series of elements include not only that
A little elements, but also include other elements that are not explicitly listed, or further include for this process, method, article or
The intrinsic element of system.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except there is also other identical elements in process, method, article or the system including the element.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of file encrypting method, which is characterized in that the file encrypting method includes the following steps:
Receive the CIPHERING REQUEST triggered based on file;
Pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and each pictorial element of selection is formed initially
Image set;
It shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting;
Grade setting instruction is received, obtains the secret grade in the grade setting instruction, and show that the secret grade corresponds to
The pre-set text frame of quantity;
The subject image element that initial pictures are concentrated is chosen based on user's operation, and the subject image element is input to described
The corresponding standard cipher sequence of the secret grade is formed in pre-set text frame;
Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.
2. file encrypting method as described in claim 1, which is characterized in that described to choose initial image set based on user's operation
In subject image element, and the subject image element is input in the pre-set text frame and forms the secret grade pair
The step of standard cipher sequence answered, including:
The subject image element that initial pictures are concentrated is chosen based on user's operation, the subject image element is input to described pre-
If in text box;
It determines that subject image element sorts according to the preset numbers of pre-set text frame, it is close to form the corresponding standard of the secret grade
Code sequence.
3. file encrypting method as described in claim 1, which is characterized in that described to close standard cipher sequence with file
After the step of UNPROFOR is deposited, cryptographic operation to complete file, including:
The decoding request triggered based on file is received, the standard cipher sequence of file association is obtained, determines in standard cipher sequence
Including subject image element;
The decrypted image set for including subject image element is chosen from pre-set image set, is received user and is based on decrypted image collection
Close the decrypted image sequence chosen;
Decrypted image sequence is compared with standard sequence image;
If decrypted image sequence is matched with standard sequence image, judges that user has operating right, carry out file decryption.
4. file encrypting method as claimed in claim 3, which is characterized in that the decryption that the reception is triggered based on file is asked
After the step of asking, obtaining the standard cipher sequence of file association, determine the subject image element for including in standard cipher sequence,
Including:
It determines subject image element number, the prompt message for including subject image element number is generated, to prompt user to solve
Close operation.
5. file encrypting method as claimed in claim 3, which is characterized in that described by decrypted image sequence and standard sequence figure
After as the step of being compared, including:
If decrypted image sequence and standard sequence image mismatch, judge that user does not have operating right, and prompt user into
The secondary decryption oprerations of style of writing part;
The decryption number of statistics file locks file if file decryption number is more than predetermined threshold value.
6. file encrypting method as claimed in claim 5, which is characterized in that the decryption number of the statistics file, if file
After the step of decryption number is more than predetermined threshold value, is then locked file, including:
Authentication request is received, the subscriber identity information for including in authentication request is obtained;
Subscriber identity information is compared with pre-stored criteria identity information, if subscriber identity information and pre-stored criteria identity information
Matching, then release file locking and carry out file decryption.
7. file encrypting method as claimed in claim 3, which is characterized in that described to choose initial image set based on user's operation
In subject image element, and the subject image element is input in the pre-set text frame and forms the secret grade pair
After the step of standard cipher sequence answered, including:
By the cryptographic Hash of default hash algorithm calculation document, using the cryptographic Hash being calculated as initial Hash value, and preserve just
Beginning cryptographic Hash;
It is described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, determines standard cipher sequence
The step of subject image element for including in row, including:
The decoding request triggered based on file is received, by the current cryptographic Hash of default hash algorithm calculation document;
Current cryptographic Hash is compared with initial Hash value;
If current cryptographic Hash is identical as initial Hash value, the standard cipher sequence of file association is obtained, determines standard cipher sequence
The subject image element for including in row.
8. file encrypting method as described in claim 1, which is characterized in that it is described according to the CIPHERING REQUEST from pre-set image
Pictorial element is chosen in set, and after the step of each pictorial element of selection is formed initial image set, including:
The selecting frequency for counting each pictorial element in pre-set image set, the pictorial element by selecting frequency higher than preset value carry out
Label.
9. a kind of document encrypting apparatus, which is characterized in that the document encrypting apparatus includes:It memory, processor and is stored in
On the memory and the file encryption program that can run on the processor, wherein:
It is realized when the file encryption program is executed by the processor as file described in any item of the claim 1 to 8 adds
The step of decryption method.
10. a kind of computer storage media, which is characterized in that file encryption program is stored on the computer storage media,
It is realized such as file encrypting method described in any item of the claim 1 to 8 when the file encryption program is executed by processor
Step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810377783.3A CN108563959A (en) | 2018-04-24 | 2018-04-24 | File encrypting method, device and computer storage media |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810377783.3A CN108563959A (en) | 2018-04-24 | 2018-04-24 | File encrypting method, device and computer storage media |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108563959A true CN108563959A (en) | 2018-09-21 |
Family
ID=63536316
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810377783.3A Pending CN108563959A (en) | 2018-04-24 | 2018-04-24 | File encrypting method, device and computer storage media |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108563959A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112989398A (en) * | 2021-05-18 | 2021-06-18 | 腾讯科技(深圳)有限公司 | Data processing method and device for block chain network, computer equipment and medium |
CN113079011A (en) * | 2021-03-18 | 2021-07-06 | 长鑫存储技术有限公司 | Key pushing method, file operating method, storage medium and computer equipment |
CN117193863A (en) * | 2023-09-08 | 2023-12-08 | 上海合芯数字科技有限公司 | Method, device, system and processor for starting host bootstrap program |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040246523A1 (en) * | 2003-06-09 | 2004-12-09 | Konica Minolta Business Technologies, Inc. | Data communication device, computer readable medium and method for transmitting and managing data |
CN102571341A (en) * | 2010-12-31 | 2012-07-11 | 中国银联股份有限公司 | Authentication system and method based on dynamic image |
CN105453483A (en) * | 2013-06-13 | 2016-03-30 | 维萨国际服务协会 | Image based key derivation function |
-
2018
- 2018-04-24 CN CN201810377783.3A patent/CN108563959A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040246523A1 (en) * | 2003-06-09 | 2004-12-09 | Konica Minolta Business Technologies, Inc. | Data communication device, computer readable medium and method for transmitting and managing data |
CN102571341A (en) * | 2010-12-31 | 2012-07-11 | 中国银联股份有限公司 | Authentication system and method based on dynamic image |
CN105453483A (en) * | 2013-06-13 | 2016-03-30 | 维萨国际服务协会 | Image based key derivation function |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113079011A (en) * | 2021-03-18 | 2021-07-06 | 长鑫存储技术有限公司 | Key pushing method, file operating method, storage medium and computer equipment |
CN112989398A (en) * | 2021-05-18 | 2021-06-18 | 腾讯科技(深圳)有限公司 | Data processing method and device for block chain network, computer equipment and medium |
CN112989398B (en) * | 2021-05-18 | 2021-07-30 | 腾讯科技(深圳)有限公司 | Data processing method and device for block chain network, computer equipment and medium |
CN117193863A (en) * | 2023-09-08 | 2023-12-08 | 上海合芯数字科技有限公司 | Method, device, system and processor for starting host bootstrap program |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108289141A (en) | A kind of the screen locking unlocking method and mobile terminal of mobile terminal | |
CN107194291A (en) | Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium | |
CN107315937A (en) | A kind of method for secret protection, mobile terminal and computer-readable recording medium | |
CN110069229A (en) | Screen sharing method, mobile terminal and computer readable storage medium | |
WO2020233218A1 (en) | Information encryption method, information decryption method, and terminal | |
CN109558718A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN107133498A (en) | A kind of privacy application management method and device and mobile terminal | |
CN107862196A (en) | Fingerprint verification method, mobile terminal and computer-readable recording medium | |
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN109743696A (en) | Identifying code encryption method, system and readable storage medium storing program for executing | |
CN107861669A (en) | The switching method and mobile terminal of a kind of custom system | |
CN108563959A (en) | File encrypting method, device and computer storage media | |
CN108076501A (en) | A kind of Wi-Fi network connection management method and mobile terminal | |
CN109145552A (en) | Information ciphering method and terminal device | |
CN108206892A (en) | Guard method, device, mobile terminal and the storage medium of contact person's privacy | |
CN108052845A (en) | file display control method, terminal and computer readable storage medium | |
CN107317680A (en) | Labeling method, system and the computer-readable recording medium of secured account numbers | |
CN110187925A (en) | A kind of desktop pretrigger control method, equipment and computer readable storage medium | |
CN108920917A (en) | Log in end switching method, mobile terminal and computer readable storage medium | |
CN108989534A (en) | Message prompt method, mobile terminal and computer readable storage medium | |
CN107888762A (en) | Memorandum record generation method and mobile terminal | |
CN107707554A (en) | A kind of login method and mobile terminal of application program account | |
CN104980436B (en) | A kind of encryption transmission system, method, terminal and intermediate server | |
CN108712567A (en) | Theft preventing method, mobile terminal and the computer readable storage medium of mobile terminal | |
CN107395363A (en) | Fingerprint sharing method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |