CN108563959A - File encrypting method, device and computer storage media - Google Patents

File encrypting method, device and computer storage media Download PDF

Info

Publication number
CN108563959A
CN108563959A CN201810377783.3A CN201810377783A CN108563959A CN 108563959 A CN108563959 A CN 108563959A CN 201810377783 A CN201810377783 A CN 201810377783A CN 108563959 A CN108563959 A CN 108563959A
Authority
CN
China
Prior art keywords
file
sequence
user
image
subject image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810377783.3A
Other languages
Chinese (zh)
Inventor
蔡克虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201810377783.3A priority Critical patent/CN108563959A/en
Publication of CN108563959A publication Critical patent/CN108563959A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Abstract

The invention discloses a kind of file encrypting methods, include the following steps:Receive the CIPHERING REQUEST triggered based on file;Pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and each pictorial element of selection is formed into initial image set;It shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting;Grade setting instruction is received, obtains the secret grade in the grade setting instruction, and show the pre-set text frame of the secret grade corresponding number;The subject image element that initial pictures are concentrated is chosen based on user's operation, and the subject image element is input in the pre-set text frame and forms the corresponding standard cipher sequence of the secret grade;Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.The invention also discloses a kind of document encrypting apparatus and computer storage medias.The present invention improves encrypted interesting and convenience by way of image encryption.

Description

File encrypting method, device and computer storage media
Technical field
The present invention relates to data processing field more particularly to file encrypting method, device and computer storage medias.
Background technology
With the raising of terminal intelligent degree, the increase of memory capacity, people increasingly like by some private datas with The form of file preserves in the terminal.In order to protect the privacy of user, that is, ensure the safety of the file stored in terminal, to file The processing such as being encrypted, decrypt seems increasingly important.
The prior art is in the principle to file encryption:Judge whether user has text by verifying information input by user The operating right of part, that is, most of existing file encryption is all to use encrypting fingerprint or digital encryption, such encryption side Formula is more dull, in addition, digital encryption needs user to remember corresponding number, if the numerical ciphers of setting are long excessively complicated It may result in encrypted file and file decryption oprerations be also complex, and encrypting fingerprint can not carry out the transmission of file.Such as What real file is easily encrypted, and improves the interest of file encryption decryption, and effectively become to subscriber authentication A technical problem to be solved urgently.
The above is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that the above is existing skill Art.
Invention content
A kind of file encrypting method of present invention offer, device and computer storage media, it is intended to improve file encryption decryption Interest, realize the convenient encryption of file.
The present invention provides file encrypting method, and the file encrypting method includes:
Receive the CIPHERING REQUEST triggered based on file;
Pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and each pictorial element of selection is formed Initial image set;
It shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting;
Grade setting instruction is received, obtains the secret grade in the grade setting instruction, and show the secret grade The pre-set text frame of corresponding number;
The subject image element that initial pictures are concentrated is chosen based on user's operation, and the subject image element is input to The corresponding standard cipher sequence of the secret grade is formed in the pre-set text frame;
Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.
Optionally, described that the subject image element that initial pictures are concentrated is chosen based on user's operation, and by the target figure Pixel element is input in the pre-set text frame the step of forming the secret grade corresponding standard cipher sequence, including:
The subject image element that initial pictures are concentrated is chosen based on user's operation, subject image element is input to default text In this frame;
It determines that subject image element sorts according to the preset numbers of pre-set text frame, forms the corresponding mark of the secret grade Quasi- keying sequence.
Optionally, described that standard cipher sequence and file are associated preservation, to complete the step of the cryptographic operation of file After rapid, including:
The decoding request triggered based on file is received, the standard cipher sequence of file association is obtained, determines standard cipher sequence The subject image element for including in row;
The decrypted image set for including subject image element is chosen from pre-set image set, is received user and is based on decryption figure Image set closes the decrypted image sequence chosen;
Decrypted image sequence is compared with standard sequence image;
If decrypted image sequence is matched with standard sequence image, judges that user has operating right, carry out file decryption.
Optionally, described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, is determined After the step of subject image element for including in standard cipher sequence, including:
Determine subject image element number, generate the prompt message for including subject image element number, with prompt user into Row decryption oprerations.
Optionally, after described the step of decrypted image sequence is compared with standard sequence image, including:
If decrypted image sequence is mismatched with standard sequence image, judge that user does not have operating right, and prompt to use Family carries out the secondary decryption oprerations of file;
The decryption number of statistics file locks file if file decryption number is more than predetermined threshold value.
Optionally, the decryption number of the statistics file carries out file if file decryption number is more than predetermined threshold value After the step of locking, including:
Authentication request is received, the subscriber identity information for including in authentication request is obtained;
Subscriber identity information is compared with pre-stored criteria identity information, if subscriber identity information and pre-stored criteria identity Information matches then release file locking and carry out file decryption.
Optionally, described that the subject image element that initial pictures are concentrated is chosen based on user's operation, and by the target figure Pixel element was input in the pre-set text frame after the step of forming the secret grade corresponding standard cipher sequence, packet It includes:
By the cryptographic Hash of default hash algorithm calculation document, using the cryptographic Hash being calculated as initial Hash value, and protect Deposit initial Hash value;
It is described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, determines that standard is close The step of subject image element for including in code sequence, including:
The decoding request triggered based on file is received, by the current cryptographic Hash of default hash algorithm calculation document;
Current cryptographic Hash is compared with initial Hash value;
If current cryptographic Hash is identical as initial Hash value, the standard cipher sequence of file association is obtained, determines that standard is close The subject image element for including in code sequence.
Optionally, described that pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and by each of selection After pictorial element forms the step of initial image set, including:
Selecting frequency is higher than the pictorial element of preset value by the selecting frequency for counting each pictorial element in pre-set image set It is marked.
In addition, to achieve the above object, the present invention also provides a kind of document encrypting apparatus;
The document encrypting apparatus includes:It memory, processor and is stored on the memory and can be in the processing The file encryption program run on device, wherein:
It is realized such as the step of above-mentioned file encrypting method when the file encryption program is executed by the processor.
In addition, to achieve the above object, the present invention also provides a kind of computer storage medias;
File encryption program is stored on the computer storage media, when the file encryption program is executed by processor It realizes such as the step of above-mentioned file encrypting method.
File encrypting method of the embodiment of the present invention, device and computer storage media specifically include user and are triggered in terminal CIPHERING REQUEST, terminal receive the CIPHERING REQUEST that is triggered based on file, terminal from the selection pictorial element in pre-set image set, and Each pictorial element of selection is formed into initial image set;Terminal shows initial image set on the screen, and generates encryption prompt letter Breath, to prompt user that setting is encrypted based on initial image set;Grade setting instruction is received, the grade setting instruction is obtained In secret grade, and show the pre-set text frame of the secret grade corresponding number;Initial pictures are chosen based on user's operation The subject image element of concentration, and the subject image element is input in the pre-set text frame and forms the secret grade Corresponding standard cipher sequence;Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.This hair It is bright that different pictorial elements is applied into encrypting and decrypting processing so that file encryption is not that dull digital alphabet combines, and is made More interesting, the operation combined and facilitate user of sorting of image must be encrypted so that the encryption of file is more convenient, in addition, Different subject image element numbers can be arranged in user in the present invention compared with the encryptions such as existing data, by different targets Pictorial element the forms such as is arranged or is combined and forms standard cipher sequence so that the encryption of file is more intelligent.
Description of the drawings
A kind of Fig. 1 hardware architecture diagrams of terminal of each embodiment to realize the present invention;
Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of file encrypting method first embodiment of the present invention;
Fig. 4 is the flow diagram of file encrypting method second embodiment of the present invention;
Fig. 5 is the flow diagram of file encrypting method 3rd embodiment of the present invention;
Fig. 6 is the flow diagram of file encrypting method fourth embodiment of the present invention;
Fig. 7 is the concrete scene signal for decrypting file in file encrypting method second embodiment of the present invention by pictorial element Figure;
Fig. 8 is that subscriber identity information is compared with pre-stored criteria identity information in file encrypting method 3rd embodiment of the present invention Concrete scene schematic diagram.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, using for indicating that the suffix of such as " module ", " component " or " unit " of element is only The explanation for being conducive to the present invention, itself does not have a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, tablet Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable The shiftings such as media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer The fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special Except element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware architecture diagram of its mobile terminal of each embodiment to realize the present invention, the shifting Moving terminal 100 may include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram, Either combine certain components or different components arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, by base station Downlink information receive after, to processor 110 handle;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating Frequency unit 101 can also be communicated with network and other equipment by radio communication.Above-mentioned wireless communication can use any communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102 Sub- mail, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can be according to need It to be omitted in the range for the essence for not changing invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, it is that radio frequency unit 101 or WiFi module 102 are received or The audio data stored in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103 The relevant audio output of specific function executed with mobile terminal 100 can also be provided (for example, call signal receives sound, disappears Breath receives sound etc.).Audio output unit 103 may include loud speaker, buzzer etc..
A/V input units 104 are for receiving audio or video signal.A/V input units 104 may include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained by image capture apparatus (such as camera) in image capture mode carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can To be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case of telephone calling model. Microphone 1042 can implement various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition) The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, size and the direction of gravity are can detect that when static, can be used to identify the application of mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminal Family is arranged and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 with And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect user on it or neighbouring touch operation (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071 Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, can To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating lever etc. It is one or more, do not limit herein specifically.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel 1061 be to realize the function that outputs and inputs of mobile terminal as two independent components, but in certain embodiments, can The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example, External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with For the transmission data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can include mainly storing program area And storage data field, wherein storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage Data in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
In addition, in terminal shown in Fig. 1, the text run on the processor 110 is stored on the memory 109 Part encipheror, the terminal call the file encryption program stored in memory 109 by processor 110, and execute following Operation:
Receive the CIPHERING REQUEST triggered based on file;
Pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and each pictorial element of selection is formed Initial image set;
It shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting;
Grade setting instruction is received, obtains the secret grade in the grade setting instruction, and show the secret grade The pre-set text frame of corresponding number;
The subject image element that initial pictures are concentrated is chosen based on user's operation, and the subject image element is input to The corresponding standard cipher sequence of the secret grade is formed in the pre-set text frame;
Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.
Further, the terminal calls the file encryption program stored in memory 109 by processor 110, with reality The existing subject image element concentrated based on user's operation selection initial pictures, and the subject image element is input to institute The step of corresponding standard cipher sequence of the secret grade is formed in pre-set text frame is stated, including:
The subject image element that initial pictures are concentrated is chosen based on user's operation, subject image element is input to default text In this frame;
It determines that subject image element sorts according to the preset numbers of pre-set text frame, forms the corresponding mark of the secret grade Quasi- keying sequence.
Further, described standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file After step, the terminal calls the file encryption program stored in memory 109 by processor 110, to realize following step Suddenly:
The decoding request triggered based on file is received, the standard cipher sequence of file association is obtained, determines standard cipher sequence The subject image element for including in row;
The decrypted image set for including subject image element is chosen from pre-set image set, is received user and is based on decryption figure Image set closes the decrypted image sequence chosen;
Decrypted image sequence is compared with standard sequence image;
If decrypted image sequence is matched with standard sequence image, judges that user has operating right, carry out file decryption.
Further, described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, really After the step of calibrating the subject image element for including in quasi- keying sequence, the terminal calls memory by processor 110 The file encryption program stored in 109, to realize following steps:
Determine subject image element number, generate the prompt message for including subject image element number, with prompt user into Row decryption oprerations.
Further, after described the step of decrypted image sequence is compared with standard sequence image, the terminal The file encryption program stored in memory 109 is called by processor 110, to realize following steps:
If decrypted image sequence is mismatched with standard sequence image, judge that user does not have operating right, and prompt to use Family carries out the secondary decryption oprerations of file;
The decryption number of statistics file locks file if file decryption number is more than predetermined threshold value.
Further, the decryption number of the statistics file, if file decryption number be more than predetermined threshold value, by file into After line-locked step, the terminal calls the file encryption program stored in memory 109 by processor 110, with reality Existing following steps:
Authentication request is received, the subscriber identity information for including in authentication request is obtained;
Subscriber identity information is compared with pre-stored criteria identity information, if subscriber identity information and pre-stored criteria identity Information matches then release file locking and carry out file decryption.
Further, described that the subject image element that initial pictures are concentrated is chosen based on user's operation, and by the target Pictorial element was input in the pre-set text frame after the step of forming the secret grade corresponding standard cipher sequence, institute It states terminal and the file encryption program stored in memory 109 is called by processor 110, to realize following steps:
By the cryptographic Hash of default hash algorithm calculation document, using the cryptographic Hash being calculated as initial Hash value, and protect Deposit initial Hash value;
It is described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, determines that standard is close The step of subject image element for including in code sequence, including:
The decoding request triggered based on file is received, by the current cryptographic Hash of default hash algorithm calculation document;
Current cryptographic Hash is compared with initial Hash value;
If current cryptographic Hash is identical as initial Hash value, the standard cipher sequence of file association is obtained, determines that standard is close The subject image element for including in code sequence.
Further, described that pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and by selection After the step of each pictorial element composition initial image set, the terminal is called by processor 110 to be stored in memory 109 File encryption program, to realize following steps:
Selecting frequency is higher than the pictorial element of preset value by the selecting frequency for counting each pictorial element in pre-set image set It is marked.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
Embodiment to facilitate the understanding of the present invention, below to the communications network system that is based on of mobile terminal of the present invention into Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system System is the LTE system of universal mobile communications technology, which includes communicating UE (User Equipment, the use of connection successively Family equipment) (the lands Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers Such as the function of home location register (not shown) etc, and some are preserved in relation to use such as service features, data rates The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201 Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And the following new network system etc., it does not limit herein.
Based on above-mentioned terminal hardware structure and communications network system, each implementation of file encrypting method of the present invention is proposed Example.
The present invention provides a kind of file encrypting method.In the present embodiment, the file encrypting method is optional is applied to eventually In end, the terminal is chosen as the mobile terminal described in Fig. 1, and the file encrypting method includes:
Receive the CIPHERING REQUEST triggered based on file;
Pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and each pictorial element of selection is formed Initial image set;
It shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting;
Grade setting instruction is received, obtains the secret grade in the grade setting instruction, and show the secret grade The pre-set text frame of corresponding number
The subject image element that initial pictures are concentrated is chosen based on user's operation, and the subject image element is input to The corresponding standard cipher sequence of the secret grade is formed in the pre-set text frame;
Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.
The scheme of image encryption is set in the terminal in the present embodiment, prestores different pictorial elements in terminal, no Same pictorial element forms pre-set image set, and for user when terminal triggers CIPHERING REQUEST, terminal randomly selects pre-set image collection Pictorial element in conjunction forms initial image set, and user can carry out arrangement group by the pictorial element for selecting initial pictures to concentrate It closes pictorial element and forms standard cipher sequence, when user decrypts, the solution of file can be realized by carrying out the reproduction of pictorial element Close operation.
It should be added that the concrete form for carrying out file encryption in the present invention by image is not construed as limiting, mode One:Initial pictures concentration includes 6 pictorial elements, and user selects 4 pictorial elements from 6 pictorial elements, and by 4 images The file encryption mode of combination, for example, user selects 4 pictorial elements to be decoded behaviour in user as subject image element When making, this 4 pictorial elements are chosen from decrypted image set, you can to realize the decryption of file, the arrangement of 4 pictorial elements Sequence is not construed as limiting, wherein decrypted image set can be identical as initial image set, can also be comprising 4 pictorial elements The set of other pictorial elements;Mode two:Initial pictures concentration includes 6 pictorial elements, and user selects from 6 pictorial elements 4 pictorial elements, by 4 pictorial element sequence setting file encryption modes, for example, user clicks this document or file, Display the prompt box is corresponded in terminal, there are 4 different pictorial elements once to sort sidewards in prompting frame.Initial image set has 4 4 pictorial elements are moved to empty text box by empty text box, user, are clicked corresponding button encryption is arranged, are completed text The cryptographic operation of part, similarly, when operation is decrypted in user, user by need by 4 pictorial elements according to encryption when It is arranged, realizes the decryption of file.
Further, compared with simple digital alphabet combined ciphering, user can select to be an image in this programme Element or multiple images element, when user selects multiple images aes encryption, it is by multiple images that user, which is also an option that, Element is combined or sorts, and such file encryption mode is more flexible.
With reference to Fig. 3, in the first embodiment of file encrypting method of the present invention, the file encrypting method includes:
Step S10 is received the CIPHERING REQUEST triggered based on file, is selected from pre-set image set according to the CIPHERING REQUEST Pictorial element is taken, and each pictorial element of selection is formed into initial image set.
User clicks the CIPHERING REQUEST of file triggering file in terminal, wherein the mode of triggering file encryption request is not Make specific restriction, can click file triggering CIPHERING REQUEST, can also be that user speech triggers CIPHERING REQUEST, terminal receives base In the CIPHERING REQUEST of file triggering, terminal obtains pre-set image set, and pre-set image set can be the photo in user's photograph album The set of composition can also be the set of other image identification compositions, and the image number minimum value in pre-set image set is not Ten can be less than, the upper limit is not specifically limited, and terminal is chosen from random or according to setting the rule in pre-set image set to be schemed Pixel element, and each pictorial element of selection is formed into initial image set, for example, in pre-set image set including 100 in terminal Image is opened, terminal randomly chooses 10 pictures in 100 pictures and forms initial image set.
Further, include after step S10:
Selecting frequency is higher than the pictorial element of preset value by the selecting frequency for counting each pictorial element in pre-set image set It is marked.
Terminal counts the selecting frequency of each pictorial element in pre-set image set, that is, terminal carries out each pictorial element Record determines that the selecting frequency of each pictorial element, pictorial element of the terminal by selecting frequency higher than preset value are marked, In, preset value can be arranged as the case may be, for example, user setting is 10 times, to prevent from repeating selecting identical pictorial element, There is the identical standard cipher sequence for file encryption;The selecting frequency of terminal statistical picture element in the present embodiment, And according to the selecting frequency of pictorial element, the pictorial element of preset value is less than from the selection selecting frequency in pre-set image set, And pictorial element is formed into initial image set so that the form of image encryption has more diversity.
Step S20 shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting.
After terminal determines initial image set, initial image set is shown on the screen of terminal, and generates encryption prompt message, With prompt user carry out grade setting, that is, terminal shows initial image set, and generates prompt message, prompt user into Row cryptographic operation.
Step S30, reception grade setting instruction, obtains the secret grade in the grade setting instruction, and described in display The pre-set text frame of secret grade corresponding number.
Terminal shows that secret grade setting prompt, user determine the secret grade of file or file, and display number Pre-set text frame, that is, the encryption of user setting the first estate, then it is corresponding in terminal to show the corresponding number of the first estate encryption Pre-set text frame;The encryption of the second grade of user setting, then it is corresponding in terminal to show that the encryption of the second grade corresponds to number Pre-set text frame then shows 3 text boxes for example, user setting the first estate is encrypted;The second grade of user setting is encrypted, then Show 6 text boxes, and so on.Wherein pre-set text frame refers to the empty text box that user inputs subject image element.
Step S40 chooses the subject image element that initial pictures are concentrated based on user's operation, and the target image is first Element, which is input in the pre-set text frame, forms the corresponding standard cipher sequence of the secret grade.
Terminal chooses the subject image element that initial pictures are concentrated based on user's operation, and further, terminal is according to user Operation determines whether to carry out file encryption for the mode of sequence, if the mode of sequence carries out file encryption, then user can incite somebody to action Subject image element is moved to the pre-set text frame of corresponding number, and terminal determines subject image element according to the sequence of text box Sequence, and using the subject image element of ordered arrangement as standard cipher sequence, user needs when carrying out file decryption operation Subject image element is chosen, and subject image element is sorted in sequence, only user is formed identical as standard cipher sequence Element sequence when, file decryption just may be implemented, if not sequence but combination mode carry out file encryption, then user exists When the pictorial element selected in decrypting process is consistent with encrypted pictorial element, so that it may to realize file decryption.
Further, determine that the realization method of the sequence of subject image element includes according to user's operation in step S40:
Step a1 chooses the subject image element that initial pictures are concentrated based on user's operation, subject image element is inputted Into pre-set text frame.
Step b1 determines that subject image element sorts according to the preset numbers of pre-set text frame, forms the secret grade Corresponding standard cipher sequence.
User's operation chooses the subject image element that initial pictures are concentrated, and subject image element is input to pre-set text frame In (wherein, the quantity of pre-set text frame is determined according to secret grade);Target figure is determined according to the preset numbers of pre-set text frame Pixel element sorts, and forms the corresponding standard cipher sequence of the secret grade, that is, terminal sorts the pictorial element in text box As the corresponding standard cipher sequence of secret grade.
Due to the diversity of pre-set image set in the present embodiment, the randomness of initial image set is selected, in addition, user can Secret grade is independently arranged, for terminal according to the pre-set text frame for adding the bright corresponding number of grade display, such user can basis Corresponding secret grade is arranged in the importance of file so that the safety higher of file.
Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file by step S50.
After the determination of terminal monitoring standard cipher sequence, standard cipher sequence and file are associated preservation by terminal, with The cryptographic operation of file is completed, terminal can be by decrypted image sequence input by user and standard sequence image when user decrypts It is compared, carries out the decryption of file.
Encrypting and decrypting processing is applied to by different pictorial elements in the present embodiment so that file encryption is not list The digital alphabet of tune combines so that encryption is more interesting, and the sequence combination of image facilitates the operation of user so that file Encryption is more convenient, in addition, different secret grades can be arranged in the present invention, and shows the corresponding text box of secret grade, User's selection target pictorial element is prompted to input years text box so that the encryption of file is more intelligent, safety higher.
With reference to Fig. 4, the of file encrypting method of the present invention is further provided on the basis of first embodiment of the invention Two embodiments, are omitted the step in first embodiment in Fig. 4, step S60 in the present embodiment, optionally in the first embodiment Step S50 after, that is, file encryption complete, user carry out file decryption.
The present embodiment is the decrypting process to encrypting file, and the present embodiment includes:
Step S60 receives the decoding request triggered based on file, obtains the standard cipher sequence of file association, determines mark The subject image element for including in quasi- keying sequence.
Step S70 chooses the decrypted image set for including subject image element from pre-set image set, receives user's base In the decrypted image sequence that decrypted image set is chosen.
User triggers the decoding request of file in terminal, wherein for triggering mode without limiting, terminal receives user's base In the decoding request of file triggering, the standard cipher sequence of file association is obtained, that is, terminal determines that user needs the text decrypted Part, and the pre-set standard cipher sequence of this document is obtained, terminal determines the target image for including in standard cipher sequence Element, terminal choose the decrypted image set for including subject image element from pre-set image set, and in conjunction with Fig. 7, terminal obtains Standard cipher sequence to file is B figures, A figures, C figures and D figures, is known as 4 comprising image primitive in standard cipher sequence, terminal from A figures, B figures, C figures, D figures, E figures and F figures are chosen in pre-set image set into decrypted image set, wherein decrypted image set With initial image set can it is identical can not also be identical, user selects 4 pictorial elements in decrypted image set, and by 4 Pictorial element carries out arrangement form decrypted image sequence.
It should be added that decryption prompt can be arranged in user in terminal in the present embodiment, that is, upper display encryption The pre-set text frame of the corresponding number of grade, to prompt user that operation is decrypted, for example, standard when user forgets to encrypt is close Code sequence, user can click prompt button, and terminal prompts the pictorial element number of standard cipher sequence, so that user Input decrypted image sequence.
Decrypted image sequence is compared step S80 with standard sequence image.
Step S90 judges that user has operating right, carries out if decrypted image sequence is matched with standard sequence image File decryption.
The decrypted image sequence that user decrypts is compared terminal with standard sequence image, and terminal judges decrypted image sequence Whether row and the pictorial element number for including in standard sequence image are identical, and whether pictorial element is identical, the sequence of pictorial element Whether identical, if close image sequence is identical as the pictorial element number for including in standard sequence image, pictorial element is identical, image The sequence of element is identical, then terminal judgement decrypted image sequence is matched with standard sequence image, it is determined that user has operating rights Limit, and file decryption is carried out, so that user checks file.
Terminal determines the decryption of the file of terminal depending on the user's operation in the present embodiment so that document image is encrypted Method is more interesting.
Further, further include after step S80:
Step S100 judges that user does not have operating right if decrypted image sequence is mismatched with standard sequence image, And prompt the secondary decryption oprerations of user's progress file;
Step S110, the decryption number of statistics file lock file if file decryption number is more than predetermined threshold value It is fixed.
If terminal determines close image sequence and standard sequence figure according to the comparison of decrypted image sequence and standard sequence image As in include pictorial element number, pictorial element, in the sequence of pictorial element by any one or it is multiple differ, then eventually End judgement decrypted image sequence and standard sequence image mismatch, and terminal notifying user carries out secondary decryption oprerations, user into When the secondary decryption oprerations of row, the decryption oprerations number of terminal counting user, if it is more than predetermined threshold value that user, which decrypts number, wherein Predetermined threshold value can be arranged according to concrete scene, such as be set as 5 times, 10 times, then the file that terminal decrypts user carries out short The locking of phase.
User is obstructed to file decryption out-of-date in the present embodiment, the operating frequency of terminal counting user, if the behaviour of user Working frequency is higher, and terminal automatically locks file, to prevent file from revealing.
Further, in the 3rd embodiment of file encrypting method of the present invention, the present embodiment is the base in second embodiment Itd is proposed on plinth, terminal monitoring to user repeatedly decryption not over when, terminal judgement user forget the standard pre-entered Sequence image is decrypted, specifically automatically after terminal-pair subscriber authentication:
With reference to Fig. 5, the file encrypting method includes:
Step S120 receives authentication request, obtains the subscriber identity information for including in authentication request.
User triggers authentication request, and terminal receives authentication request, obtains the use for including in authentication request Family identity information, that is, user can preset authentication button by click and trigger authentication request or user speech The other forms such as instruction trigger authentication request, and terminal receives authentication request, includes in acquisition authentication request Subscriber identity information, wherein the subscriber identity information in authentication request can be that user is manually entered, can also be It is carried when user's triggering authentication request, for example, it is that automatic collection is used that terminal clicks authentication virtual key in user The fingerprint at family acquires the sound of user as subscriber authentication or terminal, and user voice is analyzed to obtain user's sound Line is as subscriber authentication.
Subscriber identity information is compared step S130 with pre-stored criteria identity information, if subscriber identity information with it is pre- Standard identity information matches are deposited, then release file locking and carry out file decryption.
Subscriber identity information is compared terminal with pre-stored criteria identity information, wherein pre-stored criteria identity information is Refer to the standard identity information gathered in advance for verifying user identity, showing terminal in conjunction with Fig. 8, Fig. 8 obtains authentication The subscriber identity information for including in request refers to the real-time face feature information of user, and pre-stored criteria identity information refers to that user is pre- The bare-headed photo information deposited;If subscriber identity information is matched with pre-stored criteria identity information, that is, subscriber identity information and the mark that prestores Quasi- identity information is identical, for example, collected user fingerprints are matched with pre-stored fingerprint, or the user voice of acquisition and the sound that prestores For sound after sound compares, two sound are same person, and terminal releases file locking and carries out file decryption.
Subscriber identity information is compared with standard identity information in the present embodiment, the unlock of style of writing of going forward side by side part and solution It is close, i.e., operation can also be decrypted when user forgets the password of advance facility, under the premise of ensuring information security property, side Just the operation of user.
With reference to Fig. 6, the present embodiment can be combined with above-described embodiment, and the 4th of file encrypting method of the present invention implements In example, file is subjected to hash check, to prevent from occurring the problem of file is distorted, specifically, this implementation in file storing process Example include:
Step S140 is breathed out by the cryptographic Hash of default hash algorithm calculation document using the cryptographic Hash being calculated as initial Uncommon value, and preserve initial Hash value;
After user setting standard cipher sequence, that is, after file encryption, terminal presses default hash algorithm (default Hash Algorithm is the file identification of creator's setting according to file size, time, type) cryptographic Hash of calculation document, terminal will calculate Obtained cryptographic Hash is as initial Hash value, so that user determines whether the file of terminal is tampered according to cryptographic Hash.
The present embodiment and file decryption in second embodiment are combined, step S60, described receive is triggered based on file Decoding request, obtain the standard cipher sequence of file association, determine the subject image element for including in standard cipher sequence Step, including:
Step S61 receives the decoding request triggered based on file, by the current Hash of default hash algorithm calculation document Value;
Current cryptographic Hash is compared by step S62 with initial Hash value;
Step S63 obtains the standard cipher sequence of file association, really if current cryptographic Hash is identical as initial Hash value Calibrate the subject image element for including in quasi- keying sequence.
Terminal receives the decoding request that trigger based on file, terminal press default hash algorithm (wherein, preset hash algorithm and The algorithm for calculating initial Hash value is consistent) the current cryptographic Hash of calculation document;Terminal by current cryptographic Hash and initial Hash value into Row compares;If current cryptographic Hash is identical as initial Hash value, terminal judges file file in the period for being encrypted into decryption It is not tampered with, at this point, terminal obtains the standard cipher sequence of file association, determines the target image for including in standard cipher sequence Element, the step of to carry out file decryption, if current cryptographic Hash is differed with initial Hash value, terminal judges that file is being encrypted It is tampered to file in the period of decryption, at this point, terminal can generate a prompt message.
The encrypting and decrypting of file is combined with cryptographic Hash in the present embodiment, file can be prevented to be tampered, is ensured The integrality of file, authenticity.
In addition, the embodiment of the present invention also proposes a kind of computer storage media.
File encryption program is stored on the computer storage media, when the file encryption program is executed by processor Realize that file encryption operates as follows:
Receive the CIPHERING REQUEST triggered based on file;
Pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and each pictorial element of selection is formed Initial image set;
It shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting;
Grade setting instruction is received, obtains the secret grade in the grade setting instruction, and show the secret grade The pre-set text frame of corresponding number;
The subject image element that initial pictures are concentrated is chosen based on user's operation, and the subject image element is input to The corresponding standard cipher sequence of the secret grade is formed in the pre-set text frame;
Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.
Further, following operation is also realized when the file encryption program is executed by processor:
It is described that the subject image element that initial pictures are concentrated is chosen based on user's operation and the subject image element is defeated The step of entering into the pre-set text frame to be formed the secret grade corresponding standard cipher sequence, including:
The subject image element that initial pictures are concentrated is chosen based on user's operation, subject image element is input to default text In this frame;
It determines that subject image element sorts according to the preset numbers of pre-set text frame, forms the corresponding mark of the secret grade Quasi- keying sequence.
Further, following operation is also realized when the file encryption program is executed by processor:
It is described that standard cipher sequence and file are associated preservation, the step of cryptographic operation to complete file after, Including:
The decoding request triggered based on file is received, the standard cipher sequence of file association is obtained, determines standard cipher sequence The subject image element for including in row;
The decrypted image set for including subject image element is chosen from pre-set image set, is received user and is based on decryption figure Image set closes the decrypted image sequence chosen;
Decrypted image sequence is compared with standard sequence image;
If decrypted image sequence is matched with standard sequence image, judges that user has operating right, carry out file decryption.
Further, following operation is also realized when the file encryption program is executed by processor:
It is described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, determines that standard is close After the step of subject image element for including in code sequence, including:
Determine subject image element number, generate the prompt message for including subject image element number, with prompt user into Row decryption oprerations.
Further, following operation is also realized when the file encryption program is executed by processor:
After described the step of decrypted image sequence is compared with standard sequence image, including:
If decrypted image sequence is mismatched with standard sequence image, judge that user does not have operating right, and prompt to use Family carries out the secondary decryption oprerations of file;
The decryption number of statistics file locks file if file decryption number is more than predetermined threshold value.
Further, following operation is also realized when the file encryption program is executed by processor:
The decryption number of the statistics file, if file decryption number is more than predetermined threshold value, by file into line-locked After step, including:
Authentication request is received, the subscriber identity information for including in authentication request is obtained;
Subscriber identity information is compared with pre-stored criteria identity information, if subscriber identity information and pre-stored criteria identity Information matches then release file locking and carry out file decryption.
Further, following operation is also realized when the file encryption program is executed by processor:
It is described that the subject image element that initial pictures are concentrated is chosen based on user's operation and the subject image element is defeated After the step of entering into the pre-set text frame to be formed the secret grade corresponding standard cipher sequence, including:
By the cryptographic Hash of default hash algorithm calculation document, using the cryptographic Hash being calculated as initial Hash value, and protect Deposit initial Hash value;
It is described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, determines that standard is close The step of subject image element for including in code sequence, including:
The decoding request triggered based on file is received, by the current cryptographic Hash of default hash algorithm calculation document;
Current cryptographic Hash is compared with initial Hash value;
If current cryptographic Hash is identical as initial Hash value, the standard cipher sequence of file association is obtained, determines that standard is close The subject image element for including in code sequence.
Further, following operation is also realized when the file encryption program is executed by processor:
It is described to receive the CIPHERING REQUEST triggered based on file;Figure is chosen from pre-set image set according to the CIPHERING REQUEST Pixel element, and after the step of each pictorial element of selection is formed initial image set, including:
Selecting frequency is higher than the pictorial element of preset value by the selecting frequency for counting each pictorial element in pre-set image set It is marked.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality Body/operation/object is distinguished with another entity/operation/object, without necessarily requiring or implying these entity/operations/ There are any actual relationship or orders between object;The terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or system including a series of elements include not only that A little elements, but also include other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of system.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except there is also other identical elements in process, method, article or the system including the element.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of file encrypting method, which is characterized in that the file encrypting method includes the following steps:
Receive the CIPHERING REQUEST triggered based on file;
Pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and each pictorial element of selection is formed initially Image set;
It shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting;
Grade setting instruction is received, obtains the secret grade in the grade setting instruction, and show that the secret grade corresponds to The pre-set text frame of quantity;
The subject image element that initial pictures are concentrated is chosen based on user's operation, and the subject image element is input to described The corresponding standard cipher sequence of the secret grade is formed in pre-set text frame;
Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.
2. file encrypting method as described in claim 1, which is characterized in that described to choose initial image set based on user's operation In subject image element, and the subject image element is input in the pre-set text frame and forms the secret grade pair The step of standard cipher sequence answered, including:
The subject image element that initial pictures are concentrated is chosen based on user's operation, the subject image element is input to described pre- If in text box;
It determines that subject image element sorts according to the preset numbers of pre-set text frame, it is close to form the corresponding standard of the secret grade Code sequence.
3. file encrypting method as described in claim 1, which is characterized in that described to close standard cipher sequence with file After the step of UNPROFOR is deposited, cryptographic operation to complete file, including:
The decoding request triggered based on file is received, the standard cipher sequence of file association is obtained, determines in standard cipher sequence Including subject image element;
The decrypted image set for including subject image element is chosen from pre-set image set, is received user and is based on decrypted image collection Close the decrypted image sequence chosen;
Decrypted image sequence is compared with standard sequence image;
If decrypted image sequence is matched with standard sequence image, judges that user has operating right, carry out file decryption.
4. file encrypting method as claimed in claim 3, which is characterized in that the decryption that the reception is triggered based on file is asked After the step of asking, obtaining the standard cipher sequence of file association, determine the subject image element for including in standard cipher sequence, Including:
It determines subject image element number, the prompt message for including subject image element number is generated, to prompt user to solve Close operation.
5. file encrypting method as claimed in claim 3, which is characterized in that described by decrypted image sequence and standard sequence figure After as the step of being compared, including:
If decrypted image sequence and standard sequence image mismatch, judge that user does not have operating right, and prompt user into The secondary decryption oprerations of style of writing part;
The decryption number of statistics file locks file if file decryption number is more than predetermined threshold value.
6. file encrypting method as claimed in claim 5, which is characterized in that the decryption number of the statistics file, if file After the step of decryption number is more than predetermined threshold value, is then locked file, including:
Authentication request is received, the subscriber identity information for including in authentication request is obtained;
Subscriber identity information is compared with pre-stored criteria identity information, if subscriber identity information and pre-stored criteria identity information Matching, then release file locking and carry out file decryption.
7. file encrypting method as claimed in claim 3, which is characterized in that described to choose initial image set based on user's operation In subject image element, and the subject image element is input in the pre-set text frame and forms the secret grade pair After the step of standard cipher sequence answered, including:
By the cryptographic Hash of default hash algorithm calculation document, using the cryptographic Hash being calculated as initial Hash value, and preserve just Beginning cryptographic Hash;
It is described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, determines standard cipher sequence The step of subject image element for including in row, including:
The decoding request triggered based on file is received, by the current cryptographic Hash of default hash algorithm calculation document;
Current cryptographic Hash is compared with initial Hash value;
If current cryptographic Hash is identical as initial Hash value, the standard cipher sequence of file association is obtained, determines standard cipher sequence The subject image element for including in row.
8. file encrypting method as described in claim 1, which is characterized in that it is described according to the CIPHERING REQUEST from pre-set image Pictorial element is chosen in set, and after the step of each pictorial element of selection is formed initial image set, including:
The selecting frequency for counting each pictorial element in pre-set image set, the pictorial element by selecting frequency higher than preset value carry out Label.
9. a kind of document encrypting apparatus, which is characterized in that the document encrypting apparatus includes:It memory, processor and is stored in On the memory and the file encryption program that can run on the processor, wherein:
It is realized when the file encryption program is executed by the processor as file described in any item of the claim 1 to 8 adds The step of decryption method.
10. a kind of computer storage media, which is characterized in that file encryption program is stored on the computer storage media, It is realized such as file encrypting method described in any item of the claim 1 to 8 when the file encryption program is executed by processor Step.
CN201810377783.3A 2018-04-24 2018-04-24 File encrypting method, device and computer storage media Pending CN108563959A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810377783.3A CN108563959A (en) 2018-04-24 2018-04-24 File encrypting method, device and computer storage media

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810377783.3A CN108563959A (en) 2018-04-24 2018-04-24 File encrypting method, device and computer storage media

Publications (1)

Publication Number Publication Date
CN108563959A true CN108563959A (en) 2018-09-21

Family

ID=63536316

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810377783.3A Pending CN108563959A (en) 2018-04-24 2018-04-24 File encrypting method, device and computer storage media

Country Status (1)

Country Link
CN (1) CN108563959A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112989398A (en) * 2021-05-18 2021-06-18 腾讯科技(深圳)有限公司 Data processing method and device for block chain network, computer equipment and medium
CN113079011A (en) * 2021-03-18 2021-07-06 长鑫存储技术有限公司 Key pushing method, file operating method, storage medium and computer equipment
CN117193863A (en) * 2023-09-08 2023-12-08 上海合芯数字科技有限公司 Method, device, system and processor for starting host bootstrap program

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040246523A1 (en) * 2003-06-09 2004-12-09 Konica Minolta Business Technologies, Inc. Data communication device, computer readable medium and method for transmitting and managing data
CN102571341A (en) * 2010-12-31 2012-07-11 中国银联股份有限公司 Authentication system and method based on dynamic image
CN105453483A (en) * 2013-06-13 2016-03-30 维萨国际服务协会 Image based key derivation function

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040246523A1 (en) * 2003-06-09 2004-12-09 Konica Minolta Business Technologies, Inc. Data communication device, computer readable medium and method for transmitting and managing data
CN102571341A (en) * 2010-12-31 2012-07-11 中国银联股份有限公司 Authentication system and method based on dynamic image
CN105453483A (en) * 2013-06-13 2016-03-30 维萨国际服务协会 Image based key derivation function

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113079011A (en) * 2021-03-18 2021-07-06 长鑫存储技术有限公司 Key pushing method, file operating method, storage medium and computer equipment
CN112989398A (en) * 2021-05-18 2021-06-18 腾讯科技(深圳)有限公司 Data processing method and device for block chain network, computer equipment and medium
CN112989398B (en) * 2021-05-18 2021-07-30 腾讯科技(深圳)有限公司 Data processing method and device for block chain network, computer equipment and medium
CN117193863A (en) * 2023-09-08 2023-12-08 上海合芯数字科技有限公司 Method, device, system and processor for starting host bootstrap program

Similar Documents

Publication Publication Date Title
CN108289141A (en) A kind of the screen locking unlocking method and mobile terminal of mobile terminal
CN107194291A (en) Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium
CN107315937A (en) A kind of method for secret protection, mobile terminal and computer-readable recording medium
CN110069229A (en) Screen sharing method, mobile terminal and computer readable storage medium
WO2020233218A1 (en) Information encryption method, information decryption method, and terminal
CN109558718A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN107133498A (en) A kind of privacy application management method and device and mobile terminal
CN107862196A (en) Fingerprint verification method, mobile terminal and computer-readable recording medium
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN109743696A (en) Identifying code encryption method, system and readable storage medium storing program for executing
CN107861669A (en) The switching method and mobile terminal of a kind of custom system
CN108563959A (en) File encrypting method, device and computer storage media
CN108076501A (en) A kind of Wi-Fi network connection management method and mobile terminal
CN109145552A (en) Information ciphering method and terminal device
CN108206892A (en) Guard method, device, mobile terminal and the storage medium of contact person's privacy
CN108052845A (en) file display control method, terminal and computer readable storage medium
CN107317680A (en) Labeling method, system and the computer-readable recording medium of secured account numbers
CN110187925A (en) A kind of desktop pretrigger control method, equipment and computer readable storage medium
CN108920917A (en) Log in end switching method, mobile terminal and computer readable storage medium
CN108989534A (en) Message prompt method, mobile terminal and computer readable storage medium
CN107888762A (en) Memorandum record generation method and mobile terminal
CN107707554A (en) A kind of login method and mobile terminal of application program account
CN104980436B (en) A kind of encryption transmission system, method, terminal and intermediate server
CN108712567A (en) Theft preventing method, mobile terminal and the computer readable storage medium of mobile terminal
CN107395363A (en) Fingerprint sharing method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination