CN109492417A - Data ciphering method and system - Google Patents
Data ciphering method and system Download PDFInfo
- Publication number
- CN109492417A CN109492417A CN201811342429.3A CN201811342429A CN109492417A CN 109492417 A CN109492417 A CN 109492417A CN 201811342429 A CN201811342429 A CN 201811342429A CN 109492417 A CN109492417 A CN 109492417A
- Authority
- CN
- China
- Prior art keywords
- encryption
- application software
- user
- folder
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Abstract
A kind of data ciphering method includes the following steps: to establish encryption folder at the terminal;To the encryption folder, password is set;The application software for needing to encrypt is moved into the encryption folder;Judge whether user needs to access the encryption folder;Output password input frame is to ask user to input password;Judge whether the password of user's input is correct;And the encryption folder is opened so as to the application software in user the accesses encryption folder.In this way, the application software that the Games Software etc. of mobile phone can be unfavorable for child's study by parent is put into the encryption folder, and the application software that learning software etc. is conducive to child's study is placed directly in user interface, realizes the classification control of the application software.To which while parent's normal use mobile phone, mobile phone study is also can be used normally without being influenced by Games Software etc. in child, and the way to manage of hand-set data limitation access is than hommization.In addition, the present invention also provides a kind of data encryption systems.
Description
Technical field
The present invention relates to data encryption more particularly to a kind of data ciphering method that can be applied to mobile terminal and it is
System.
Background technique
With becoming stronger day by day for mobile terminal such as cell-phone function, the application software of mobile phone installation is also more and more.It is above-mentioned to answer
It include financial instrument, Games Software, software of doing shopping, learning software and playout software etc. with software.Many works of present child
Industry needs to complete by learning software, but many children can steal when by the learning software on mobile phone to fulfil assignment
Game is played using Games Software steathily, in this way, mobile phone also brings many disadvantages while bringing study convenient to child.
In addition, user is there are also the data such as bank for comparing privacy, the privacies such as Alipay or private chat tool compared with
Strong software, it is also desirable to which further setting secrecy avoids mobile phone at other people in use, touching these information easily.
Currently, being completed mostly by cryptoguard for the method for hand-set data limitation access.But as long as user is defeated
The password entered is correct, all application software in the accessible mobile phone of user.If the password bad of input, user cannot
Access any application software in mobile phone.The way to manage of hand-set data limitation access is more stiff, not humanized enough.
Summary of the invention
In view of this, it is necessary to provide a kind of more humane data ciphering methods.
In addition, also providing a kind of more humane data encryption system.
A kind of data ciphering method comprising following steps:
Encryption folder is established at the terminal;
To the encryption folder, password is set;
The application software for needing to encrypt is moved into the encryption folder;
Judge whether user needs to access the encryption folder;
Output password input frame is to ask user to input password;
Judge whether the password of user's input is correct;And
The encryption folder is opened so as to the application software in user the accesses encryption folder.
In a further embodiment, the data ciphering method further includes following steps:
Select whether the application software newly installed needs to encrypt;And
If selection result is that the application software newly installed needs to encrypt, the application software newly installed is put into the encryption text
In part folder.
In a further embodiment, the data ciphering method further includes following steps:
If selection result is that the application software newly installed does not need to encrypt, and the access icon for the application software newly installed is straight
It connects and puts on a user interface.
In a further embodiment, the data ciphering method further includes following steps:
Application software is removed into corresponding encryption folder according to the demand of user.
In a further embodiment, described to add to described if establishing multiple encryption folders in the terminal
The step of ciphertext part sandwiched sets password can be set to the step of different passwords are arranged for multiple encryption folders one by one.
A kind of data encryption system comprising user interface, create unit, encryption unit, operating unit, output unit and
Judging unit;
The user interface shows the access icon of the access icon and application software of encryption folder;
The newly-built unit in establishing encryption folder at the terminal;
The encryption unit is used to that password to be arranged to the encryption folder;
The operating unit is used to that the application software for needing to encrypt to be moved into the encryption folder according to user demand;
The judging unit is user's needs in judging result for judging whether user needs to access the encryption folder
Calling-on signal is generated when accessing the encryption folder;
The output unit asks user to input password for responding the calling-on signal output password input frame;
The judging unit is also used to judge whether the password of user's input is correct and is the password that user inputs in judging result
Operation signal is generated when correct;
The operating unit is also used to respond the operation signal and opens the encryption folder so as to user's access encryption text
Application software in part folder.
In a further embodiment, the data encryption system further includes installation unit;
The installation unit is used to install new application software for the terminal and generates installation letter when installing new application software
Number;
The output unit is also used to respond installation signal pop-up selection dialog box, and the selection dialog box will ask user to new
Whether the application software of installation, which needs to encrypt, is selected;
The operating unit is also used in selection result be that the application software newly installed will newly be installed using soft when needing to encrypt
Part is put into the encryption folder.
In a further embodiment, the operating unit is also used in selection result be that the application software newly installed is not required to
The access icon for the application software newly installed is placed directly in the user interface when encrypting.
In a further embodiment, the operating unit is also used to will no longer be required to the application of encryption according to user demand
Software removes corresponding encryption folder.
In a further embodiment, if whether user's wrong choice when installing application software encrypts or select
The encryption folder of mistake, can be by passing through the behaviour for the application software newly installed as installed application software
It carries out being movable into and out corresponding encryption folder as unit to be remedied.
Using data ciphering method provided by the invention and system, the Games Software etc. of mobile phone can be unfavorable for child by parent
The application software of son study is put into the encryption folder, and the application software that learning software etc. is conducive to child's study is directly put
On a user interface, the classification control of the application software is realized.To, while parent's normal use mobile phone, Hai Ziye
Mobile phone study can be used normally without being influenced by Games Software etc., the way to manage of hand-set data limitation access compares human nature
Change.
Detailed description of the invention
Fig. 1 is the flow chart of the data ciphering method of one embodiment of the present invention.
Fig. 2 is the schematic diagram of the function of the data encryption system of one embodiment of the present invention.
The present invention that the following detailed description will be further explained with reference to the above drawings.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Unless otherwise defined, all technical and scientific terms used herein and belong to technical field of the invention
The normally understood meaning of technical staff is identical.Term as used herein in the specification of the present invention is intended merely to description tool
The purpose of the embodiment of body, it is not intended that in the limitation present invention.Term " and or " used herein includes one or more phases
Any and all combinations of the listed item of pass.
With reference to the accompanying drawing, it elaborates to data ciphering method provided by the invention and system.
Referring to Fig. 1, the present invention provides a kind of data ciphering method.The data ciphering method can be used for terminal and to the end
Data in end is encrypted, can data in a manner of more humanized in the restricting user access terminal.At this
In embodiment, which can be mobile phone, which can be the application software of installation in mobile phone.It is commonly installed in the terminal
Application software generally include financial instrument, Games Software, software of doing shopping, learning software and playout software etc., but simultaneously not only limit
In this.The data ciphering method includes the following steps.
Step S101, establishes encryption folder on the terminal.The access icon of the encryption folder is shown in the terminal
User interface on, so that user can access at any time.The quantity of encryption folder herein according to the demand of user depending on, can
To be set as one or more.
Password is arranged to the encryption folder in step S103.If the quantity of encryption folder be it is multiple, it is multiple plus
Close file can be set as different passwords one by one, distinguish the application software in the control terminal convenient for user.
The application software for needing to encrypt is moved into the encryption folder by step S105.In the present embodiment, Yong Huke
To be moved into such a way that the access icon of dragging application software is into corresponding encryption folder.Accordingly, user can also be with
The application software for not needing encryption is removed into the encryption folder by way of dragging.
Above step S101 to S105 is the cryptographic operation carried out for application software installed in the terminal.Under
Face step S107 to S111 is the encrypting step carried out for the software for newly installing application in the terminal.
Step S107, selects whether the application software newly installed needs to encrypt.If selection result is the application newly installed
Software needs to encrypt, then enters step S109, if selection result is that the application software newly installed does not need to encrypt, enters step
Rapid S111.
The application software newly installed is put into the encryption folder by step S109.Certainly, there are multiple encryption files
In the case where folder, the encryption folder that the application software newly installed need to be put into can be selected by the user.
The access icon for the application software newly installed is placed directly in user interface by step S111.It is to be appreciated that such as
In step S107, whether the wrong choice into S109 encrypts or has selected wrong encryption folder to fruit user, can pass through
Step S101 to S105 is remedied the application software newly installed as installed application software.
Step S113, judges whether user needs to access the encryption folder.If a determination be made that user needs to visit
It asks the encryption folder, then enters step S115.If a determination be made that user does not need to access the encryption folder, then
Process terminates.Usually judge the access figure whether user needs to access the mode of the encryption folder for the encryption folder
Whether mark by user carries out specific operation.It is to be appreciated that specific operation herein can be clicked, double-click and slide etc..
Step S115, output password input frame is to ask user to input password.
Step S117 judges whether the password of user's input is correct.If a determination be made that the password of user's input is correct,
Then enter step S119.If a determination be made that the password bad of user's input, then process terminates.
Step S119 opens the encryption folder so as to the application software in user the accesses encryption folder.This
Sample, the application software that the Games Software etc. of mobile phone can be unfavorable for child's study by parent are put into the encryption folder, and incite somebody to action
The application software that learning software etc. is conducive to child's study is placed directly in user interface, realizes the classification pipe of the application software
System.To which while parent's normal use mobile phone, mobile phone study is also can be used normally without by Games Software etc. in child
It influences, the way to manage of hand-set data limitation access is than hommization.
In other embodiments, which can also include the following steps: answer according to the demand of user
Corresponding encryption folder is removed with software.The step will be in the case where the application software need to encrypt, convenient for using
Manage the application software in the terminal in family.
Referring to Fig. 2, the present invention also provides a kind of data encryption systems 99.The data encryption system can be used for terminal and right
Data in the terminal is encrypted, can data in a manner of more humanized in the restricting user access terminal.
In the present embodiment, which can be mobile phone, which can be the application software of installation in mobile phone.The data encryption
System 99 includes user interface 10, newly-built unit 20, encryption unit 30, operating unit 40, input unit 50, installation unit 60,
Output unit 70 and judging unit 80.
User interface 10 is the medium of user and the interaction of data encryption system 99.Encryption file is shown in user interface 10
The access icon of the access icon and application software 14 of folder 12.User can pass through the access icon of encryption folder 12 and application
The access icon of software 14 accesses encryption folder 12 and application software 14 respectively.Application software 14 is to be typically mounted on the terminal
On financial instrument, Games Software, do shopping software, learning software and playout software etc., but not limited to this.It is to be appreciated that answering
It uses software 14 that can also be put into encryption folder 12 and accesses project as the next stage in encryption folder 12.
Newly-built unit 20 for establishing encryption folder 12 on the terminal.As described above, the access of encryption folder 12
Icon is shown in the user interface 10 of the terminal, so that user can access at any time.The quantity of encryption folder 12 herein
Depending on according to the demand of user, one or more can be set to.
Encryption unit 30 is used to that password to be arranged to encryption folder 12.If the quantity of encryption folder be it is multiple, this is more
A encryption folder can be set as different passwords one by one, distinguish the application software 14 in the control terminal convenient for user.
Operating unit 40 is used to that the application software 14 for needing to encrypt to be moved into encryption folder 12 according to user demand.It is corresponding
Ground, the application software 14 that operating unit 40 can also will no longer be required to encryption according to user demand remove corresponding encryption file
Folder 12.In the present embodiment, user can use the access icon of dragging application software 14 to corresponding encryption folder 12
In mode move into.Accordingly, if user needs application software 14 to remove corresponding encryption folder 12, can use will be answered
It can with the mode that software 14 hauls out corresponding encryption folder.Above-mentioned user demand can be inputted by input unit 50, when
So, in the present embodiment, user can drag application software 14 by input unit 50 come the position of mobile application software 14.
Installation unit 60 is used to install new application software 14 for the terminal.Installation unit 60 is also used to installing new answer
With generation installation signal when software 14 and the installation signal is sent to output unit 70.
Output unit 70 is for responding installation signal pop-up selection dialog box.The selection dialog box will ask user to installation
Whether the application software 14 that unit 60 is newly installed, which needs to encrypt, is selected.User carries out selection behaviour by input unit 50
Make.If selection result is that the application software 14 that installation unit 60 is newly installed needs to encrypt, operating unit 40 will be installed newly
Application software 14 be put into the encryption folder 12.If selection result is the application software that installation unit 60 is newly installed
14 do not need to encrypt, then the access icon for the application software 14 newly installed is placed directly in user interface 10 by operating unit 40.
Certainly, in the case where there are multiple encryption folder 12, the application newly installed can be selected by input unit 50 by user
The encryption folder 12 that software 14 need to be put into.
It is to be appreciated that if whether user's wrong choice when installing application software 14 encrypts or has selected mistake
Encryption folder 12, can be single by operation as installed application software 14 by the application software 14 that will newly install
Member 40 carries out being movable into and out corresponding encryption folder 14 to be remedied.
Judging unit 80 is for judging whether user needs to access encryption folder 12.Whether judging unit 80 judges user
The mode for needing to access encryption folder is the access icon for judging user and whether passing through input unit 50 to encryption folder 12
Carry out specific operation.It is to be appreciated that specific operation herein can be clicked, double-click and slide etc..If it is judged that
It is that user needs to access encryption folder 12, then generates calling-on signal and the calling-on signal is sent to output unit 70.
Output unit 70 is also used to respond the calling-on signal output password input frame to ask user to input password.User passes through
Input unit 50 carries out Password Input operation.
Judging unit 80 is also used to judge whether the password of user's input is correct.If it is determined that the judging result of unit 80 is
The password of user's input is correct, then generates operation signal and the operation signal is sent to operating unit 40.
Operating unit 40 responds the operation signal and opens encryption folder 12 so that user accesses in encryption folder 12
Application software 14.For example, to control child plays game, the Games Software etc. of mobile phone can be unfavorable for answering for child's study by parent
It is put into encryption folder 12 with software 14, and the application software 14 that learning software etc. is conducive to child's study is placed directly in user circle
On face 10, the classification control of application software 14 is realized.To which while parent's normal use mobile phone, child can also be normal
Learnt using mobile phone without being influenced by Games Software etc., the way to manage of hand-set data limitation access is than hommization.Equally, it is
It protects individual privacy preferably, it is soft that Private Banking, personal information etc. can also be related to the personal important application for falling into private
Part, which is put into, to be added in secret file.User can according to each one demand, add at any time or cancel certain application software to plus glyphed part
In folder, it is also possible to which multiple plus secret file is arranged, the document classification for being intended to encryption is not put into corresponding different information kit
In.
In addition, for those of ordinary skill in the art, can make in accordance with the technical idea of the present invention other each
Kind changes and modifications, and all these changes and deformation all should belong to the protection scope of the claims in the present invention.
Claims (10)
1. a kind of data ciphering method comprising following steps:
Encryption folder is established at the terminal;
To the encryption folder, password is set;
The application software for needing to encrypt is moved into the encryption folder;
Judge whether user needs to access the encryption folder;
Output password input frame is to ask user to input password;
Judge whether the password of user's input is correct;And
The encryption folder is opened so as to the application software in user the accesses encryption folder.
2. data ciphering method as described in claim 1, it is characterised in that: the data ciphering method further includes walking as follows
It is rapid:
Select whether the application software newly installed needs to encrypt;And
If selection result is that the application software newly installed needs to encrypt, the application software newly installed is put into the encryption text
In part folder.
3. data ciphering method as claimed in claim 2, it is characterised in that: the data ciphering method further includes walking as follows
It is rapid:
If selection result is that the application software newly installed does not need to encrypt, and the access icon for the application software newly installed is straight
It connects and puts on a user interface.
4. data ciphering method as described in claim 1, it is characterised in that: the data ciphering method further includes walking as follows
It is rapid:
Application software is removed into corresponding encryption folder according to the demand of user.
5. data ciphering method as described in claim 1, it is characterised in that: if establishing multiple encryption texts in the terminal
Part presss from both sides, then the step of setting password to the encryption folder can be set to be arranged not for multiple encryption folders one by one
With password the step of.
6. a kind of data encryption system comprising user interface creates unit, encryption unit, and operating unit and is sentenced output unit
Disconnected unit;
The user interface shows the access icon of the access icon and application software of encryption folder;
The newly-built unit in establishing encryption folder at the terminal;
The encryption unit is used to that password to be arranged to the encryption folder;
The operating unit is used to that the application software for needing to encrypt to be moved into the encryption folder according to user demand;
The judging unit is user's needs in judging result for judging whether user needs to access the encryption folder
Calling-on signal is generated when accessing the encryption folder;
The output unit asks user to input password for responding the calling-on signal output password input frame;
The judging unit is also used to judge whether the password of user's input is correct and is the password that user inputs in judging result
Operation signal is generated when correct;
The operating unit is also used to respond the operation signal and opens the encryption folder so as to user's access encryption text
Application software in part folder.
7. data encryption system as claimed in claim 6, it is characterised in that: the data encryption system further includes that installation is single
Member;
The installation unit is used to install new application software for the terminal and generates installation letter when installing new application software
Number;
The output unit is also used to respond installation signal pop-up selection dialog box, and the selection dialog box will ask user to new
Whether the application software of installation, which needs to encrypt, is selected;
The operating unit is also used in selection result be that the application software newly installed will newly be installed using soft when needing to encrypt
Part is put into the encryption folder.
8. data encryption system as claimed in claim 7, it is characterised in that: the operating unit be also used to be in selection result
The access icon for the application software newly installed is placed directly in the user interface when application software newly installed does not need encryption
On.
9. data encryption system as claimed in claim 8, it is characterised in that: the operating unit is also used to according to user demand
The application software that will no longer be required to encryption removes corresponding encryption folder.
10. data encryption system as claimed in claim 9, it is characterised in that: if user's mistake when installing application software
Choose whether to encrypt or selected the encryption folder of mistake, it can be by using the application software newly installed as having pacified
The application software of dress carries out being movable into and out corresponding encryption folder to be remedied by the operating unit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811342429.3A CN109492417A (en) | 2018-11-13 | 2018-11-13 | Data ciphering method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811342429.3A CN109492417A (en) | 2018-11-13 | 2018-11-13 | Data ciphering method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109492417A true CN109492417A (en) | 2019-03-19 |
Family
ID=65694312
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811342429.3A Pending CN109492417A (en) | 2018-11-13 | 2018-11-13 | Data ciphering method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109492417A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113360875A (en) * | 2021-06-15 | 2021-09-07 | 读书郎教育科技有限公司 | Method for realizing student flat main interface management and control function |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103338445A (en) * | 2013-06-19 | 2013-10-02 | 深圳市垦鑫达科技有限公司 | File encryption and decryption method and system |
CN103488918A (en) * | 2013-09-18 | 2014-01-01 | 广东欧珀移动通信有限公司 | Application encrypting method and device for intelligent terminal |
CN104252605A (en) * | 2014-09-17 | 2014-12-31 | 南京信息工程大学 | Method and system for file transparent encryption and decryption of Android platform |
CN105678186A (en) * | 2016-01-05 | 2016-06-15 | 上海卓易科技股份有限公司 | Information encryption method and device |
CN106022148A (en) * | 2016-05-26 | 2016-10-12 | 北京金山安全软件有限公司 | File encryption method and device |
-
2018
- 2018-11-13 CN CN201811342429.3A patent/CN109492417A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103338445A (en) * | 2013-06-19 | 2013-10-02 | 深圳市垦鑫达科技有限公司 | File encryption and decryption method and system |
CN103488918A (en) * | 2013-09-18 | 2014-01-01 | 广东欧珀移动通信有限公司 | Application encrypting method and device for intelligent terminal |
CN104252605A (en) * | 2014-09-17 | 2014-12-31 | 南京信息工程大学 | Method and system for file transparent encryption and decryption of Android platform |
CN105678186A (en) * | 2016-01-05 | 2016-06-15 | 上海卓易科技股份有限公司 | Information encryption method and device |
CN106022148A (en) * | 2016-05-26 | 2016-10-12 | 北京金山安全软件有限公司 | File encryption method and device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113360875A (en) * | 2021-06-15 | 2021-09-07 | 读书郎教育科技有限公司 | Method for realizing student flat main interface management and control function |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102638447B (en) | Method and device for system login based on autonomously generated password of user | |
CN102203795B (en) | Authentication - circles of trust | |
CN103793636B (en) | A kind of method of equipment and protection equipment privacy | |
JP3967322B2 (en) | Password input device, password input method, and program for causing computer to execute the method | |
KR20060063647A (en) | User authentication by combining speaker verification and reverse turing test | |
CN105981423A (en) | Method and apparatus for transmitting and receiving encrypted message between terminals | |
CN105447927B (en) | Control method, access controller and the access control system that gate inhibition's electric lock is opened | |
US10664585B2 (en) | Authentication using multiple mobile devices | |
CN105429761A (en) | Key generation method and device | |
US11695748B2 (en) | Sharing authentication between applications | |
CN107644172A (en) | The guard method of content displaying and device | |
CN106484231A (en) | A kind of method and device of application hides | |
CN110140336A (en) | Consecutive password technology | |
KR101804182B1 (en) | Online financial transactions, identity authentication system and method using real cards | |
CN106648583A (en) | Information processing method and terminal | |
McCarney | Password managers: Comparative evaluation, design, implementation and empirical analysis | |
CN106650513A (en) | Recommendation method and device of password inputting modes | |
CN109492417A (en) | Data ciphering method and system | |
CN105022965B (en) | A kind of data ciphering method and device | |
US7715560B2 (en) | Systems and methods for hiding a data group | |
CN106651352A (en) | Paying method and device based on near field communication | |
CN108345783A (en) | One mode switching method and equipment | |
Renaud et al. | ACCESS: Describing and Contrasting: Authentication Mechanisms | |
CN108280330A (en) | Data output method and system | |
KR20060098412A (en) | Timely variable password formation module and a floating password application method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190319 |