CN109492417A - Data ciphering method and system - Google Patents

Data ciphering method and system Download PDF

Info

Publication number
CN109492417A
CN109492417A CN201811342429.3A CN201811342429A CN109492417A CN 109492417 A CN109492417 A CN 109492417A CN 201811342429 A CN201811342429 A CN 201811342429A CN 109492417 A CN109492417 A CN 109492417A
Authority
CN
China
Prior art keywords
encryption
application software
user
folder
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811342429.3A
Other languages
Chinese (zh)
Inventor
汪黎箫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201811342429.3A priority Critical patent/CN109492417A/en
Publication of CN109492417A publication Critical patent/CN109492417A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

A kind of data ciphering method includes the following steps: to establish encryption folder at the terminal;To the encryption folder, password is set;The application software for needing to encrypt is moved into the encryption folder;Judge whether user needs to access the encryption folder;Output password input frame is to ask user to input password;Judge whether the password of user's input is correct;And the encryption folder is opened so as to the application software in user the accesses encryption folder.In this way, the application software that the Games Software etc. of mobile phone can be unfavorable for child's study by parent is put into the encryption folder, and the application software that learning software etc. is conducive to child's study is placed directly in user interface, realizes the classification control of the application software.To which while parent's normal use mobile phone, mobile phone study is also can be used normally without being influenced by Games Software etc. in child, and the way to manage of hand-set data limitation access is than hommization.In addition, the present invention also provides a kind of data encryption systems.

Description

Data ciphering method and system
Technical field
The present invention relates to data encryption more particularly to a kind of data ciphering method that can be applied to mobile terminal and it is System.
Background technique
With becoming stronger day by day for mobile terminal such as cell-phone function, the application software of mobile phone installation is also more and more.It is above-mentioned to answer It include financial instrument, Games Software, software of doing shopping, learning software and playout software etc. with software.Many works of present child Industry needs to complete by learning software, but many children can steal when by the learning software on mobile phone to fulfil assignment Game is played using Games Software steathily, in this way, mobile phone also brings many disadvantages while bringing study convenient to child.
In addition, user is there are also the data such as bank for comparing privacy, the privacies such as Alipay or private chat tool compared with Strong software, it is also desirable to which further setting secrecy avoids mobile phone at other people in use, touching these information easily.
Currently, being completed mostly by cryptoguard for the method for hand-set data limitation access.But as long as user is defeated The password entered is correct, all application software in the accessible mobile phone of user.If the password bad of input, user cannot Access any application software in mobile phone.The way to manage of hand-set data limitation access is more stiff, not humanized enough.
Summary of the invention
In view of this, it is necessary to provide a kind of more humane data ciphering methods.
In addition, also providing a kind of more humane data encryption system.
A kind of data ciphering method comprising following steps:
Encryption folder is established at the terminal;
To the encryption folder, password is set;
The application software for needing to encrypt is moved into the encryption folder;
Judge whether user needs to access the encryption folder;
Output password input frame is to ask user to input password;
Judge whether the password of user's input is correct;And
The encryption folder is opened so as to the application software in user the accesses encryption folder.
In a further embodiment, the data ciphering method further includes following steps:
Select whether the application software newly installed needs to encrypt;And
If selection result is that the application software newly installed needs to encrypt, the application software newly installed is put into the encryption text In part folder.
In a further embodiment, the data ciphering method further includes following steps:
If selection result is that the application software newly installed does not need to encrypt, and the access icon for the application software newly installed is straight It connects and puts on a user interface.
In a further embodiment, the data ciphering method further includes following steps:
Application software is removed into corresponding encryption folder according to the demand of user.
In a further embodiment, described to add to described if establishing multiple encryption folders in the terminal The step of ciphertext part sandwiched sets password can be set to the step of different passwords are arranged for multiple encryption folders one by one.
A kind of data encryption system comprising user interface, create unit, encryption unit, operating unit, output unit and Judging unit;
The user interface shows the access icon of the access icon and application software of encryption folder;
The newly-built unit in establishing encryption folder at the terminal;
The encryption unit is used to that password to be arranged to the encryption folder;
The operating unit is used to that the application software for needing to encrypt to be moved into the encryption folder according to user demand;
The judging unit is user's needs in judging result for judging whether user needs to access the encryption folder Calling-on signal is generated when accessing the encryption folder;
The output unit asks user to input password for responding the calling-on signal output password input frame;
The judging unit is also used to judge whether the password of user's input is correct and is the password that user inputs in judging result Operation signal is generated when correct;
The operating unit is also used to respond the operation signal and opens the encryption folder so as to user's access encryption text Application software in part folder.
In a further embodiment, the data encryption system further includes installation unit;
The installation unit is used to install new application software for the terminal and generates installation letter when installing new application software Number;
The output unit is also used to respond installation signal pop-up selection dialog box, and the selection dialog box will ask user to new Whether the application software of installation, which needs to encrypt, is selected;
The operating unit is also used in selection result be that the application software newly installed will newly be installed using soft when needing to encrypt Part is put into the encryption folder.
In a further embodiment, the operating unit is also used in selection result be that the application software newly installed is not required to The access icon for the application software newly installed is placed directly in the user interface when encrypting.
In a further embodiment, the operating unit is also used to will no longer be required to the application of encryption according to user demand Software removes corresponding encryption folder.
In a further embodiment, if whether user's wrong choice when installing application software encrypts or select The encryption folder of mistake, can be by passing through the behaviour for the application software newly installed as installed application software It carries out being movable into and out corresponding encryption folder as unit to be remedied.
Using data ciphering method provided by the invention and system, the Games Software etc. of mobile phone can be unfavorable for child by parent The application software of son study is put into the encryption folder, and the application software that learning software etc. is conducive to child's study is directly put On a user interface, the classification control of the application software is realized.To, while parent's normal use mobile phone, Hai Ziye Mobile phone study can be used normally without being influenced by Games Software etc., the way to manage of hand-set data limitation access compares human nature Change.
Detailed description of the invention
Fig. 1 is the flow chart of the data ciphering method of one embodiment of the present invention.
Fig. 2 is the schematic diagram of the function of the data encryption system of one embodiment of the present invention.
The present invention that the following detailed description will be further explained with reference to the above drawings.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Unless otherwise defined, all technical and scientific terms used herein and belong to technical field of the invention The normally understood meaning of technical staff is identical.Term as used herein in the specification of the present invention is intended merely to description tool The purpose of the embodiment of body, it is not intended that in the limitation present invention.Term " and or " used herein includes one or more phases Any and all combinations of the listed item of pass.
With reference to the accompanying drawing, it elaborates to data ciphering method provided by the invention and system.
Referring to Fig. 1, the present invention provides a kind of data ciphering method.The data ciphering method can be used for terminal and to the end Data in end is encrypted, can data in a manner of more humanized in the restricting user access terminal.At this In embodiment, which can be mobile phone, which can be the application software of installation in mobile phone.It is commonly installed in the terminal Application software generally include financial instrument, Games Software, software of doing shopping, learning software and playout software etc., but simultaneously not only limit In this.The data ciphering method includes the following steps.
Step S101, establishes encryption folder on the terminal.The access icon of the encryption folder is shown in the terminal User interface on, so that user can access at any time.The quantity of encryption folder herein according to the demand of user depending on, can To be set as one or more.
Password is arranged to the encryption folder in step S103.If the quantity of encryption folder be it is multiple, it is multiple plus Close file can be set as different passwords one by one, distinguish the application software in the control terminal convenient for user.
The application software for needing to encrypt is moved into the encryption folder by step S105.In the present embodiment, Yong Huke To be moved into such a way that the access icon of dragging application software is into corresponding encryption folder.Accordingly, user can also be with The application software for not needing encryption is removed into the encryption folder by way of dragging.
Above step S101 to S105 is the cryptographic operation carried out for application software installed in the terminal.Under Face step S107 to S111 is the encrypting step carried out for the software for newly installing application in the terminal.
Step S107, selects whether the application software newly installed needs to encrypt.If selection result is the application newly installed Software needs to encrypt, then enters step S109, if selection result is that the application software newly installed does not need to encrypt, enters step Rapid S111.
The application software newly installed is put into the encryption folder by step S109.Certainly, there are multiple encryption files In the case where folder, the encryption folder that the application software newly installed need to be put into can be selected by the user.
The access icon for the application software newly installed is placed directly in user interface by step S111.It is to be appreciated that such as In step S107, whether the wrong choice into S109 encrypts or has selected wrong encryption folder to fruit user, can pass through Step S101 to S105 is remedied the application software newly installed as installed application software.
Step S113, judges whether user needs to access the encryption folder.If a determination be made that user needs to visit It asks the encryption folder, then enters step S115.If a determination be made that user does not need to access the encryption folder, then Process terminates.Usually judge the access figure whether user needs to access the mode of the encryption folder for the encryption folder Whether mark by user carries out specific operation.It is to be appreciated that specific operation herein can be clicked, double-click and slide etc..
Step S115, output password input frame is to ask user to input password.
Step S117 judges whether the password of user's input is correct.If a determination be made that the password of user's input is correct, Then enter step S119.If a determination be made that the password bad of user's input, then process terminates.
Step S119 opens the encryption folder so as to the application software in user the accesses encryption folder.This Sample, the application software that the Games Software etc. of mobile phone can be unfavorable for child's study by parent are put into the encryption folder, and incite somebody to action The application software that learning software etc. is conducive to child's study is placed directly in user interface, realizes the classification pipe of the application software System.To which while parent's normal use mobile phone, mobile phone study is also can be used normally without by Games Software etc. in child It influences, the way to manage of hand-set data limitation access is than hommization.
In other embodiments, which can also include the following steps: answer according to the demand of user Corresponding encryption folder is removed with software.The step will be in the case where the application software need to encrypt, convenient for using Manage the application software in the terminal in family.
Referring to Fig. 2, the present invention also provides a kind of data encryption systems 99.The data encryption system can be used for terminal and right Data in the terminal is encrypted, can data in a manner of more humanized in the restricting user access terminal. In the present embodiment, which can be mobile phone, which can be the application software of installation in mobile phone.The data encryption System 99 includes user interface 10, newly-built unit 20, encryption unit 30, operating unit 40, input unit 50, installation unit 60, Output unit 70 and judging unit 80.
User interface 10 is the medium of user and the interaction of data encryption system 99.Encryption file is shown in user interface 10 The access icon of the access icon and application software 14 of folder 12.User can pass through the access icon of encryption folder 12 and application The access icon of software 14 accesses encryption folder 12 and application software 14 respectively.Application software 14 is to be typically mounted on the terminal On financial instrument, Games Software, do shopping software, learning software and playout software etc., but not limited to this.It is to be appreciated that answering It uses software 14 that can also be put into encryption folder 12 and accesses project as the next stage in encryption folder 12.
Newly-built unit 20 for establishing encryption folder 12 on the terminal.As described above, the access of encryption folder 12 Icon is shown in the user interface 10 of the terminal, so that user can access at any time.The quantity of encryption folder 12 herein Depending on according to the demand of user, one or more can be set to.
Encryption unit 30 is used to that password to be arranged to encryption folder 12.If the quantity of encryption folder be it is multiple, this is more A encryption folder can be set as different passwords one by one, distinguish the application software 14 in the control terminal convenient for user.
Operating unit 40 is used to that the application software 14 for needing to encrypt to be moved into encryption folder 12 according to user demand.It is corresponding Ground, the application software 14 that operating unit 40 can also will no longer be required to encryption according to user demand remove corresponding encryption file Folder 12.In the present embodiment, user can use the access icon of dragging application software 14 to corresponding encryption folder 12 In mode move into.Accordingly, if user needs application software 14 to remove corresponding encryption folder 12, can use will be answered It can with the mode that software 14 hauls out corresponding encryption folder.Above-mentioned user demand can be inputted by input unit 50, when So, in the present embodiment, user can drag application software 14 by input unit 50 come the position of mobile application software 14.
Installation unit 60 is used to install new application software 14 for the terminal.Installation unit 60 is also used to installing new answer With generation installation signal when software 14 and the installation signal is sent to output unit 70.
Output unit 70 is for responding installation signal pop-up selection dialog box.The selection dialog box will ask user to installation Whether the application software 14 that unit 60 is newly installed, which needs to encrypt, is selected.User carries out selection behaviour by input unit 50 Make.If selection result is that the application software 14 that installation unit 60 is newly installed needs to encrypt, operating unit 40 will be installed newly Application software 14 be put into the encryption folder 12.If selection result is the application software that installation unit 60 is newly installed 14 do not need to encrypt, then the access icon for the application software 14 newly installed is placed directly in user interface 10 by operating unit 40. Certainly, in the case where there are multiple encryption folder 12, the application newly installed can be selected by input unit 50 by user The encryption folder 12 that software 14 need to be put into.
It is to be appreciated that if whether user's wrong choice when installing application software 14 encrypts or has selected mistake Encryption folder 12, can be single by operation as installed application software 14 by the application software 14 that will newly install Member 40 carries out being movable into and out corresponding encryption folder 14 to be remedied.
Judging unit 80 is for judging whether user needs to access encryption folder 12.Whether judging unit 80 judges user The mode for needing to access encryption folder is the access icon for judging user and whether passing through input unit 50 to encryption folder 12 Carry out specific operation.It is to be appreciated that specific operation herein can be clicked, double-click and slide etc..If it is judged that It is that user needs to access encryption folder 12, then generates calling-on signal and the calling-on signal is sent to output unit 70.
Output unit 70 is also used to respond the calling-on signal output password input frame to ask user to input password.User passes through Input unit 50 carries out Password Input operation.
Judging unit 80 is also used to judge whether the password of user's input is correct.If it is determined that the judging result of unit 80 is The password of user's input is correct, then generates operation signal and the operation signal is sent to operating unit 40.
Operating unit 40 responds the operation signal and opens encryption folder 12 so that user accesses in encryption folder 12 Application software 14.For example, to control child plays game, the Games Software etc. of mobile phone can be unfavorable for answering for child's study by parent It is put into encryption folder 12 with software 14, and the application software 14 that learning software etc. is conducive to child's study is placed directly in user circle On face 10, the classification control of application software 14 is realized.To which while parent's normal use mobile phone, child can also be normal Learnt using mobile phone without being influenced by Games Software etc., the way to manage of hand-set data limitation access is than hommization.Equally, it is It protects individual privacy preferably, it is soft that Private Banking, personal information etc. can also be related to the personal important application for falling into private Part, which is put into, to be added in secret file.User can according to each one demand, add at any time or cancel certain application software to plus glyphed part In folder, it is also possible to which multiple plus secret file is arranged, the document classification for being intended to encryption is not put into corresponding different information kit In.
In addition, for those of ordinary skill in the art, can make in accordance with the technical idea of the present invention other each Kind changes and modifications, and all these changes and deformation all should belong to the protection scope of the claims in the present invention.

Claims (10)

1. a kind of data ciphering method comprising following steps:
Encryption folder is established at the terminal;
To the encryption folder, password is set;
The application software for needing to encrypt is moved into the encryption folder;
Judge whether user needs to access the encryption folder;
Output password input frame is to ask user to input password;
Judge whether the password of user's input is correct;And
The encryption folder is opened so as to the application software in user the accesses encryption folder.
2. data ciphering method as described in claim 1, it is characterised in that: the data ciphering method further includes walking as follows It is rapid:
Select whether the application software newly installed needs to encrypt;And
If selection result is that the application software newly installed needs to encrypt, the application software newly installed is put into the encryption text In part folder.
3. data ciphering method as claimed in claim 2, it is characterised in that: the data ciphering method further includes walking as follows It is rapid:
If selection result is that the application software newly installed does not need to encrypt, and the access icon for the application software newly installed is straight It connects and puts on a user interface.
4. data ciphering method as described in claim 1, it is characterised in that: the data ciphering method further includes walking as follows It is rapid:
Application software is removed into corresponding encryption folder according to the demand of user.
5. data ciphering method as described in claim 1, it is characterised in that: if establishing multiple encryption texts in the terminal Part presss from both sides, then the step of setting password to the encryption folder can be set to be arranged not for multiple encryption folders one by one With password the step of.
6. a kind of data encryption system comprising user interface creates unit, encryption unit, and operating unit and is sentenced output unit Disconnected unit;
The user interface shows the access icon of the access icon and application software of encryption folder;
The newly-built unit in establishing encryption folder at the terminal;
The encryption unit is used to that password to be arranged to the encryption folder;
The operating unit is used to that the application software for needing to encrypt to be moved into the encryption folder according to user demand;
The judging unit is user's needs in judging result for judging whether user needs to access the encryption folder Calling-on signal is generated when accessing the encryption folder;
The output unit asks user to input password for responding the calling-on signal output password input frame;
The judging unit is also used to judge whether the password of user's input is correct and is the password that user inputs in judging result Operation signal is generated when correct;
The operating unit is also used to respond the operation signal and opens the encryption folder so as to user's access encryption text Application software in part folder.
7. data encryption system as claimed in claim 6, it is characterised in that: the data encryption system further includes that installation is single Member;
The installation unit is used to install new application software for the terminal and generates installation letter when installing new application software Number;
The output unit is also used to respond installation signal pop-up selection dialog box, and the selection dialog box will ask user to new Whether the application software of installation, which needs to encrypt, is selected;
The operating unit is also used in selection result be that the application software newly installed will newly be installed using soft when needing to encrypt Part is put into the encryption folder.
8. data encryption system as claimed in claim 7, it is characterised in that: the operating unit be also used to be in selection result The access icon for the application software newly installed is placed directly in the user interface when application software newly installed does not need encryption On.
9. data encryption system as claimed in claim 8, it is characterised in that: the operating unit is also used to according to user demand The application software that will no longer be required to encryption removes corresponding encryption folder.
10. data encryption system as claimed in claim 9, it is characterised in that: if user's mistake when installing application software Choose whether to encrypt or selected the encryption folder of mistake, it can be by using the application software newly installed as having pacified The application software of dress carries out being movable into and out corresponding encryption folder to be remedied by the operating unit.
CN201811342429.3A 2018-11-13 2018-11-13 Data ciphering method and system Pending CN109492417A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811342429.3A CN109492417A (en) 2018-11-13 2018-11-13 Data ciphering method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811342429.3A CN109492417A (en) 2018-11-13 2018-11-13 Data ciphering method and system

Publications (1)

Publication Number Publication Date
CN109492417A true CN109492417A (en) 2019-03-19

Family

ID=65694312

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811342429.3A Pending CN109492417A (en) 2018-11-13 2018-11-13 Data ciphering method and system

Country Status (1)

Country Link
CN (1) CN109492417A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113360875A (en) * 2021-06-15 2021-09-07 读书郎教育科技有限公司 Method for realizing student flat main interface management and control function

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103338445A (en) * 2013-06-19 2013-10-02 深圳市垦鑫达科技有限公司 File encryption and decryption method and system
CN103488918A (en) * 2013-09-18 2014-01-01 广东欧珀移动通信有限公司 Application encrypting method and device for intelligent terminal
CN104252605A (en) * 2014-09-17 2014-12-31 南京信息工程大学 Method and system for file transparent encryption and decryption of Android platform
CN105678186A (en) * 2016-01-05 2016-06-15 上海卓易科技股份有限公司 Information encryption method and device
CN106022148A (en) * 2016-05-26 2016-10-12 北京金山安全软件有限公司 File encryption method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103338445A (en) * 2013-06-19 2013-10-02 深圳市垦鑫达科技有限公司 File encryption and decryption method and system
CN103488918A (en) * 2013-09-18 2014-01-01 广东欧珀移动通信有限公司 Application encrypting method and device for intelligent terminal
CN104252605A (en) * 2014-09-17 2014-12-31 南京信息工程大学 Method and system for file transparent encryption and decryption of Android platform
CN105678186A (en) * 2016-01-05 2016-06-15 上海卓易科技股份有限公司 Information encryption method and device
CN106022148A (en) * 2016-05-26 2016-10-12 北京金山安全软件有限公司 File encryption method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113360875A (en) * 2021-06-15 2021-09-07 读书郎教育科技有限公司 Method for realizing student flat main interface management and control function

Similar Documents

Publication Publication Date Title
CN102638447B (en) Method and device for system login based on autonomously generated password of user
CN102203795B (en) Authentication - circles of trust
CN103793636B (en) A kind of method of equipment and protection equipment privacy
JP3967322B2 (en) Password input device, password input method, and program for causing computer to execute the method
KR20060063647A (en) User authentication by combining speaker verification and reverse turing test
CN105981423A (en) Method and apparatus for transmitting and receiving encrypted message between terminals
CN105447927B (en) Control method, access controller and the access control system that gate inhibition's electric lock is opened
US10664585B2 (en) Authentication using multiple mobile devices
CN105429761A (en) Key generation method and device
US11695748B2 (en) Sharing authentication between applications
CN107644172A (en) The guard method of content displaying and device
CN106484231A (en) A kind of method and device of application hides
CN110140336A (en) Consecutive password technology
KR101804182B1 (en) Online financial transactions, identity authentication system and method using real cards
CN106648583A (en) Information processing method and terminal
McCarney Password managers: Comparative evaluation, design, implementation and empirical analysis
CN106650513A (en) Recommendation method and device of password inputting modes
CN109492417A (en) Data ciphering method and system
CN105022965B (en) A kind of data ciphering method and device
US7715560B2 (en) Systems and methods for hiding a data group
CN106651352A (en) Paying method and device based on near field communication
CN108345783A (en) One mode switching method and equipment
Renaud et al. ACCESS: Describing and Contrasting: Authentication Mechanisms
CN108280330A (en) Data output method and system
KR20060098412A (en) Timely variable password formation module and a floating password application method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190319