CN110443056A - Data ciphering method, terminal and computer readable storage medium - Google Patents

Data ciphering method, terminal and computer readable storage medium Download PDF

Info

Publication number
CN110443056A
CN110443056A CN201910742578.7A CN201910742578A CN110443056A CN 110443056 A CN110443056 A CN 110443056A CN 201910742578 A CN201910742578 A CN 201910742578A CN 110443056 A CN110443056 A CN 110443056A
Authority
CN
China
Prior art keywords
data
memory space
secret
secret memory
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910742578.7A
Other languages
Chinese (zh)
Inventor
李如森
张建静
黎小松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Taihengnuo Technology Co Ltd
Original Assignee
Shenzhen Taihengnuo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Taihengnuo Technology Co Ltd filed Critical Shenzhen Taihengnuo Technology Co Ltd
Priority to CN201910742578.7A priority Critical patent/CN110443056A/en
Publication of CN110443056A publication Critical patent/CN110443056A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of data ciphering method, the data ciphering method constructs secret memory space the following steps are included: receiving data encryption request or the setting request of secret memory space.Invention additionally discloses a kind of terminal and computer readable storage mediums.The invention avoids the wastes of terminal storage resource.

Description

Data ciphering method, terminal and computer readable storage medium
Technical field
The present invention relates to field of data encryption more particularly to a kind of data ciphering method, terminal and computer-readable deposit Storage media.
Background technique
It improves with the continuous development of society, intelligentized terminal becomes essential office in people's daily life and uses Product or daily necessity.
Social communication information, the job information etc. of people can be stored in terminal, these information are the private information of people, people Have the demand for protecting private information not divulge a secret.
In the prior art, terminal establishes secret memory space in advance, occupies the memory of terminal, wastes depositing for terminal Store up resource.
Above content is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that above content is existing skill Art.
Summary of the invention
The main purpose of the present invention is to provide a kind of data ciphering method, terminal and computer readable storage medium, Aim to solve the problem that the storage resource of terminal has waste.
In order to achieve the above object, the present invention provides a kind of data ciphering method, and the data ciphering method includes following Step:
Data encryption request or the setting request of secret memory space are being received, secret memory space is constructed.
In one embodiment, the step of building secret memory space includes:
Determine the attribute of secret memory space storing data to be built;
Construct the corresponding secret memory space of the attribute.
In one embodiment, the attribute includes using belonging to size of data, data type, data encryption grade and data At least one of the identity at family.
In one embodiment, after the step of building secret memory space, further includes:
It determines data to be encrypted, and the data is stored to the secret memory space.
In one embodiment, after the step of building attribute corresponding secret memory space, further includes:
Determine the attribute of data to be encrypted;
The data are stored to secret memory space corresponding with the attribute.
In one embodiment, after described the step of storing the data to the secret memory space, further includes:
After detecting that the data complete storage, the corresponding former memory space of the data is determined;
The data are deleted in the former memory space.
In one embodiment, after the step of building secret memory space, further includes:
Determine the corresponding user information of the secret memory space;
The user information is associated with the secret memory space.
In one embodiment, it after described the step of being associated with the user information with the secret memory space, also wraps It includes:
When receiving user's login secret memory space request, the identification information and the secret of the user are obtained The associated user information of memory space;
When the identification information matches the user information, the storage interface of the secret memory space is shown.
In one embodiment, after the step of storage interface of the display secret memory space, further includes:
When receiving the data removal request based on storage interface, the target data removed is determined;
The target data is stored into former memory space corresponding to the target data, and by the secret memory space In the target data delete.
In one embodiment, after the step of target data by the secret memory space is deleted, also Include:
Determine the remaining amount of storage or storage data quantity of the secret memory space;
It is greater than or equal to the first preset stored amount in the remaining amount of storage or the storage data quantity is less than or equal to the Two preset stored amounts delete the secret memory space.
To achieve the above object, the present invention also provides a kind of data encryption terminal, the data encryption terminal includes processing Device, memory and it is stored in the data encryption program that can be run on the memory and on the processor, the data add The step of close program realizes data ciphering method as described above when being executed by the processor.
To achieve the above object, the present invention also provides a kind of computer readable storage medium, the computer-readable storages Data encryption program is stored on medium, the data encryption program realizes data encryption as described above when being executed by processor The step of method.
Data ciphering method, terminal and computer readable storage medium provided by the invention, terminal are receiving data When CIPHERING REQUEST or private space setting request, secret memory space is constructed, the practical need according to user are enabled the terminal to Creation secret memory space is sought, the storage resource of waste terminal is avoided.
Detailed description of the invention
Detailed description of the invention is used to provide further understanding of the present invention, and constitutes part of specification, with the present invention Embodiment be used to explain the present invention together, be not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the hardware structural diagram for the terminal that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of data ciphering method first embodiment of the present invention;
Fig. 3 is the flow diagram of data ciphering method second embodiment of the present invention;
Fig. 4 is the flow diagram of data ciphering method 3rd embodiment of the present invention;
Fig. 5 is the flow diagram of data ciphering method fourth embodiment of the present invention;
Fig. 6 is the flow diagram of the 5th embodiment of data ciphering method of the present invention;
Fig. 7 is the flow diagram of data ciphering method sixth embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Since in the prior art, terminal establishes secret memory space in advance, the memory of terminal is occupied, terminal is wasted Storage resource.
The present invention provides a solution, and terminal is receiving data encryption request or private space setting request When, secret memory space is constructed, enables the terminal to create secret memory space according to the actual demand of user, avoids waste eventually The storage resource at end.
As shown in Figure 1, Fig. 1 is that the embodiment of the present invention is related to the hardware structural diagram of terminal.
Referring to Fig.1, terminal may include: processor 1001, such as CPU, memory 1002, communication bus 1003, network Interface 1004.Wherein, communication bus 1003 is for realizing the connection communication between each building block in the terminal.Network interface 1004 may include optionally standard wireline interface and wireless interface (such as WI-FI interface).Memory 1002 can be high speed RAM memory is also possible to stable memory (non-volatile memory), such as magnetic disk storage.Memory 1002 It optionally can also be the storage terminal independently of aforementioned processor 1001.As shown in Figure 1, as a kind of computer storage medium Memory 1002 in may include operating system, network communication module and data encryption program.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 1, can wrap It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
In hardware involved in terminal shown in Fig. 1, network interface 1004 can be used for receiving the data of user's transmission CIPHERING REQUEST or the setting request of secret memory space;And processor 1001 can be used for calling the number stored in memory 1002 According to encipheror, and execute following operation:
Data encryption request or the setting request of secret memory space are being received, secret memory space is constructed.
In one embodiment, processor 1001 can be used for calling the contact person's encipheror stored in memory 1002, Also execute following operation:
Determine the attribute of secret memory space storing data to be built;
Construct the corresponding secret memory space of the attribute.
In one embodiment, processor 1001 can be used for calling the contact person's encipheror stored in memory 1002, Also execute following operation:
The attribute includes the identity of size of data, data type, data encryption grade and data owning user At least one of.
In one embodiment, processor 1001 can be used for calling the contact person's encipheror stored in memory 1002, Also execute following operation:
It determines data to be encrypted, and the data is stored to the secret memory space.
In one embodiment, processor 1001 can be used for calling the contact person's encipheror stored in memory 1002, Also execute following operation:
Determine the attribute of data to be encrypted;
The data are stored to secret memory space corresponding with the attribute.
In one embodiment, processor 1001 can be used for calling the contact person's encipheror stored in memory 1002, Also execute following operation:
After detecting that the data complete storage, the corresponding former memory space of the data is determined;
The data are deleted in the former memory space.
In one embodiment, processor 1001 can be used for calling the contact person's encipheror stored in memory 1002, Also execute following operation:
Determine the corresponding user information of the secret memory space;
The user information is associated with the secret memory space.
In one embodiment, processor 1001 can be used for calling the contact person's encipheror stored in memory 1002, Also execute following operation:
When receiving user's login secret memory space request, the identification information and the secret of the user are obtained The associated user information of memory space;
When the identification information matches the user information, the storage interface of the secret memory space is shown.
In one embodiment, processor 1001 can be used for calling the contact person's encipheror stored in memory 1002, Also execute following operation:
When receiving the data removal request based on storage interface, the target data removed is determined;
The target data is stored into former memory space corresponding to the target data, and by the secret memory space In the target data delete.
In one embodiment, processor 1001 can be used for calling the contact person's encipheror stored in memory 1002, Also execute following operation:
Determine the remaining amount of storage or storage data quantity of the secret memory space;
It is greater than or equal to the first preset stored amount in the remaining amount of storage or the storage data quantity is less than or equal to the Two preset stored amounts delete the secret memory space.
Based on the hardware architecture of above-mentioned terminal, each embodiment of data ciphering method of the present invention is proposed.
Referring to Fig. 2, Fig. 2 is the first embodiment of data ciphering method of the present invention, and the data ciphering method includes:
Step S10, when receiving data encryption request or the setting request of secret memory space, building secret storage is empty Between.
In the present embodiment, executing subject is terminal, and terminal includes but is not limited to mobile terminal, computer, tablet computer.It needs The data to be encrypted can be the data in other terminals, the data being also possible in terminal.
Data can be picture, contact information, video etc., and contact information includes vCard (electronic business card).User can The selected data for needing to encrypt issue data encryption request, specifically, can pop up the prompt whether encrypted after user's selected data Information, user can be determined operation based on the prompt information, to issue data encryption request.Further, user can be with Selection is used for the terminal of encryption data, for the terminal communication connection where the terminal and data of encryption data, communication connection packet Include but be not limited to hot spot connection, bluetooth connection etc..Terminal constructs secret memory space, makes when receiving data encryption request Obtain the data that the storage of secret memory space needs to encrypt.The size of data that the amount of storage of secret memory space encrypts as needed into Row determines, namely guarantees that the amount of storage of the secret memory space of building is greater than or equal to the data volume for needing the data encrypted.Into One step, there are multiple secrets for being stored with encryption data in the data namely terminal that the storage of secret memory space needs to encrypt Memory space, terminal can merge already present secret memory space with the secret memory space of creation, or directly to having deposited Secret memory space carry out amount of storage expansion;And terminal can determine according to the attribute for the data for currently needing to encrypt The attribute of the data stored in the existing secret memory space that existing private space namely terminal determine and current needs add Close data attribute is identical, and the attribute of data includes size of data, data encryption grade, data type and data owning user Identity, identity can be at least one of the title of user, identity card, number, image.
Terminal is additionally provided with the setting function of secret memory space, after terminal starts the setting function, pop-up setting circle Face, user can send the setting request of secret memory space based on the setting button in set interface.User is settable to be needed to construct Secret memory space amount of storage and secret memory space storage data attribute so that secret memory space is only capable of storing The corresponding data of the attribute of setting.
In technical solution provided in this embodiment, terminal receive data encryption request or private space setting ask When asking, secret memory space is constructed, enables the terminal to create secret memory space according to the actual demand of user, avoids wasting The storage resource of terminal.
It is the second embodiment of data ciphering method of the present invention referring to Fig. 3, Fig. 3, is based on first embodiment, the step S10 includes:
Step S11 determines the attribute of secret memory space storing data to be built;
Step S11 constructs the corresponding secret memory space of the attribute.
In the present embodiment, user, can be to need when sending data encryption request or the setting request of secret memory space The attribute of storable data is arranged in the secret memory space to be constructed, so that the secret memory space of terminal building only allows to deposit Store up the data of attributes match corresponding with secret memory space.For example, the data encryption grade of secret memory space is 5 grades, that The data that data space storage data encryption grade is 5 grades.
In addition, the data that terminal can also request corresponding needs to encrypt according to data encryption determine that secret to be built is deposited The attribute of space storing data is stored up, namely the attribute and the attribute one of the data of secret memory space storage of the data for needing to encrypt It causes, so that only storage data encryption requests corresponding data to the secret memory space of building.
User is also settable to store the application program that data will be also generated to the data source of secret memory space and private Close memory space association, so that secret memory space stores the data that associated application program generates, for example, user is by QQ software It is associated with secret memory space, so that the conversation content that secret memory space storage QQ is generated.It is also possible to provide keyword, eventually End after detecting keyword, can by corresponding to keyword content and the corresponding contact information of the content directly store to Secret memory space, for example, can be in some and associated application program setting secrecy keyword " the trouble secrecy of secret memory space The following contents ", terminal detect the secrecy keyword after opening the application program, automatically will be located at secrecy keyword with Under content store to secret memory space;And settable corresponding suspension keyword " stopping secrecy ", so that secret storage is empty Between stop store the application program generate content.
Further, for terminal when constructing secret memory space, the write-in permission of settable secret memory space reads power Limit and deletion permission.Write-in permission is opened when the attribute attribute corresponding with secret memory space for needing the data stored is consistent It opens, is closed after data storage;The reading permission of secret memory space can be associated preservation with the user information of user, User information can be the information such as identity card, image, title, telephone number, QQ number, the mail address of user, read permission one As be close, when needing to open, verified, namely obtain need to read data user user information, then will The user information of acquisition is compared with the associated user information of secret memory space, if unanimously, then opening reading permission, In User exits secret memory space and turns off reading permission;Similarly, delete permission with reading the setting principle of permission it is consistent, with It when family needs the data to secret memory space to delete, is verified, to judge whether the corresponding user of delete operation has There is deletion permission, if having, then deletes corresponding data.
In technical solution provided in this embodiment, terminal determines the category of secret memory space storing data to be built Property, and then the corresponding secret memory space of attribute is constructed, so that secret memory space only stores the data of corresponding attribute, to avoid The data corruption of secret memory space stored memory storage.
It is the 3rd embodiment of data ciphering method of the present invention referring to Fig. 4, Fig. 4, is based on first or second embodiments, it is described After step S10, further includes:
Step S20 determines data to be encrypted, and the data is stored to the secret memory space.
In the present embodiment, it can directly log in secret memory space and carry out data encryption.Specifically, secret memory space can Password is set, and user is based on password login secret memory space.When user needs encryption data, secret memory space can be based on Interface jump to interface or file where needing the data that encrypt, thus the selected data for needing to encrypt, selected Afterwards, data can be stored to secret memory space.If secret memory space is to request to construct based on data encryption, then counting Storage region where the data encrypted according to the data or needs that carry encryption in need in CIPHERING REQUEST, terminal can bases Data encryption request data to be encrypted, to storing data to secret memory space.
In technical solution provided in this embodiment, terminal determines the attribute of data to be encrypted, so that data be stored To secret memory space corresponding with attribute, to realize the classification storage of data.
It is the fourth embodiment of data ciphering method of the present invention referring to Fig. 5, Fig. 5, is based on first any implementation into third , after the step S10, further includes:
Step S30 determines the corresponding user information of the secret memory space;
The user information is associated with by step S40 with the secret memory space.
In the present embodiment, after constructing secret memory space, terminal can be by secret memory space and user-association.Specifically , terminal exports prompt information, to acquire user information, user information can be face figure after constructing secret memory space One or more kinds of in picture, fingerprint, vocal print, gesture, pattern, verbal instructions and the tinkle of bells, terminal deposits user information and secret Space correlation is stored up, so that user when logging in secret memory space, inputs user information to log in secret memory space.It can manage Solution is the key for logging in secret memory space with the associated user information of secret memory space.
In technical solution provided in this embodiment, terminal obtains user information after constructing secret memory space, then will User information is associated with secret memory space, so that user can log in secret memory space according to user information, to realize data Encipherment protection.
It is the 5th embodiment of data ciphering method of the present invention referring to Fig. 6, Fig. 6, is based on fourth embodiment, the step After S40, further includes:
Step S50, receive user log in secret memory space request when, obtain the user identification information and The associated user information of secret memory space;Step S60, when the identification information matches the user information, display The storage interface of the secret memory space.
In the present embodiment, user issues request when logging in secret memory space;Terminal obtains the identification letter of user Breath;And secret memory space is associated with user information;The identification information for the user that terminal will acquire is associated with secret memory space Identification information be compared, if unanimously, then both matching namely user have the data checked in secret memory space Permission, at this point, display secret memory space storage interface, store interface on comprising secret memory space storage data or The corresponding label of data;Alternatively, identification information is matched with user information, the reading permission of secret memory space is opened, and terminal is read The data of secret memory space are taken, and show the data of reading, so that user checks.Identification information and user in user Information is inconsistent, namely when mismatch, user does not have the permission for checking data in secret memory space, and terminal is exportable not to be had There is the prompt information for the permission for checking data.
In technical solution provided in this embodiment, data encryption terminal is receiving user's login secret memory space When request, the identification information of user is obtained, and obtain the associated user information of secret memory space, if the identification information obtained When matching with user information, then the storage interface of secret memory space is shown, so that user checks the storage of secret memory space The secrecy dynamics of data, data is higher.
It is the sixth embodiment of data ciphering method of the present invention referring to Fig. 7, Fig. 7, is based on the 5th embodiment, the step After S60, further includes:
Step S70 determines the target data removed when receiving the data removal request based on storage interface;
The target data is stored former memory space corresponding to the target data by step S80, and by the secret The target data in memory space is deleted.
In the present embodiment, it behind the storage interface of display secret memory space, stores and shows secret storage on interface The data of space storage, user, which sees, carries out delete operation to these data.If terminal detects delete operation, can regard as connecing It receives data and removes request, terminal removes request according to data and determines the target data for needing to delete, and determines that target data is corresponding Former memory space, target data is stored to former memory space, at this point, be then turned on the deletion permission of secret memory space, To delete target data from secret memory space, after target data deletion, closes and delete permission.
Further, the presence of secret memory space can occupy the amount of storage of data encryption terminal.In this regard, being stored in secret After data are deleted in space, the remaining amount of storage or storage data quantity of secret memory space are determined, if remaining amount of storage is greater than First preset stored amount or storage data quantity are less than or equal to the second preset stored amount, i.e., it is believed that secret memory space not Data are stored with, at this point it is possible to delete secret memory space, directly to save the storage resource of data encryption terminal.
In technical solution provided in this embodiment, data encryption terminal is in the number for receiving the data based on storage interface It is requested according to removing, determines the target data for needing to remove, and target data is stored into former memory space corresponding to target data, It is then turned on the deletion permission of secret memory space, target data is deleted from secret memory space.
To achieve the above object, the present invention also provides a kind of contact person's ciphering terminal, contact person's ciphering terminal includes Processor, memory and it is stored in the data encryption program that can be run on the memory and on the processor, the number The step of data ciphering method described in embodiment as above is realized when being executed according to encipheror by the processor.
To achieve the above object, the present invention also provides a kind of computer readable storage medium, the computer-readable storages Data encryption program is stored on medium, the data encryption program realizes data encryption as described above when being executed by processor The step of method.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be TV Machine, mobile phone, computer, device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (12)

1. a kind of data ciphering method, which is characterized in that the data ciphering method the following steps are included:
Data encryption request or the setting request of secret memory space are being received, secret memory space is constructed.
2. data ciphering method as described in claim 1, which is characterized in that the step of building secret memory space wraps It includes:
Determine the attribute of secret memory space storing data to be built;
Construct the corresponding secret memory space of the attribute.
3. data ciphering method as claimed in claim 2, which is characterized in that the attribute include size of data, data type, At least one of data encryption grade and the identity of data owning user.
4. data ciphering method as described in claim 1, which is characterized in that the step of the building secret memory space it Afterwards, further includes:
It determines data to be encrypted, and the data is stored to the secret memory space.
5. data ciphering method as claimed in claim 4, which is characterized in that described to construct the corresponding secret storage of the attribute After the step of space, further includes:
Determine the attribute of data to be encrypted;
The data are stored to secret memory space corresponding with the attribute.
6. data ciphering method as claimed in claim 4, which is characterized in that described store the data to the secret is deposited After the step of storing up space, further includes:
After detecting that the data complete storage, the corresponding former memory space of the data is determined;
The data are deleted in the former memory space.
7. data ciphering method as described in claim 1, which is characterized in that the step of the building secret memory space it Afterwards, further includes:
Determine the corresponding user information of the secret memory space;
The user information is associated with the secret memory space.
8. data ciphering method as claimed in claim 7, which is characterized in that described to deposit the user information and the secret After the step of storing up space correlation, further includes:
When receiving user's login secret memory space request, the identification information and secret storage of the user are obtained The user information of space correlation;
When the identification information matches the user information, the storage interface of the secret memory space is shown.
9. data ciphering method as claimed in claim 8, which is characterized in that the storage of the display secret memory space After the step of interface, further includes:
When receiving the data removal request based on storage interface, the target data removed is determined;
The target data is stored into former memory space corresponding to the target data, and will be in the secret memory space The target data is deleted.
10. data ciphering method as claimed in claim 9, which is characterized in that the institute by the secret memory space After the step of stating target data deletion, further includes:
Determine the remaining amount of storage or storage data quantity of the secret memory space;
It is greater than or equal to the first preset stored amount in the remaining amount of storage or the storage data quantity is less than or equal to second in advance If amount of storage, the secret memory space is deleted.
11. a kind of terminal, which is characterized in that the terminal includes processor, memory and is stored on the memory and can The data encryption program run on the processor realizes such as right when the data encryption program is executed by the processor It is required that the step of data ciphering method described in any one of 1 to 10.
12. a kind of computer readable storage medium, which is characterized in that be stored with data on the computer readable storage medium and add Close program realizes that the data as described in any one of claims 1 to 10 add when the data encryption program is executed by processor The step of decryption method.
CN201910742578.7A 2019-08-08 2019-08-08 Data ciphering method, terminal and computer readable storage medium Pending CN110443056A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910742578.7A CN110443056A (en) 2019-08-08 2019-08-08 Data ciphering method, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910742578.7A CN110443056A (en) 2019-08-08 2019-08-08 Data ciphering method, terminal and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN110443056A true CN110443056A (en) 2019-11-12

Family

ID=68434871

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910742578.7A Pending CN110443056A (en) 2019-08-08 2019-08-08 Data ciphering method, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110443056A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114244508A (en) * 2021-12-15 2022-03-25 平安科技(深圳)有限公司 Data encryption method, device, equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114244508A (en) * 2021-12-15 2022-03-25 平安科技(深圳)有限公司 Data encryption method, device, equipment and storage medium
CN114244508B (en) * 2021-12-15 2023-07-28 平安科技(深圳)有限公司 Data encryption method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
US8260353B2 (en) SIM messaging client
CN103310169B (en) A kind of method protecting SD card data and protection system
CN104123506B (en) Data access method, device, data encryption, storage and access method, device
CN104252605B (en) A kind of file transparent encrypting and deciphering system of Android platform and method
US9390409B2 (en) Method and server for sending and lending digital service content
US20090318126A1 (en) Arrangement for using erp-systems on, preferably, mobile devices
KR101418797B1 (en) Security token device for cloud service, system for providing security cloud service and method thereof
CA2969495C (en) Method implemented in an identity document and associated identity document
US11593464B2 (en) System and method for providing user accounts through which users are able to operate computing devices
CN109740366A (en) Image Management method, apparatus, computer equipment and storage medium
CN103379483B (en) A kind of method of information of mobile terminal safety management, device and mobile terminal
US20140310606A1 (en) Method and device for providing plugin in contact list
CN112307454A (en) Data encryption method and device, storage medium and electronic equipment
CN109688145A (en) The guard method of privacy information and device
CN112150113A (en) Method, device and system for borrowing file data and method for borrowing data
CN105988897A (en) Recovery method and device of backup data of mobile terminal
CN105630855B (en) File sharing method, shared file system and terminal
CN106603920A (en) Encrypted picture shooting method and system based on fingerprint identification
CN108763401A (en) A kind of reading/writing method and equipment of file
CN104994498B (en) The method and system that a kind of terminal applies are interacted with mobile phone card application
CN110443056A (en) Data ciphering method, terminal and computer readable storage medium
CN109298895A (en) APP management method and device in mobile device
US20060104445A1 (en) Systems and methods for hiding a data group
WO2016188079A1 (en) Data storage method for terminal device and terminal device
CN104978502A (en) System and method for encrypting local file of intelligent terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination