CN102118503A - Data protection method, device and terminal - Google Patents

Data protection method, device and terminal Download PDF

Info

Publication number
CN102118503A
CN102118503A CN2011100266853A CN201110026685A CN102118503A CN 102118503 A CN102118503 A CN 102118503A CN 2011100266853 A CN2011100266853 A CN 2011100266853A CN 201110026685 A CN201110026685 A CN 201110026685A CN 102118503 A CN102118503 A CN 102118503A
Authority
CN
China
Prior art keywords
data
keyword
password
encryption
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011100266853A
Other languages
Chinese (zh)
Other versions
CN102118503B (en
Inventor
彭裕军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN2011100266853A priority Critical patent/CN102118503B/en
Publication of CN102118503A publication Critical patent/CN102118503A/en
Application granted granted Critical
Publication of CN102118503B publication Critical patent/CN102118503B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a data protection method, which may comprise the following steps of: 102, setting a password corresponding to a keyword; and 104, querying whether data comprises the keyword or not, and performing encryption and decryption processing on the data by using the password if the data comprises the keyword. The invention also provides a data protection device and a terminal. In the method, the device and the mobile, the keyword is queried to determine whether to encrypt different data or not and how to encrypt and decrypt the data.

Description

Data guard method, device and terminal
Technical field
The present invention relates to moving communicating field, in particular to a kind of data guard method, data protecting device and a kind of terminal.
Background technology
Present stage, the function of mobile phone more and more widely.Wherein, along with the expansion of mobile phone EMS memory and RAM (random access memory) card capacity, mobile phone also provides the function of storage user mass data for the user.Owing to may comprise significant data in the data of storage, just need carry out encipherment protection to these data as private data etc.
At present, the mode that the user encrypts the data that are stored in the mobile phone, be one by one data are manually encrypted, this has brought a large amount of operational tons to the user, and because the increase of operational ton, makes the mistake of user in occurring operating easily, for example, inputed wrong password, forgotten the password of input, or some significant data has been forgotten encryption.
Therefore, need a kind of new encryption and decryption mode, can select from all data automatically needs ciphered data, so that these data are carried out encryption and decryption processing.
Summary of the invention
Technical problem to be solved by this invention is, a kind of new encryption and decryption mode is provided, and can select from all data automatically needs ciphered data, so that these data are carried out encryption and decryption processing.
In view of this, the invention provides a kind of data guard method, can comprise: step 102 is provided with the password corresponding to keyword; Whether step 104 contains keyword in the data query, when containing keyword in the data, access to your password data are carried out the encryption and decryption processing.By this technical scheme,, can select whether this to be encrypted, and how carry out encryption and decryption at different pieces of information by inquiry to keyword.
In technique scheme, preferably, in step 102, have when a plurality of at keyword, for a plurality of keywords are provided with priority orders; In step 104, when in data, containing a plurality of keyword,, select at least one password in the corresponding respectively a plurality of passwords of a plurality of keywords that data are carried out encryption and decryption and handle according to the priority orders of a plurality of keywords.By this technical scheme, can avoid the encryption and decryption of data is become too loaded down with trivial details, influenced user's checking to data.
In technique scheme, preferably, can also comprise: step 106, input password with before checking data the prompting user, be the keyword corresponding that comprises in the user prompt data with password.By this technical scheme, can guarantee that the user checks data easily.
In technique scheme, preferably, in step 104, regularly whether contain described keyword in the data query, or whether contain keyword in the data query during editing data.
The present invention also provides a kind of data protecting device, can comprise: module is set, the password corresponding to keyword is set; Whether the encryption and decryption module contains keyword in the data query, when containing keyword in the data, access to your password data are carried out the encryption and decryption processing.By this technical scheme,, can select whether this to be encrypted, and how carry out encryption and decryption at different pieces of information by inquiry to keyword.
In technique scheme, preferably, have when a plurality of at keyword, be that a plurality of keywords are provided with priority orders via module is set; Via the priority orders of encryption and decryption module, select at least one password in the corresponding respectively a plurality of passwords of a plurality of keywords that data are carried out the encryption and decryption processing according to a plurality of keywords.By this technical scheme, can avoid the encryption and decryption of data is become too loaded down with trivial details, influenced user's checking to data.
In technique scheme, preferably, can also comprise: reminding module, the prompting user inputs password checking data, and the keyword corresponding with password for comprising in the user prompt data.By this technical scheme, can guarantee that the user checks data easily.
The present invention also provides a kind of terminal, can comprise above-mentioned data protecting device.
By above technical scheme; can realize a kind of data guard method, a kind of data protecting device and a kind of terminal; by keyword and password are set; and in data search key; whether need encrypt, and use which password to carry out encryption and decryption if can judge each data automatically.
Description of drawings
Fig. 1 is the flow chart of data guard method according to an embodiment of the invention;
Fig. 2 is the block diagram of data protecting device according to an embodiment of the invention;
Fig. 3 is the block diagram of terminal according to an embodiment of the invention;
Fig. 4 is the workflow diagram of terminal according to an embodiment of the invention;
Fig. 5 is the screenshotss schematic diagram of terminal according to an embodiment of the invention;
Fig. 6 is the screenshotss schematic diagram of terminal according to an embodiment of the invention.
Embodiment
In order more to be expressly understood above-mentioned purpose of the present invention, feature and advantage, the present invention is further described in detail below in conjunction with the drawings and specific embodiments.
Set forth a lot of details in the following description so that fully understand the present invention, still, the present invention can also adopt other to be different from other modes described here and implement, and therefore, the present invention is not limited to the restriction of following public specific embodiment.
Fig. 1 is the flow chart of data guard method according to an embodiment of the invention.
As shown in Figure 1, the invention provides a kind of data guard method, can comprise: step 102 is provided with the password corresponding to keyword; Whether step 104 contains keyword in the data query, when containing keyword in the data, access to your password data are carried out the encryption and decryption processing.By this technical scheme,, can select whether this to be encrypted, and how carry out encryption and decryption at different pieces of information by inquiry to keyword.
In technique scheme, in step 102, have when a plurality of at keyword, for a plurality of keywords are provided with priority orders; In step 104, when in data, containing a plurality of keyword,, select at least one password in the corresponding respectively a plurality of passwords of a plurality of keywords that data are carried out encryption and decryption and handle according to the priority orders of a plurality of keywords.By this technical scheme, can avoid the encryption and decryption of data is become too loaded down with trivial details, influenced user's checking to data.
In technique scheme, can also comprise: step 106, input password with before checking data the prompting user, be the keyword corresponding that comprises in the user prompt data with password.By this technical scheme, can guarantee that the user checks data easily.
In technique scheme, in step 104, regularly whether contain described keyword in the data query, or whether contain keyword in the data query during editing data.
By above technical scheme, can realize a kind of data guard method, by keyword and password are set, and in data search key, whether need encrypt, and use which password to carry out encryption and decryption if can judge each data automatically.
Fig. 2 is the block diagram of data protecting device according to an embodiment of the invention.
As shown in Figure 2, the present invention also provides a kind of data protecting device 200, can comprise: module 202 is set, the password corresponding to keyword is set; Whether encryption and decryption module 204 contains keyword in the data query, when containing keyword in the data, access to your password data are carried out the encryption and decryption processing.By this technical scheme,, can select whether this to be encrypted, and how carry out encryption and decryption at different pieces of information by inquiry to keyword.
In technique scheme, have when a plurality of at keyword, via being set, module 202 priority orders is set for a plurality of keywords; Via the priority orders of encryption and decryption module 204, select at least one password in the corresponding respectively a plurality of passwords of a plurality of keywords that data are carried out the encryption and decryption processing according to a plurality of keywords.By this technical scheme, can avoid the encryption and decryption of data is become too loaded down with trivial details, influenced user's checking to data.
In technique scheme, can also comprise: reminding module 206, the prompting user inputs password checking data, and the keyword corresponding with password for comprising in the user prompt data.By this technical scheme, can guarantee that the user checks data easily.
By above technical scheme, can realize a kind of data protecting device, by keyword and password are set, and in data search key, whether need encrypt, and use which password to carry out encryption and decryption if can judge each data automatically.
Fig. 3 is the block diagram of terminal according to an embodiment of the invention.
As shown in Figure 3, the present invention also provides a kind of terminal 300, can comprise above-mentioned data protecting device 200.
Preferably, when terminal 300 is set up or received new data, start described data protecting device 200.By this technical scheme, the unnecessary data inquiry that prevents to continue has caused the waste of terminal resource.Fig. 4 is the workflow diagram of terminal according to an embodiment of the invention.
As shown in Figure 4, the terminal in the present embodiment is the portable terminal of mobile phone for example, and the workflow that this portable terminal carries out data encrypting and deciphering is as follows:
Step 402, the user preestablishes keyword and password: when keyword " space dragon " occurring, Crypted password is 123456.Keyword and its corresponding password can be provided with many groups, for example " finance " can also be set, and its Crypted password is 111222.Can also priority orders be set for keyword, be used for when data have a plurality of keyword, select the password of one or more keyword correspondence that data are encrypted, when for example containing " space dragon " and " finance " in certain file simultaneously, when if the priority orders of keyword " finance " is higher than " space dragon ", encrypt this document only access to your password " 111222 ".Dictionary can be set with storage keyword and password in portable terminal.Although it will be appreciated by those skilled in the art that present embodiment is that example is illustrated with the portable terminal, other information processor, PC for example, PDA, panel computer, notebook computer etc. all can be used the present invention.
Step 404, user's newdata document or obtain data from PC and other terminals;
Step 406, the dictionary of these data and portable terminal is compared, see the keyword that whether contains setting, and when having keyword, these data are encrypted, need the user to input password, after mobile phone was accepted the password of input and data are decrypted, the user just can check data, when not having keyword in data, this document can normally be checked, need not to input password.
For example, to passing three files of A, B, C as portable terminal, contain two keywords of " space dragon " and " finance " in the A file, because the priority orders of " finance " is higher, so access to your password " 111222 " to the A file encryption, the B file contains keyword " space dragon ", and then portable terminal accesses to your password " 123456 " to the B file encryption, there is not keyword in the C file, so not to its encryption.Portable terminal can also be pointed out the user, and A, B have been carried out encryption, as shown in Figure 5.And when the user selects to check the C file, can directly open, and when selecting A or B file, the keyword of the password correspondence of A or B file is encrypted in the portable terminal prompting, as shown in Figure 6, when the user chooses (triangle pointer) A file, need input password " 111222 ", terminal is accepted the password of user's input and is decrypted, and makes the user can open the A file and checks.
By above technical scheme; can realize a kind of data guard method, a kind of data protecting device and a kind of terminal; by keyword and password are set; and in data search key; whether can judge each data automatically needs to encrypt; and use which password to carry out encryption and decryption, and avoid the user all to need security information is carried out encryption at every turn, perhaps cause leakage of data owing to forgetting to encrypt.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (8)

1. a data guard method is characterized in that, comprising:
Step 102 is provided with the password corresponding to keyword;
Whether step 104 contains described keyword in the data query, when containing described keyword in the described data, use described password that described data are carried out encryption and decryption and handle.
2. data guard method according to claim 1 is characterized in that, in described step 102, has when a plurality of at described keyword, for described a plurality of keywords are provided with priority orders;
In described step 104, when in described data, containing a plurality of keyword,, select at least one password in the corresponding respectively a plurality of passwords of described a plurality of keyword that described data are carried out the encryption and decryption processing according to the priority orders of described a plurality of keywords.
3. data guard method according to claim 1 is characterized in that, also comprises:
Step 106 is inputed password with before checking data the prompting user, is the keyword corresponding with described password that comprises in the described data of described user prompt.
4. according to each described data guard method in the claim 1 to 3, it is characterized in that in described step 104, regularly whether contain described keyword in the data query, or inquire about whether contain described keyword in the described data during editing data.
5. a data protecting device is characterized in that, comprising:
Module is set, the password corresponding to keyword is set;
Whether the encryption and decryption module contains described keyword in the data query, when containing described keyword in the described data, use described password that described data are carried out encryption and decryption and handle.
6. data protecting device according to claim 5 is characterized in that, has when a plurality of at described keyword, and be that described a plurality of keyword is provided with priority orders via the described module that is provided with; Via the priority orders of described encryption and decryption module, select at least one password in the corresponding respectively a plurality of passwords of described a plurality of keyword that described data are carried out the encryption and decryption processing according to described a plurality of keywords.
7. according to claim 5 or 6 described data protecting devices, it is characterized in that, also comprise:
Reminding module, the prompting user inputs password checking data, and the keyword corresponding with described password for comprising in the described data of described user prompt.
8. a terminal is characterized in that, comprising:
As each described data protecting device in the claim 5 to 7.
CN2011100266853A 2011-01-25 2011-01-25 Data protection method, device and terminal Active CN102118503B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100266853A CN102118503B (en) 2011-01-25 2011-01-25 Data protection method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100266853A CN102118503B (en) 2011-01-25 2011-01-25 Data protection method, device and terminal

Publications (2)

Publication Number Publication Date
CN102118503A true CN102118503A (en) 2011-07-06
CN102118503B CN102118503B (en) 2013-12-11

Family

ID=44217087

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100266853A Active CN102118503B (en) 2011-01-25 2011-01-25 Data protection method, device and terminal

Country Status (1)

Country Link
CN (1) CN102118503B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104866770A (en) * 2014-02-20 2015-08-26 腾讯科技(深圳)有限公司 Sensitive data scanning method and sensitive data scanning system
CN105069365A (en) * 2015-06-30 2015-11-18 广东欧珀移动通信有限公司 Data processing method and mobile terminal
CN105099670A (en) * 2015-07-13 2015-11-25 深圳市金立通信设备有限公司 Encryption method and terminal
CN106156642A (en) * 2016-07-28 2016-11-23 宇龙计算机通信科技(深圳)有限公司 Data ciphering method and device
CN106446710A (en) * 2016-09-29 2017-02-22 广州鹤互联网科技有限公司 Signed-document encrypting and safety browsing device and method thereof
CN114244635A (en) * 2022-02-25 2022-03-25 深圳市华方信息产业有限公司 Encryption type data coding method of communication equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101115020A (en) * 2006-07-25 2008-01-30 腾讯科技(深圳)有限公司 Secret mail protecting method and mail system
CN101184264A (en) * 2007-11-27 2008-05-21 北京网秦天下科技有限公司 Mobile phone telephone and message anti-disturbance and private communication method and system
CN101252748A (en) * 2008-04-11 2008-08-27 北京北纬通信科技股份有限公司 System and method for realizing privacy SMS on mobile terminal
KR100867534B1 (en) * 2007-09-10 2008-11-10 주식회사 케이티프리텔 Method for managing list of private message in mobile terminal and mobile terminal therefor
CN101350712A (en) * 2008-08-25 2009-01-21 深圳华为通信技术有限公司 Data management method and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101115020A (en) * 2006-07-25 2008-01-30 腾讯科技(深圳)有限公司 Secret mail protecting method and mail system
KR100867534B1 (en) * 2007-09-10 2008-11-10 주식회사 케이티프리텔 Method for managing list of private message in mobile terminal and mobile terminal therefor
CN101184264A (en) * 2007-11-27 2008-05-21 北京网秦天下科技有限公司 Mobile phone telephone and message anti-disturbance and private communication method and system
CN101252748A (en) * 2008-04-11 2008-08-27 北京北纬通信科技股份有限公司 System and method for realizing privacy SMS on mobile terminal
CN101350712A (en) * 2008-08-25 2009-01-21 深圳华为通信技术有限公司 Data management method and terminal

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104866770A (en) * 2014-02-20 2015-08-26 腾讯科技(深圳)有限公司 Sensitive data scanning method and sensitive data scanning system
CN105069365A (en) * 2015-06-30 2015-11-18 广东欧珀移动通信有限公司 Data processing method and mobile terminal
CN105099670A (en) * 2015-07-13 2015-11-25 深圳市金立通信设备有限公司 Encryption method and terminal
CN106156642A (en) * 2016-07-28 2016-11-23 宇龙计算机通信科技(深圳)有限公司 Data ciphering method and device
CN106446710A (en) * 2016-09-29 2017-02-22 广州鹤互联网科技有限公司 Signed-document encrypting and safety browsing device and method thereof
CN114244635A (en) * 2022-02-25 2022-03-25 深圳市华方信息产业有限公司 Encryption type data coding method of communication equipment

Also Published As

Publication number Publication date
CN102118503B (en) 2013-12-11

Similar Documents

Publication Publication Date Title
USRE49194E1 (en) Method and apparatus for controlling access to encrypted data
CN106971121B (en) Data processing method, device, server and storage medium
US9191811B2 (en) Method and system for managing information on mobile devices
US20110131418A1 (en) Method of password management and authentication suitable for trusted platform module
CN102750497B (en) Method and device for deciphering private information
US8325921B2 (en) Portable memory and a method for encrypting the same
CN102118503B (en) Data protection method, device and terminal
CN111897786B (en) Log reading method, device, computer equipment and storage medium
CN103279411A (en) Method and system of entering application programs based on fingerprint identification
CN103455764A (en) File segmentation and merging technology-based file encryption and decryption systems
US20120284534A1 (en) Memory Device and Method for Accessing the Same
CN106911476B (en) Encryption and decryption device and method
CN101795450A (en) Method and device for carrying out security protection on mobile phone data
US20110107109A1 (en) Storage system and method for managing data security thereof
CN103929312A (en) Mobile terminal and method and system for protecting individual information of mobile terminal
CN104915583A (en) Interface decryption processing method and mobile terminal
CN201130381Y (en) Electric signature tool with cryptogram management function
US20100174902A1 (en) Portable storage media with high security function
CN103379133A (en) Safe and reliable cloud storage system
US8347113B2 (en) System and method for encrypting an electronic file in a mobile electronic device
CN102831360B (en) Personal electronic document safety management system and management method thereof
CN101901320A (en) Data leakage prevention method for electronic book reader
US20070174548A1 (en) [memory card with identifier]
CN102087683A (en) Password management and verification method suitable for trusted platform module (TPM)
CN101794260A (en) Automatically imported method of encryption key for mobile storage device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant