CN102902933B - Based on the file saving method of file fragmentation process - Google Patents
Based on the file saving method of file fragmentation process Download PDFInfo
- Publication number
- CN102902933B CN102902933B CN201210353518.4A CN201210353518A CN102902933B CN 102902933 B CN102902933 B CN 102902933B CN 201210353518 A CN201210353518 A CN 201210353518A CN 102902933 B CN102902933 B CN 102902933B
- Authority
- CN
- China
- Prior art keywords
- file
- user
- password
- fragmentation
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The present invention relates to computer documents Techniques of preserving.The invention solves the problem that existing terminal file data storage environment is safe not, provide a kind of file saving method based on file fragmentation process, its technical scheme can be summarized as: user starts the file fragmentation disposal system in terminal, input password, the algorithm that file fragmentation disposal system is selected according to user and algorithm relevant parameter carry out fragmentation process to user-selected file, preserve after being divided into multiple fragment son file, and the mirror image icon preserving all files after fragmentation process is in order to present to user, during use, user selects to open the algorithm and this algorithm relevant parameter that mirror image icon then points out user to input this file, read according to the algorithm of user's input and this algorithm relevant parameter and each fragment son file integrating this file to present this file.The invention has the beneficial effects as follows, improve the security that documentation is preserved, be applicable to the terminal can preserving documentation.
Description
Technical field
The present invention relates to computer technology, particularly computer documents Techniques of preserving.
Background technology
Along with personal computer and individual mobile device used widely in people's life, add internet and bring the facility obtained information, the safety of personal information data is made more and more to be difficult to guarantee, data security becomes problem important all the more, and present data, as picture, word, the datas such as video only can realize safety guarantee by the mode adding password, and this safety guarantee provided in operating system be very easy to decipher by people, because it only has together or twice password, and use and inconvenience, after third party obtains the terminal such as personal computer or individual mobile device of user, be easy to just can obtain storing wherein each kind of data, security is very poor.
Summary of the invention
The object of the invention is to overcome current terminal file data storage environment shortcoming safe not, a kind of file saving method based on file fragmentation process is provided.
The present invention solves its technical matters, and the technical scheme of employing is, based on the file saving method of file fragmentation process, it is characterized in that, comprises the following steps:
Step 1, user start the file fragmentation disposal system in terminal;
Step 2, file fragmentation disposal system judge whether default password, if then enter step 4, if not, enter step 3;
Whether step 3, file fragmentation disposal system prompting user arranges password, select to judge whether to arrange password according to user, if then point out user to carry out password setting, password is provided with the password of rear preservation user input and enters step 6, if do not arrange password, directly enters step 6;
Step 4, file fragmentation disposal system prompting user inputs password and inputs password according to user and judges whether the password that user inputs conforms to, if then enter step 6, if not then enter step 5 with the password preset;
Step 5, file fragmentation disposal system prompt cipher mistake get back to step 4;
Step 6, file fragmentation disposal system provide fragmentation process interface to user, and the algorithm selected according to user and algorithm relevant parameter carry out fragmentation process to user-selected file, preserve, and delete original file after being divided into multiple fragment son file;
Step 7, file fragmentation disposal system preserve the mirror image icon of all files after fragmentation process in order to present to user;
Step 8, user select to open mirror image icon then file fragmentation disposal system prompting user input algorithm and this algorithm relevant parameter of this file, read according to the algorithm of user's input and this algorithm relevant parameter and each fragment son file integrating this file to present this file.
Concrete, described step 5 comprises the following steps:
Step 51. file fragmentation disposal system prompt cipher mistake also judges that this Password Input is which time Password Input after the input of last proper password, and judges whether to exceed bad password threshold value, if then enter step 52, if not then get back to step 4;
Step 52. file fragmentation disposal system no longer allowed Password Input and starts timing in the prompting stipulated time, after reaching the time specified by default clocking value, get back to step 4.
Concrete, in step 1, described terminal is computing machine or mobile terminal.
Further, in step 51, described bad password threshold value is 3 times.
Concrete, in step 52, described default clocking value is arranged in advance by user.
Further, in step 6, described user-selected file is Single document or file bag.
Concrete, described file handbag draws together alternative document bag and/or Single document.
Further, described Single document is picture file or text file or video file or audio file.
The invention has the beneficial effects as follows; by the above-mentioned file saving method based on file fragmentation process; fragmentation process is carried out by needing the documentation of protection; and the algorithm of fragmentation process and algorithm relevant parameter are selected by user or are provided; third party can not know substantially, has ensured the security of documentation.
Embodiment
Below in conjunction with embodiment, describe technical scheme of the present invention in detail.
File saving method based on file fragmentation process of the present invention is: first user starts the file fragmentation disposal system in terminal, then file fragmentation disposal system judges whether default password, if there is preset password, points out user to input password and input according to user the password that password judges that user inputs and whether conform to the password preset, if do not conform to, file fragmentation disposal system prompt cipher mistake and get back to prompting user input that step of password, if Non-precondition password, whether file fragmentation disposal system prompting user arranges password, select to judge whether to arrange password according to user, password is set if select, points out user to carry out password setting, password is provided with the password of rear preservation user input, if do not arrange password or password be provided with after or Password Input conform to default password, file fragmentation disposal system provide fragmentation process interface to user, the algorithm selected according to user and algorithm relevant parameter carry out fragmentation process to user-selected file, preserve after being divided into multiple fragment son file, and delete original file, and the mirror image icon preserving all files after fragmentation process is in order to present to user, during use, user select to open mirror image icon then file fragmentation disposal system prompting user input algorithm and this algorithm relevant parameter of this file, read according to the algorithm of user's input and this algorithm relevant parameter and each fragment son file integrating this file to present this file, now, if the algorithm of user's input and this algorithm relevant parameter are the algorithm that uses during this file fragmentation process and this algorithm relevant parameter, then each fragment son file of this file must present the content that original should present after reading and integrating, if and the algorithm that the algorithm of user's input and this algorithm relevant parameter use when not being this file fragmentation process and this algorithm relevant parameter, then must present the content that original should present.
Embodiment
The voice acquisition device of this example can adopt phonetic entry sensor array.
First user starts the file fragmentation disposal system in terminal, here terminal can be computing machine or mobile terminal, comprise various computing machine, smart mobile phone and IPAD etc., then file fragmentation disposal system judges whether default password, if there is preset password, points out user to input password and input according to user the password that password judges that user inputs and whether conform to the password preset, if do not conform to, prompt cipher mistake also judges that this Password Input is which time Password Input after the input of last proper password, and judge whether to exceed bad password threshold value, if do not exceed bad password threshold value, get back to prompting user and input that step of password, if exceed bad password threshold value, point out in the stipulated time and no longer allow Password Input and start timing, after reaching the time specified by default clocking value, get back to prompting user input that step of password, here, bad password threshold value can be arranged in advance by user, suggestion is set to 3 times, the clocking value preset also can be arranged by user in advance, it can be 2 hours, 4 hours or 24 hours etc., need to preset according to user, if Non-precondition password, whether file fragmentation disposal system prompting user arranges password, select to judge whether to arrange password according to user, password is set if select, points out user to carry out password setting, password is provided with the password of rear preservation user input, if do not arrange password or password be provided with after or Password Input conform to default password, file fragmentation disposal system provide fragmentation process interface to user, the algorithm selected according to user and algorithm relevant parameter carry out fragmentation process to user-selected file, preserve after being divided into multiple fragment son file, and delete original file, here, user-selected file can be Single document or file bag, alternative document bag and/or Single document can be comprised in file bag, Single document is picture file or text file or the documentation such as video file or audio file, if be chosen as file Bao Ze to carry out corresponding fragment process to whole file bag, file fragmentation disposal system preserves the mirror image icon of all files after fragmentation process in order to present to user, during use, user select to open mirror image icon then file fragmentation disposal system prompting user input algorithm and this algorithm relevant parameter of this file, read according to the algorithm of user's input and this algorithm relevant parameter and each fragment son file integrating this file to present this file, now, if the algorithm of user's input and this algorithm relevant parameter are the algorithm that uses during this file fragmentation process and this algorithm relevant parameter, then each fragment son file of this file must present the content that original should present after reading and integrating, if and the algorithm that the algorithm of user's input and this algorithm relevant parameter use when not being this file fragmentation process and this algorithm relevant parameter, then must present the content that original should present, algorithm and algorithm relevant parameter can provide selection by file fragmentation disposal system to user, also algorithm can be provided to be selected by user, and algorithm relevant parameter is inputted by user.
Claims (7)
1. based on the file saving method of file fragmentation process, it is characterized in that, comprise the following steps:
Step 1, user start the file fragmentation disposal system in terminal;
Step 2, file fragmentation disposal system judge whether default password, if then enter step 4, if not, enter step 3;
Whether step 3, file fragmentation disposal system prompting user arranges password, select to judge whether to arrange password according to user, if then point out user to carry out password setting, password is provided with the password of rear preservation user input and enters step 6, if do not arrange password, directly enters step 6;
Step 4, file fragmentation disposal system prompting user inputs password and inputs password according to user and judges whether the password that user inputs conforms to, if then enter step 6, if not then enter step 5 with the password preset;
Step 5, file fragmentation disposal system prompt cipher mistake get back to step 4;
Step 6, file fragmentation disposal system provide fragmentation process interface to user, and the algorithm selected according to user and algorithm relevant parameter carry out fragmentation process to user-selected file, preserve, and delete original file after being divided into multiple fragment son file;
Step 7, file fragmentation disposal system preserve the mirror image icon of all files after fragmentation process in order to present to user;
Step 8, user select to open mirror image icon then file fragmentation disposal system prompting user input algorithm and this algorithm relevant parameter of this file, read according to the algorithm of user's input and this algorithm relevant parameter and each fragment son file integrating this file to present this file.
2. according to claim 1 based on the file saving method of file fragmentation process, it is characterized in that, described step 5 comprises the following steps:
Step 51. file fragmentation disposal system prompt cipher mistake also judges that this Password Input is which time Password Input after the input of last proper password, and judges whether to exceed bad password threshold value, if then enter step 52, if not then get back to step 4;
Step 52. file fragmentation disposal system no longer allowed Password Input and starts timing in the prompting stipulated time, after reaching the time specified by default clocking value, get back to step 4.
3. according to claim 2 based on the file saving method of file fragmentation process, it is characterized in that, in step 51, described bad password threshold value is 3 times.
4. according to Claims 2 or 3 based on the file saving method of file fragmentation process, it is characterized in that, in step 52, described default clocking value is arranged in advance by user.
5. according to claim 1 based on the file saving method of file fragmentation process, it is characterized in that, in step 6, described user-selected file is Single document or file bag.
6. according to claim 5 based on the file saving method of file fragmentation process, it is characterized in that, described file handbag draws together alternative document bag and/or Single document.
7. according to claim 5 or 6 based on the file saving method of file fragmentation process, it is characterized in that, described Single document is picture file or text file or video file or audio file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210353518.4A CN102902933B (en) | 2012-09-21 | 2012-09-21 | Based on the file saving method of file fragmentation process |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210353518.4A CN102902933B (en) | 2012-09-21 | 2012-09-21 | Based on the file saving method of file fragmentation process |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102902933A CN102902933A (en) | 2013-01-30 |
CN102902933B true CN102902933B (en) | 2016-01-13 |
Family
ID=47575160
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210353518.4A Active CN102902933B (en) | 2012-09-21 | 2012-09-21 | Based on the file saving method of file fragmentation process |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102902933B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104298926B (en) * | 2013-07-19 | 2017-11-10 | 腾讯科技(深圳)有限公司 | A kind of method and apparatus for running encryption file |
CN103455764B (en) * | 2013-08-27 | 2016-09-14 | 无锡华御信息技术有限公司 | A kind of file encryption based on file division folding and decryption system |
CN105184142A (en) * | 2015-09-09 | 2015-12-23 | 北京金山安全软件有限公司 | Locking method and device of system switch and mobile terminal |
CN106789005A (en) * | 2016-12-15 | 2017-05-31 | 四川长虹电器股份有限公司 | Cryptosecurity storage system |
CN111198866A (en) * | 2018-11-20 | 2020-05-26 | 广州汽车集团股份有限公司 | Knowledge point management method and device, storage medium and terminal equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101084548A (en) * | 2004-12-20 | 2007-12-05 | 皇家飞利浦电子股份有限公司 | Unlocking a protected portable storage medium |
CN101796525A (en) * | 2007-08-28 | 2010-08-04 | 松下电器产业株式会社 | Electronic device, unlocking method, and program |
-
2012
- 2012-09-21 CN CN201210353518.4A patent/CN102902933B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101084548A (en) * | 2004-12-20 | 2007-12-05 | 皇家飞利浦电子股份有限公司 | Unlocking a protected portable storage medium |
CN101796525A (en) * | 2007-08-28 | 2010-08-04 | 松下电器产业株式会社 | Electronic device, unlocking method, and program |
Non-Patent Citations (1)
Title |
---|
可生存的开放式对等存储系统;汪晶晶等;《计算机工程》;20101130;第36卷(第21期);第147页右栏至第148页左栏 * |
Also Published As
Publication number | Publication date |
---|---|
CN102902933A (en) | 2013-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2676947C2 (en) | Device and method of increasing security of terminal | |
CN102902933B (en) | Based on the file saving method of file fragmentation process | |
CN104182662B (en) | Hiding and deployment method, system and the mobile terminal of hide application program | |
EP3096507B1 (en) | Patchwork fingerprint processing method based on mobile terminal and mobile terminal | |
WO2016115912A1 (en) | Image encryption method, image viewing method, system, and terminal | |
EP2955617A1 (en) | Method and device for unlocking screen, and terminal | |
CN104182675A (en) | Mobile equipment terminal and application hiding system and application hiding and starting method thereof | |
US9276748B2 (en) | Data-encrypting method and decrypting method for a mobile phone | |
WO2011130934A1 (en) | Method and device for destructing terminal data | |
CN101917513A (en) | Method and device for implementing graded display of privacy information | |
US8706158B2 (en) | Mobile phone for authenticating SIM card and method thereof | |
CN101674583A (en) | Method for hiding or recovering personal information when changing SIM card and system thereof | |
US20160105278A1 (en) | Key, system and method of unlocking electronic device using the key | |
CN101963975A (en) | System and method for quickly searching application program of mobile terminal | |
CN102045450A (en) | Method for protecting mobile phone information security | |
CN102722427A (en) | Data information backup method and data information backup system | |
US20130283387A1 (en) | Method for data security and electronic device having data security function | |
CN102970666A (en) | Method and system for disguised incoming call information for mobile terminal | |
HK1107202A1 (en) | Method of and system for storage of i-wlan temporary identities | |
WO2015196642A1 (en) | Data encryption method, decryption method and device | |
CN101854418A (en) | Short message content handwriting encryption and decryption realization method based on address list | |
EP3852341A1 (en) | Information sharing method, device and non-transitory computer readable storage medium thereof | |
CN102542210A (en) | Electronic device and method for managing file permissions | |
WO2016188079A1 (en) | Data storage method for terminal device and terminal device | |
WO2020052357A1 (en) | Fingerprint-based file encryption storage and reading system and method, and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |