CN105138885B - The method and electronic equipment of a kind of file encryption - Google Patents

The method and electronic equipment of a kind of file encryption Download PDF

Info

Publication number
CN105138885B
CN105138885B CN201510517473.3A CN201510517473A CN105138885B CN 105138885 B CN105138885 B CN 105138885B CN 201510517473 A CN201510517473 A CN 201510517473A CN 105138885 B CN105138885 B CN 105138885B
Authority
CN
China
Prior art keywords
facial characteristics
file
electronic equipment
user
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510517473.3A
Other languages
Chinese (zh)
Other versions
CN105138885A (en
Inventor
刘勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING CHUANGXIN JOURNEY NETWORK TECHNOLOGY CO., LTD.
Original Assignee
Beijing Chuangxin Journey Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Chuangxin Journey Network Technology Co Ltd filed Critical Beijing Chuangxin Journey Network Technology Co Ltd
Priority to CN201510517473.3A priority Critical patent/CN105138885B/en
Publication of CN105138885A publication Critical patent/CN105138885A/en
Application granted granted Critical
Publication of CN105138885B publication Critical patent/CN105138885B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention belongs to field of encryption, provide the method and electronic equipment of a kind of file encryption.In embodiments of the present invention, by detecting whether pre-set user sends out file encryption instruction, and obtain the facial characteristics of active user, the predetermined encryption file in electronic equipment is encrypted according to the facial characteristics and file encryption instruction control of the facial characteristics of pre-set user and the acquisition, so that other people are in the electronic equipment for using oneself, user can be by password to being encrypted by them using the private file of middle electronic equipment, ensure the personal secrets of user, improve the usage experience of user.

Description

The method and electronic equipment of a kind of file encryption
Technical field
The invention belongs to field of encryption more particularly to the methods and electronic equipment of a kind of file encryption.
Background technology
Encryption is as a kind of mode for ensureing data safety, it is not now just to have, and the history of its generation is quite remote, It is initiated by being traced in B.C. 2000(Several centuries)Although its not now encryption technology that we are said (Encryption is not cried even), but a kind of encrypted concept is used as, just it is born really before several centuries.Egyptian was most at that time Special pictograph is first used as information coding, as time goes by, Babylon, Mesopotamia and Greece's civilization All begin to use certain methods to protect their written information.
Generally all there are privacy photo or video on electronic equipment at present, be easy to cause when electronic equipment is used by others Privacy leakage brings great body and mind to perplex to user.
Invention content
The embodiment of the present invention is designed to provide a kind of method of the file encryption applied to electronic equipment, it is intended to solve The problem of easy privacy of purpose electronic equipment leaks.
To solve the above-mentioned problems, the invention is realized in this way:A kind of method of file encryption, sets applied to electronics It is standby, it the described method comprises the following steps:
Whether detection pre-set user sends out file encryption instruction;
Obtain the facial characteristics of active user;
According to the facial characteristics of pre-set user and the facial characteristics of the acquisition and file encryption instruction control pair Predetermined encryption file in electronic equipment is encrypted.
Further, the step of whether the detection pre-set user sends out file encryption instruction, including:
When active user carries out picture/video tour, the sound of ambient enviroment is monitored;
The voiceprint of the sound listened to is matched with default voiceprint, and to the sound listened into Row language identification;
Reach preset matching degree threshold value in the voiceprint of the sound listened to and the matching degree of default voiceprint, And the sound that listens to carry out the content after language identification it is identical with preset language information when, then be judged as pre-set user hair File encryption instruction is gone out.
Further, the acquisition modes of the facial characteristics of the active user are the camera by electronic equipment to current User is shot, and the facial characteristics of active user is obtained according to default face recognition algorithm.
Further, it is described to be added according to the facial characteristics of pre-set user and the facial characteristics of the acquisition and the file The step of predetermined encryption file in electronic equipment is encrypted in close instruction control, including:
The facial characteristics of the facial characteristics of the acquisition and pre-set user is compared;
File encryption instruction, and the facial characteristics of the facial characteristics of the acquisition and pre-set user are had issued in pre-set user Similarity when being less than default similarity threshold, the predetermined encryption file in electronic equipment is encrypted.
Further, in the facial characteristics and the file of the facial characteristics according to pre-set user and the acquisition It is further comprising the steps of after the step of predetermined encryption file in electronic equipment is encrypted in encrypted instruction control:
Whether detection pre-set user sends out file decryption instruction, and reacquires the facial characteristics of active user;
File decryption instruction, and the facial characteristics of the reacquisition and default facial characteristics are had issued in pre-set user When similarity is more than default similarity threshold, the predetermined encryption file in electronic equipment is decrypted.
The embodiment of the present invention additionally provides electronic equipment described in a kind of electronic equipment and includes:
Detection unit, for detecting whether pre-set user sends out file encryption instruction;
Acquiring unit, for obtaining the facial characteristics of active user;
Control unit adds for the facial characteristics and the file of the facial characteristics according to pre-set user and the acquisition The predetermined encryption file in electronic equipment is encrypted in close instruction control.
Further, the detection unit includes:
Subelement is monitored, for when active user carries out picture/video tour, monitoring the sound of ambient enviroment;
Match cognization subelement, for the voiceprint of the sound listened to be matched with default voiceprint, and Language identification is carried out to the sound listened to;
Judgment sub-unit, for reaching in the matching degree of the voiceprint and default voiceprint of the sound listened to Preset matching degree threshold value, and the sound that listens to carry out the content after language identification it is identical with preset language information when, then It is judged as that pre-set user has issued file encryption instruction.
Further, the acquisition modes of the facial characteristics of the active user are the camera by electronic equipment to current User is shot, and the facial characteristics of active user is obtained according to default face recognition algorithm.
Further, described control unit includes:
Contrast subunit compares the facial characteristics of the facial characteristics of the acquisition and pre-set user;
Encryption sub-unit operable, for having issued file encryption instruction in pre-set user, and the facial characteristics of the acquisition with it is pre- If the similarity of the facial characteristics of user is less than default similarity threshold, the predetermined encryption file in electronic equipment is added It is close.
Further, described control unit further includes:
Detection sub-unit, for detecting whether pre-set user sends out file decryption instruction;
Subelement is controlled, for acquiring unit to be controlled to reacquire the facial characteristics of active user;
Subelement is decrypted, for having issued file decryption instruction, and the facial characteristics of the reacquisition in pre-set user When being more than default similarity threshold with the similarity of default facial characteristics, the predetermined encryption file in electronic equipment is solved It is close.
In embodiments of the present invention, by detecting whether pre-set user sends out file encryption instruction, and active user is obtained Facial characteristics, according to the facial characteristics of the facial characteristics of pre-set user and the acquisition and file encryption instruction control Predetermined encryption file in electronic equipment is encrypted so that, in the electronic equipment for using oneself own, user can lead to for other people Password is crossed to being encrypted by them using the private file of middle electronic equipment, it is ensured that the personal secrets of user are improved and used The usage experience at family.
Description of the drawings
Fig. 1 is the flow chart of the method for the file encryption provided in an embodiment of the present invention applied to electronic equipment;
Fig. 2 is the flow chart of the method for the file encryption applied to electronic equipment that first embodiment of the invention provides;
Fig. 3 is the flow chart of the method for the file encryption applied to electronic equipment that second embodiment of the invention provides;
Fig. 4 is the flow chart of the method for the file encryption applied to electronic equipment that third embodiment of the invention provides;
Fig. 5 is the circuit theory schematic diagram of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, it is right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
The specific implementation of the present invention is described in detail below in conjunction with specific embodiment:
Fig. 1 shows the flow of the method for the file encryption provided in an embodiment of the present invention applied to electronic equipment, in order to Convenient for explanation, only list with the relevant part of the embodiment of the present invention, details are as follows:
The method of file encryption provided in an embodiment of the present invention applied to electronic equipment, includes the following steps:
Whether step S10, detection pre-set user send out file encryption instruction.In embodiments of the present invention, when the electricity of user When sub- equipment is used by others, user aside sees, wireless control electronic equipment can be instructed by file encryption to default Encrypt file(Private file)Be encrypted, by detect pre-set user whether send out file encryption instruction may determine that user Electronic equipment whether be used by others.
It should be noted that in embodiments of the present invention, electronic equipment include but not limited to computer, mobile phone, tablet computer, Electronic reader etc..
Step S20 obtains the facial characteristics of active user.In embodiments of the present invention, the facial characteristics of active user Acquisition modes are obtained according to default face recognition algorithm and are worked as to be shot by the camera of electronic equipment to active user The facial characteristics of preceding user.
Step S30, according to the facial characteristics of pre-set user and the facial characteristics obtained and file encryption instruction control pair Predetermined encryption file in electronic equipment is encrypted.
In embodiments of the present invention, after user sends out file encryption instruction, the user before the camera of electronic equipment Take pictures determining whether(Owner)Then user is controlled whether according to judging result and file encryption instruction to predetermined encryption File is encrypted.
Embodiment one:
Fig. 2 shows first embodiment of the invention provide the file encryption applied to electronic equipment method flow, For convenience of description, only list with the relevant part of the embodiment of the present invention, details are as follows:
As a preferred embodiment of the present invention, step S10, including:
Step S101 when active user carries out picture/video tour, monitors the sound of ambient enviroment, i.e., may relate to And the file type of privacy(User has carried out the type that the file of encryption setting belongs to, and refers to picture or video in the present invention) When by browsing or viewing, the sound of ambient enviroment is begun listening for, to judge whether there is the file encryption of owner user's transmission Instruction(Code word), instructed for example, being provided with a file encryption before owner user(Code word), command content is:Three sound of cough, such as Fruit listens to, then it represents that owner user has issued the control instruction that the predetermined encryption file of electronic equipment is encrypted.
Step S102 matches the voiceprint of the sound listened to default voiceprint, and to listening to Sound carries out language identification.In embodiments of the present invention, the voiceprint of the sound listened to and default voiceprint are carried out Matching mainly judge the sound listened to whether be owner user sound, then to listen to content progress language knowledge Not, determine whether preset encrypted instruction(Code word).
Step S103 reaches preset matching degree in the voiceprint of the sound listened to and the matching degree of default voiceprint Threshold value, and the sound that listens to carry out the content after language identification it is identical with preset language information when, then be judged as pre-set user Have issued file encryption instruction.
Embodiment two:
Fig. 3 shows the flow of the method for the file encryption applied to electronic equipment that second embodiment of the invention provides, For convenience of description, only list with the relevant part of the embodiment of the present invention, details are as follows:
As a preferred embodiment of the present invention, step S30 includes:
Step S301 compares the facial characteristics of the facial characteristics of acquisition and pre-set user;
Step S302 has issued file encryption instruction, and the facial characteristics obtained and the face of pre-set user in pre-set user When the similarity of portion's feature is less than default similarity threshold, the predetermined encryption file in electronic equipment is encrypted.
In embodiments of the present invention, the similarity of the facial characteristics of the facial characteristics and pre-set user of acquisition is less than default phase During like degree threshold value, surface is not owner user using the user of electronic equipment, and file is had issued having received owner user Encrypted instruction is then encrypted the predetermined encryption file in electronic equipment, improves the safety of privacy of user file.
Embodiment three:
Fig. 4 shows the flow of the method for the file encryption applied to electronic equipment that third embodiment of the invention provides, For convenience of description, only list with the relevant part of the embodiment of the present invention, details are as follows:
As a preferred embodiment of the present invention, after step S30, it is further comprising the steps of:
Whether step S40, detection pre-set user send out file decryption instruction, and the face for reacquiring active user is special Sign;
Step S50 has issued file decryption instruction, and the facial characteristics reacquired and default face are special in pre-set user When the similarity of sign is more than default similarity threshold, the predetermined encryption file in electronic equipment is decrypted.
The embodiment of the present invention is mainly to the encryption after predetermined encryption file encryption, when meeting decryption condition to electricity Predetermined encryption file in sub- equipment is decrypted.
Fig. 5 shows the circuit theory schematic diagram of electronic equipment provided in an embodiment of the present invention, for convenience of description, only arranges Go out with the relevant part of the embodiment of the present invention, details are as follows:
Electronic equipment provided in an embodiment of the present invention, including detection unit 100, acquiring unit 200 and control unit 300;
Detection unit 100 is used to detect whether pre-set user sends out file encryption instruction;Acquiring unit 200 is worked as obtaining The facial characteristics of preceding user;Control unit 300 is used for the facial characteristics according to pre-set user and the facial characteristics and text of acquisition The predetermined encryption file in electronic equipment is encrypted in the control of part encrypted instruction.
As a preferred embodiment of the present invention, detection unit 100 includes monitoring subelement 101, match cognization subelement 102 And judgment sub-unit 103:
Subelement 101 is monitored, for when active user carries out picture/video tour, monitoring the sound of ambient enviroment; With identification subelement 102, for the voiceprint of the sound listened to be matched with default voiceprint, and to listening to Sound carry out language identification;Judgment sub-unit 103, in the voiceprint of the sound listened to and default voiceprint Matching degree reaches preset matching degree threshold value, and the content after the sound progress language identification listened to is identical with preset language information When, then it is judged as that pre-set user has issued file encryption instruction.
As a preferred embodiment of the present invention, the acquisition modes of the facial characteristics of active user are taking the photograph by electronic equipment As head shoots active user, and the facial characteristics of active user is obtained according to default face recognition algorithm.
As a preferred embodiment of the present invention, control unit 300 includes contrast subunit 301, encryption sub-unit operable 302, inspection Survey subelement 303, control subelement 304 and decryption subelement 305;
Contrast subunit 301 compares the facial characteristics of the facial characteristics of acquisition and pre-set user;
Encryption sub-unit operable 302 is used to have issued file encryption instruction in pre-set user, and the facial characteristics obtained is with presetting When the similarity of the facial characteristics of user is less than default similarity threshold, the predetermined encryption file in electronic equipment is added It is close;Detection sub-unit 303 is used to detect whether pre-set user sends out file decryption instruction;Control subelement 304 obtains for controlling Unit is taken to reacquire the facial characteristics of active user;Decryption subelement 305 refers to for having issued file decryption in pre-set user It enables, and when the similarity of facial characteristics and the default facial characteristics reacquired is more than default similarity threshold, to electronic equipment In predetermined encryption file be decrypted.
Electronic equipment provided in an embodiment of the present invention is with above application in the implementation of the method for the file encryption of electronic equipment Example is corresponding, and operation principle and mode are corresponding applicable, just repeat no more here.
In embodiments of the present invention, by detecting whether pre-set user sends out file encryption instruction, and active user is obtained Facial characteristics, according to the facial characteristics of the facial characteristics of pre-set user and the acquisition and file encryption instruction control Predetermined encryption file in electronic equipment is encrypted so that, in the electronic equipment for using oneself own, user can lead to for other people Password is crossed to being encrypted by them using the private file of middle electronic equipment, it is ensured that the personal secrets of user are improved and used The usage experience at family.
It will be appreciated by those skilled in the art that it is only carried out for each unit that above-described embodiment includes according to function logic It divides, but is not limited to above-mentioned division, as long as corresponding function can be realized;In addition, the tool of each functional unit Body title is also only to facilitate mutually distinguish, the protection domain being not intended to restrict the invention.
Those of ordinary skill in the art are further appreciated that all or part of the steps of the method in the foregoing embodiments are can It is completed with instructing relevant hardware by program, the program can be stored in a computer read/write memory medium In, the storage medium, including ROM/RAM, disk, CD etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention All any modification, equivalent and improvement made within refreshing and principle etc., should all be included in the protection scope of the present invention.

Claims (8)

1. a kind of method of file encryption, applied to electronic equipment, which is characterized in that the described method comprises the following steps:
Whether detection pre-set user sends out file encryption instruction;
Obtain the facial characteristics of active user;
According to the facial characteristics and file encryption instruction control of the facial characteristics of pre-set user and the acquisition to electronics Predetermined encryption file in equipment is encrypted;
It is described that control pair is instructed according to the facial characteristics of pre-set user and the facial characteristics of the acquisition and the file encryption The step of predetermined encryption file in electronic equipment is encrypted, including:
The facial characteristics of the facial characteristics of the acquisition and pre-set user is compared;
File encryption instruction, and the phase of the facial characteristics of the acquisition and the facial characteristics of pre-set user are had issued in pre-set user When being less than default similarity threshold like degree, the predetermined encryption file in electronic equipment is encrypted.
2. according to the method described in claim 1, it is characterized in that, whether the detection pre-set user sends out file encryption instruction The step of, including:
When active user carries out picture/video tour, the sound of ambient enviroment is monitored;
The voiceprint of the sound listened to default voiceprint is matched, and language is carried out to the sound listened to Speech identification;
Reach preset matching degree threshold value, and institute in the voiceprint of the sound listened to and the matching degree of default voiceprint State the sound that listens to carry out the content after language identification it is identical with preset language information when, then be judged as that pre-set user has issued File encryption instructs.
3. according to the method described in claim 2, it is characterized in that, the acquisition modes of the facial characteristics of the active user are logical The camera for crossing electronic equipment shoots active user, and the face of active user is obtained according to default face recognition algorithm Feature.
4. it according to the method described in claim 1, it is characterized in that, in the facial characteristics according to pre-set user and described obtains The step of predetermined encryption file in electronic equipment is encrypted in the facial characteristics taken and file encryption instruction control Later, it is further comprising the steps of:
Whether detection pre-set user sends out file decryption instruction, and reacquires the facial characteristics of active user;
File decryption instruction is had issued, and the facial characteristics of the reacquisition is similar to default facial characteristics in pre-set user When degree is more than default similarity threshold, the predetermined encryption file in electronic equipment is decrypted.
5. a kind of electronic equipment, which is characterized in that the electronic equipment includes:
Detection unit, for detecting whether pre-set user sends out file encryption instruction;
Acquiring unit, for obtaining the facial characteristics of active user;
Control unit refers to for the facial characteristics and the file encryption of the facial characteristics according to pre-set user and the acquisition Enable control that the predetermined encryption file in electronic equipment is encrypted;
Described control unit includes:
Contrast subunit compares the facial characteristics of the facial characteristics of the acquisition and pre-set user;
Encryption sub-unit operable, for having issued file encryption instruction in pre-set user, and the facial characteristics of the acquisition is used with default When the similarity of the facial characteristics at family is less than default similarity threshold, the predetermined encryption file in electronic equipment is encrypted.
6. electronic equipment according to claim 5, which is characterized in that the detection unit includes:
Subelement is monitored, for when active user carries out picture/video tour, monitoring the sound of ambient enviroment;
Match cognization subelement, for the voiceprint of the sound listened to be matched with default voiceprint, and to institute It states the sound listened to and carries out language identification;
Judgment sub-unit, for reaching default in the voiceprint of the sound listened to and the matching degree of default voiceprint Matching degree threshold value, and the sound that listens to carry out the content after language identification it is identical with preset language information when, then judge File encryption instruction is had issued for pre-set user.
7. electronic equipment according to claim 6, which is characterized in that the acquisition modes of the facial characteristics of the active user Obtain active user's to be shot by the camera of electronic equipment to active user, and according to default face recognition algorithm Facial characteristics.
8. electronic equipment according to claim 5, which is characterized in that described control unit further includes:
Detection sub-unit, for detecting whether pre-set user sends out file decryption instruction;
Subelement is controlled, for acquiring unit to be controlled to reacquire the facial characteristics of active user;
Decrypt subelement, for having issued file decryption instruction in pre-set user, and the facial characteristics of the reacquisition with it is pre- If the similarity of facial characteristics is more than default similarity threshold, the predetermined encryption file in electronic equipment is decrypted.
CN201510517473.3A 2015-08-22 2015-08-22 The method and electronic equipment of a kind of file encryption Active CN105138885B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510517473.3A CN105138885B (en) 2015-08-22 2015-08-22 The method and electronic equipment of a kind of file encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510517473.3A CN105138885B (en) 2015-08-22 2015-08-22 The method and electronic equipment of a kind of file encryption

Publications (2)

Publication Number Publication Date
CN105138885A CN105138885A (en) 2015-12-09
CN105138885B true CN105138885B (en) 2018-06-26

Family

ID=54724230

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510517473.3A Active CN105138885B (en) 2015-08-22 2015-08-22 The method and electronic equipment of a kind of file encryption

Country Status (1)

Country Link
CN (1) CN105138885B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103400082A (en) * 2013-08-16 2013-11-20 中科创达软件股份有限公司 File encryption/decryption method and system
CN103730120A (en) * 2013-12-27 2014-04-16 深圳市亚略特生物识别科技有限公司 Voice control method and system for electronic device
CN104376011A (en) * 2013-08-14 2015-02-25 华为终端有限公司 Privacy protection implementing method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101971697B1 (en) * 2012-02-24 2019-04-23 삼성전자주식회사 Method and apparatus for authenticating user using hybrid biometrics information in a user device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104376011A (en) * 2013-08-14 2015-02-25 华为终端有限公司 Privacy protection implementing method and device
CN103400082A (en) * 2013-08-16 2013-11-20 中科创达软件股份有限公司 File encryption/decryption method and system
CN103730120A (en) * 2013-12-27 2014-04-16 深圳市亚略特生物识别科技有限公司 Voice control method and system for electronic device

Also Published As

Publication number Publication date
CN105138885A (en) 2015-12-09

Similar Documents

Publication Publication Date Title
CN106412907B (en) Network access method, related equipment and system
WO2016078541A1 (en) Apparatus and method for improving security of terminal
WO2016173264A1 (en) Electronic data protection method and device, and terminal device
US10311278B2 (en) Method for encrypting application and terminal
US20220019690A1 (en) Image privacy protection method, apparatus and device
CN106022157A (en) Cloud and local secure storage method and device
WO2016061899A1 (en) Fingerprint decryption method and device
CN104135605A (en) Method and device for taking a picture
US9044855B2 (en) Processing context information
WO2016192165A1 (en) Data encryption method and apparatus
CN103824030A (en) Data protection device and data protection method
US9276748B2 (en) Data-encrypting method and decrypting method for a mobile phone
CN104253805A (en) Browser and data protection method thereof
CN107748847A (en) A kind of browsing method, storage medium and the mobile terminal of user's secret file
KR101052294B1 (en) Apparatus and method for contents security
WO2017020437A1 (en) Information encryption method and terminal device
WO2020073916A1 (en) Encryption method and apparatus for storage device, and storage medium
CN102902933B (en) Based on the file saving method of file fragmentation process
CN105337742A (en) LFSR (Linear Feedback Shift Register) file encryption and decryption methods based on human face image features and GPS (Global Position System) information
CN205788194U (en) A kind of high in the clouds and local secure storage data and the device of file
WO2015196642A1 (en) Data encryption method, decryption method and device
CN105138885B (en) The method and electronic equipment of a kind of file encryption
CN105787329A (en) Encryption method and system based on synthetic recognition
WO2014190630A1 (en) Method and mobile terminal for customizing dedicated system
CN105025203A (en) Image encryption and decryption method combining physiological features and image capture device thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20180510

Address after: 100000 10 Jiuxianqiao North Road, Chaoyang District, Beijing, 9

Applicant after: BEIJING CHUANGXIN JOURNEY NETWORK TECHNOLOGY CO., LTD.

Address before: 239000 room 7, 2 unit, 333 Hu Xin Road, Nan Qiao District, Chuzhou, Anhui, 502

Applicant before: Liu Yong

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant