CN105138885B - The method and electronic equipment of a kind of file encryption - Google Patents
The method and electronic equipment of a kind of file encryption Download PDFInfo
- Publication number
- CN105138885B CN105138885B CN201510517473.3A CN201510517473A CN105138885B CN 105138885 B CN105138885 B CN 105138885B CN 201510517473 A CN201510517473 A CN 201510517473A CN 105138885 B CN105138885 B CN 105138885B
- Authority
- CN
- China
- Prior art keywords
- facial characteristics
- file
- electronic equipment
- user
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention belongs to field of encryption, provide the method and electronic equipment of a kind of file encryption.In embodiments of the present invention, by detecting whether pre-set user sends out file encryption instruction, and obtain the facial characteristics of active user, the predetermined encryption file in electronic equipment is encrypted according to the facial characteristics and file encryption instruction control of the facial characteristics of pre-set user and the acquisition, so that other people are in the electronic equipment for using oneself, user can be by password to being encrypted by them using the private file of middle electronic equipment, ensure the personal secrets of user, improve the usage experience of user.
Description
Technical field
The invention belongs to field of encryption more particularly to the methods and electronic equipment of a kind of file encryption.
Background technology
Encryption is as a kind of mode for ensureing data safety, it is not now just to have, and the history of its generation is quite remote,
It is initiated by being traced in B.C. 2000(Several centuries)Although its not now encryption technology that we are said
(Encryption is not cried even), but a kind of encrypted concept is used as, just it is born really before several centuries.Egyptian was most at that time
Special pictograph is first used as information coding, as time goes by, Babylon, Mesopotamia and Greece's civilization
All begin to use certain methods to protect their written information.
Generally all there are privacy photo or video on electronic equipment at present, be easy to cause when electronic equipment is used by others
Privacy leakage brings great body and mind to perplex to user.
Invention content
The embodiment of the present invention is designed to provide a kind of method of the file encryption applied to electronic equipment, it is intended to solve
The problem of easy privacy of purpose electronic equipment leaks.
To solve the above-mentioned problems, the invention is realized in this way:A kind of method of file encryption, sets applied to electronics
It is standby, it the described method comprises the following steps:
Whether detection pre-set user sends out file encryption instruction;
Obtain the facial characteristics of active user;
According to the facial characteristics of pre-set user and the facial characteristics of the acquisition and file encryption instruction control pair
Predetermined encryption file in electronic equipment is encrypted.
Further, the step of whether the detection pre-set user sends out file encryption instruction, including:
When active user carries out picture/video tour, the sound of ambient enviroment is monitored;
The voiceprint of the sound listened to is matched with default voiceprint, and to the sound listened into
Row language identification;
Reach preset matching degree threshold value in the voiceprint of the sound listened to and the matching degree of default voiceprint,
And the sound that listens to carry out the content after language identification it is identical with preset language information when, then be judged as pre-set user hair
File encryption instruction is gone out.
Further, the acquisition modes of the facial characteristics of the active user are the camera by electronic equipment to current
User is shot, and the facial characteristics of active user is obtained according to default face recognition algorithm.
Further, it is described to be added according to the facial characteristics of pre-set user and the facial characteristics of the acquisition and the file
The step of predetermined encryption file in electronic equipment is encrypted in close instruction control, including:
The facial characteristics of the facial characteristics of the acquisition and pre-set user is compared;
File encryption instruction, and the facial characteristics of the facial characteristics of the acquisition and pre-set user are had issued in pre-set user
Similarity when being less than default similarity threshold, the predetermined encryption file in electronic equipment is encrypted.
Further, in the facial characteristics and the file of the facial characteristics according to pre-set user and the acquisition
It is further comprising the steps of after the step of predetermined encryption file in electronic equipment is encrypted in encrypted instruction control:
Whether detection pre-set user sends out file decryption instruction, and reacquires the facial characteristics of active user;
File decryption instruction, and the facial characteristics of the reacquisition and default facial characteristics are had issued in pre-set user
When similarity is more than default similarity threshold, the predetermined encryption file in electronic equipment is decrypted.
The embodiment of the present invention additionally provides electronic equipment described in a kind of electronic equipment and includes:
Detection unit, for detecting whether pre-set user sends out file encryption instruction;
Acquiring unit, for obtaining the facial characteristics of active user;
Control unit adds for the facial characteristics and the file of the facial characteristics according to pre-set user and the acquisition
The predetermined encryption file in electronic equipment is encrypted in close instruction control.
Further, the detection unit includes:
Subelement is monitored, for when active user carries out picture/video tour, monitoring the sound of ambient enviroment;
Match cognization subelement, for the voiceprint of the sound listened to be matched with default voiceprint, and
Language identification is carried out to the sound listened to;
Judgment sub-unit, for reaching in the matching degree of the voiceprint and default voiceprint of the sound listened to
Preset matching degree threshold value, and the sound that listens to carry out the content after language identification it is identical with preset language information when, then
It is judged as that pre-set user has issued file encryption instruction.
Further, the acquisition modes of the facial characteristics of the active user are the camera by electronic equipment to current
User is shot, and the facial characteristics of active user is obtained according to default face recognition algorithm.
Further, described control unit includes:
Contrast subunit compares the facial characteristics of the facial characteristics of the acquisition and pre-set user;
Encryption sub-unit operable, for having issued file encryption instruction in pre-set user, and the facial characteristics of the acquisition with it is pre-
If the similarity of the facial characteristics of user is less than default similarity threshold, the predetermined encryption file in electronic equipment is added
It is close.
Further, described control unit further includes:
Detection sub-unit, for detecting whether pre-set user sends out file decryption instruction;
Subelement is controlled, for acquiring unit to be controlled to reacquire the facial characteristics of active user;
Subelement is decrypted, for having issued file decryption instruction, and the facial characteristics of the reacquisition in pre-set user
When being more than default similarity threshold with the similarity of default facial characteristics, the predetermined encryption file in electronic equipment is solved
It is close.
In embodiments of the present invention, by detecting whether pre-set user sends out file encryption instruction, and active user is obtained
Facial characteristics, according to the facial characteristics of the facial characteristics of pre-set user and the acquisition and file encryption instruction control
Predetermined encryption file in electronic equipment is encrypted so that, in the electronic equipment for using oneself own, user can lead to for other people
Password is crossed to being encrypted by them using the private file of middle electronic equipment, it is ensured that the personal secrets of user are improved and used
The usage experience at family.
Description of the drawings
Fig. 1 is the flow chart of the method for the file encryption provided in an embodiment of the present invention applied to electronic equipment;
Fig. 2 is the flow chart of the method for the file encryption applied to electronic equipment that first embodiment of the invention provides;
Fig. 3 is the flow chart of the method for the file encryption applied to electronic equipment that second embodiment of the invention provides;
Fig. 4 is the flow chart of the method for the file encryption applied to electronic equipment that third embodiment of the invention provides;
Fig. 5 is the circuit theory schematic diagram of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, it is right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
The specific implementation of the present invention is described in detail below in conjunction with specific embodiment:
Fig. 1 shows the flow of the method for the file encryption provided in an embodiment of the present invention applied to electronic equipment, in order to
Convenient for explanation, only list with the relevant part of the embodiment of the present invention, details are as follows:
The method of file encryption provided in an embodiment of the present invention applied to electronic equipment, includes the following steps:
Whether step S10, detection pre-set user send out file encryption instruction.In embodiments of the present invention, when the electricity of user
When sub- equipment is used by others, user aside sees, wireless control electronic equipment can be instructed by file encryption to default
Encrypt file(Private file)Be encrypted, by detect pre-set user whether send out file encryption instruction may determine that user
Electronic equipment whether be used by others.
It should be noted that in embodiments of the present invention, electronic equipment include but not limited to computer, mobile phone, tablet computer,
Electronic reader etc..
Step S20 obtains the facial characteristics of active user.In embodiments of the present invention, the facial characteristics of active user
Acquisition modes are obtained according to default face recognition algorithm and are worked as to be shot by the camera of electronic equipment to active user
The facial characteristics of preceding user.
Step S30, according to the facial characteristics of pre-set user and the facial characteristics obtained and file encryption instruction control pair
Predetermined encryption file in electronic equipment is encrypted.
In embodiments of the present invention, after user sends out file encryption instruction, the user before the camera of electronic equipment
Take pictures determining whether(Owner)Then user is controlled whether according to judging result and file encryption instruction to predetermined encryption
File is encrypted.
Embodiment one:
Fig. 2 shows first embodiment of the invention provide the file encryption applied to electronic equipment method flow,
For convenience of description, only list with the relevant part of the embodiment of the present invention, details are as follows:
As a preferred embodiment of the present invention, step S10, including:
Step S101 when active user carries out picture/video tour, monitors the sound of ambient enviroment, i.e., may relate to
And the file type of privacy(User has carried out the type that the file of encryption setting belongs to, and refers to picture or video in the present invention)
When by browsing or viewing, the sound of ambient enviroment is begun listening for, to judge whether there is the file encryption of owner user's transmission
Instruction(Code word), instructed for example, being provided with a file encryption before owner user(Code word), command content is:Three sound of cough, such as
Fruit listens to, then it represents that owner user has issued the control instruction that the predetermined encryption file of electronic equipment is encrypted.
Step S102 matches the voiceprint of the sound listened to default voiceprint, and to listening to
Sound carries out language identification.In embodiments of the present invention, the voiceprint of the sound listened to and default voiceprint are carried out
Matching mainly judge the sound listened to whether be owner user sound, then to listen to content progress language knowledge
Not, determine whether preset encrypted instruction(Code word).
Step S103 reaches preset matching degree in the voiceprint of the sound listened to and the matching degree of default voiceprint
Threshold value, and the sound that listens to carry out the content after language identification it is identical with preset language information when, then be judged as pre-set user
Have issued file encryption instruction.
Embodiment two:
Fig. 3 shows the flow of the method for the file encryption applied to electronic equipment that second embodiment of the invention provides,
For convenience of description, only list with the relevant part of the embodiment of the present invention, details are as follows:
As a preferred embodiment of the present invention, step S30 includes:
Step S301 compares the facial characteristics of the facial characteristics of acquisition and pre-set user;
Step S302 has issued file encryption instruction, and the facial characteristics obtained and the face of pre-set user in pre-set user
When the similarity of portion's feature is less than default similarity threshold, the predetermined encryption file in electronic equipment is encrypted.
In embodiments of the present invention, the similarity of the facial characteristics of the facial characteristics and pre-set user of acquisition is less than default phase
During like degree threshold value, surface is not owner user using the user of electronic equipment, and file is had issued having received owner user
Encrypted instruction is then encrypted the predetermined encryption file in electronic equipment, improves the safety of privacy of user file.
Embodiment three:
Fig. 4 shows the flow of the method for the file encryption applied to electronic equipment that third embodiment of the invention provides,
For convenience of description, only list with the relevant part of the embodiment of the present invention, details are as follows:
As a preferred embodiment of the present invention, after step S30, it is further comprising the steps of:
Whether step S40, detection pre-set user send out file decryption instruction, and the face for reacquiring active user is special
Sign;
Step S50 has issued file decryption instruction, and the facial characteristics reacquired and default face are special in pre-set user
When the similarity of sign is more than default similarity threshold, the predetermined encryption file in electronic equipment is decrypted.
The embodiment of the present invention is mainly to the encryption after predetermined encryption file encryption, when meeting decryption condition to electricity
Predetermined encryption file in sub- equipment is decrypted.
Fig. 5 shows the circuit theory schematic diagram of electronic equipment provided in an embodiment of the present invention, for convenience of description, only arranges
Go out with the relevant part of the embodiment of the present invention, details are as follows:
Electronic equipment provided in an embodiment of the present invention, including detection unit 100, acquiring unit 200 and control unit
300;
Detection unit 100 is used to detect whether pre-set user sends out file encryption instruction;Acquiring unit 200 is worked as obtaining
The facial characteristics of preceding user;Control unit 300 is used for the facial characteristics according to pre-set user and the facial characteristics and text of acquisition
The predetermined encryption file in electronic equipment is encrypted in the control of part encrypted instruction.
As a preferred embodiment of the present invention, detection unit 100 includes monitoring subelement 101, match cognization subelement 102
And judgment sub-unit 103:
Subelement 101 is monitored, for when active user carries out picture/video tour, monitoring the sound of ambient enviroment;
With identification subelement 102, for the voiceprint of the sound listened to be matched with default voiceprint, and to listening to
Sound carry out language identification;Judgment sub-unit 103, in the voiceprint of the sound listened to and default voiceprint
Matching degree reaches preset matching degree threshold value, and the content after the sound progress language identification listened to is identical with preset language information
When, then it is judged as that pre-set user has issued file encryption instruction.
As a preferred embodiment of the present invention, the acquisition modes of the facial characteristics of active user are taking the photograph by electronic equipment
As head shoots active user, and the facial characteristics of active user is obtained according to default face recognition algorithm.
As a preferred embodiment of the present invention, control unit 300 includes contrast subunit 301, encryption sub-unit operable 302, inspection
Survey subelement 303, control subelement 304 and decryption subelement 305;
Contrast subunit 301 compares the facial characteristics of the facial characteristics of acquisition and pre-set user;
Encryption sub-unit operable 302 is used to have issued file encryption instruction in pre-set user, and the facial characteristics obtained is with presetting
When the similarity of the facial characteristics of user is less than default similarity threshold, the predetermined encryption file in electronic equipment is added
It is close;Detection sub-unit 303 is used to detect whether pre-set user sends out file decryption instruction;Control subelement 304 obtains for controlling
Unit is taken to reacquire the facial characteristics of active user;Decryption subelement 305 refers to for having issued file decryption in pre-set user
It enables, and when the similarity of facial characteristics and the default facial characteristics reacquired is more than default similarity threshold, to electronic equipment
In predetermined encryption file be decrypted.
Electronic equipment provided in an embodiment of the present invention is with above application in the implementation of the method for the file encryption of electronic equipment
Example is corresponding, and operation principle and mode are corresponding applicable, just repeat no more here.
In embodiments of the present invention, by detecting whether pre-set user sends out file encryption instruction, and active user is obtained
Facial characteristics, according to the facial characteristics of the facial characteristics of pre-set user and the acquisition and file encryption instruction control
Predetermined encryption file in electronic equipment is encrypted so that, in the electronic equipment for using oneself own, user can lead to for other people
Password is crossed to being encrypted by them using the private file of middle electronic equipment, it is ensured that the personal secrets of user are improved and used
The usage experience at family.
It will be appreciated by those skilled in the art that it is only carried out for each unit that above-described embodiment includes according to function logic
It divides, but is not limited to above-mentioned division, as long as corresponding function can be realized;In addition, the tool of each functional unit
Body title is also only to facilitate mutually distinguish, the protection domain being not intended to restrict the invention.
Those of ordinary skill in the art are further appreciated that all or part of the steps of the method in the foregoing embodiments are can
It is completed with instructing relevant hardware by program, the program can be stored in a computer read/write memory medium
In, the storage medium, including ROM/RAM, disk, CD etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
All any modification, equivalent and improvement made within refreshing and principle etc., should all be included in the protection scope of the present invention.
Claims (8)
1. a kind of method of file encryption, applied to electronic equipment, which is characterized in that the described method comprises the following steps:
Whether detection pre-set user sends out file encryption instruction;
Obtain the facial characteristics of active user;
According to the facial characteristics and file encryption instruction control of the facial characteristics of pre-set user and the acquisition to electronics
Predetermined encryption file in equipment is encrypted;
It is described that control pair is instructed according to the facial characteristics of pre-set user and the facial characteristics of the acquisition and the file encryption
The step of predetermined encryption file in electronic equipment is encrypted, including:
The facial characteristics of the facial characteristics of the acquisition and pre-set user is compared;
File encryption instruction, and the phase of the facial characteristics of the acquisition and the facial characteristics of pre-set user are had issued in pre-set user
When being less than default similarity threshold like degree, the predetermined encryption file in electronic equipment is encrypted.
2. according to the method described in claim 1, it is characterized in that, whether the detection pre-set user sends out file encryption instruction
The step of, including:
When active user carries out picture/video tour, the sound of ambient enviroment is monitored;
The voiceprint of the sound listened to default voiceprint is matched, and language is carried out to the sound listened to
Speech identification;
Reach preset matching degree threshold value, and institute in the voiceprint of the sound listened to and the matching degree of default voiceprint
State the sound that listens to carry out the content after language identification it is identical with preset language information when, then be judged as that pre-set user has issued
File encryption instructs.
3. according to the method described in claim 2, it is characterized in that, the acquisition modes of the facial characteristics of the active user are logical
The camera for crossing electronic equipment shoots active user, and the face of active user is obtained according to default face recognition algorithm
Feature.
4. it according to the method described in claim 1, it is characterized in that, in the facial characteristics according to pre-set user and described obtains
The step of predetermined encryption file in electronic equipment is encrypted in the facial characteristics taken and file encryption instruction control
Later, it is further comprising the steps of:
Whether detection pre-set user sends out file decryption instruction, and reacquires the facial characteristics of active user;
File decryption instruction is had issued, and the facial characteristics of the reacquisition is similar to default facial characteristics in pre-set user
When degree is more than default similarity threshold, the predetermined encryption file in electronic equipment is decrypted.
5. a kind of electronic equipment, which is characterized in that the electronic equipment includes:
Detection unit, for detecting whether pre-set user sends out file encryption instruction;
Acquiring unit, for obtaining the facial characteristics of active user;
Control unit refers to for the facial characteristics and the file encryption of the facial characteristics according to pre-set user and the acquisition
Enable control that the predetermined encryption file in electronic equipment is encrypted;
Described control unit includes:
Contrast subunit compares the facial characteristics of the facial characteristics of the acquisition and pre-set user;
Encryption sub-unit operable, for having issued file encryption instruction in pre-set user, and the facial characteristics of the acquisition is used with default
When the similarity of the facial characteristics at family is less than default similarity threshold, the predetermined encryption file in electronic equipment is encrypted.
6. electronic equipment according to claim 5, which is characterized in that the detection unit includes:
Subelement is monitored, for when active user carries out picture/video tour, monitoring the sound of ambient enviroment;
Match cognization subelement, for the voiceprint of the sound listened to be matched with default voiceprint, and to institute
It states the sound listened to and carries out language identification;
Judgment sub-unit, for reaching default in the voiceprint of the sound listened to and the matching degree of default voiceprint
Matching degree threshold value, and the sound that listens to carry out the content after language identification it is identical with preset language information when, then judge
File encryption instruction is had issued for pre-set user.
7. electronic equipment according to claim 6, which is characterized in that the acquisition modes of the facial characteristics of the active user
Obtain active user's to be shot by the camera of electronic equipment to active user, and according to default face recognition algorithm
Facial characteristics.
8. electronic equipment according to claim 5, which is characterized in that described control unit further includes:
Detection sub-unit, for detecting whether pre-set user sends out file decryption instruction;
Subelement is controlled, for acquiring unit to be controlled to reacquire the facial characteristics of active user;
Decrypt subelement, for having issued file decryption instruction in pre-set user, and the facial characteristics of the reacquisition with it is pre-
If the similarity of facial characteristics is more than default similarity threshold, the predetermined encryption file in electronic equipment is decrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510517473.3A CN105138885B (en) | 2015-08-22 | 2015-08-22 | The method and electronic equipment of a kind of file encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510517473.3A CN105138885B (en) | 2015-08-22 | 2015-08-22 | The method and electronic equipment of a kind of file encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105138885A CN105138885A (en) | 2015-12-09 |
CN105138885B true CN105138885B (en) | 2018-06-26 |
Family
ID=54724230
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510517473.3A Active CN105138885B (en) | 2015-08-22 | 2015-08-22 | The method and electronic equipment of a kind of file encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105138885B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103400082A (en) * | 2013-08-16 | 2013-11-20 | 中科创达软件股份有限公司 | File encryption/decryption method and system |
CN103730120A (en) * | 2013-12-27 | 2014-04-16 | 深圳市亚略特生物识别科技有限公司 | Voice control method and system for electronic device |
CN104376011A (en) * | 2013-08-14 | 2015-02-25 | 华为终端有限公司 | Privacy protection implementing method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101971697B1 (en) * | 2012-02-24 | 2019-04-23 | 삼성전자주식회사 | Method and apparatus for authenticating user using hybrid biometrics information in a user device |
-
2015
- 2015-08-22 CN CN201510517473.3A patent/CN105138885B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104376011A (en) * | 2013-08-14 | 2015-02-25 | 华为终端有限公司 | Privacy protection implementing method and device |
CN103400082A (en) * | 2013-08-16 | 2013-11-20 | 中科创达软件股份有限公司 | File encryption/decryption method and system |
CN103730120A (en) * | 2013-12-27 | 2014-04-16 | 深圳市亚略特生物识别科技有限公司 | Voice control method and system for electronic device |
Also Published As
Publication number | Publication date |
---|---|
CN105138885A (en) | 2015-12-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106412907B (en) | Network access method, related equipment and system | |
WO2016078541A1 (en) | Apparatus and method for improving security of terminal | |
WO2016173264A1 (en) | Electronic data protection method and device, and terminal device | |
US10311278B2 (en) | Method for encrypting application and terminal | |
US20220019690A1 (en) | Image privacy protection method, apparatus and device | |
CN106022157A (en) | Cloud and local secure storage method and device | |
WO2016061899A1 (en) | Fingerprint decryption method and device | |
CN104135605A (en) | Method and device for taking a picture | |
US9044855B2 (en) | Processing context information | |
WO2016192165A1 (en) | Data encryption method and apparatus | |
CN103824030A (en) | Data protection device and data protection method | |
US9276748B2 (en) | Data-encrypting method and decrypting method for a mobile phone | |
CN104253805A (en) | Browser and data protection method thereof | |
CN107748847A (en) | A kind of browsing method, storage medium and the mobile terminal of user's secret file | |
KR101052294B1 (en) | Apparatus and method for contents security | |
WO2017020437A1 (en) | Information encryption method and terminal device | |
WO2020073916A1 (en) | Encryption method and apparatus for storage device, and storage medium | |
CN102902933B (en) | Based on the file saving method of file fragmentation process | |
CN105337742A (en) | LFSR (Linear Feedback Shift Register) file encryption and decryption methods based on human face image features and GPS (Global Position System) information | |
CN205788194U (en) | A kind of high in the clouds and local secure storage data and the device of file | |
WO2015196642A1 (en) | Data encryption method, decryption method and device | |
CN105138885B (en) | The method and electronic equipment of a kind of file encryption | |
CN105787329A (en) | Encryption method and system based on synthetic recognition | |
WO2014190630A1 (en) | Method and mobile terminal for customizing dedicated system | |
CN105025203A (en) | Image encryption and decryption method combining physiological features and image capture device thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20180510 Address after: 100000 10 Jiuxianqiao North Road, Chaoyang District, Beijing, 9 Applicant after: BEIJING CHUANGXIN JOURNEY NETWORK TECHNOLOGY CO., LTD. Address before: 239000 room 7, 2 unit, 333 Hu Xin Road, Nan Qiao District, Chuzhou, Anhui, 502 Applicant before: Liu Yong |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |