CN105893854A - Encryption and decryption method and device - Google Patents

Encryption and decryption method and device Download PDF

Info

Publication number
CN105893854A
CN105893854A CN201610190772.5A CN201610190772A CN105893854A CN 105893854 A CN105893854 A CN 105893854A CN 201610190772 A CN201610190772 A CN 201610190772A CN 105893854 A CN105893854 A CN 105893854A
Authority
CN
China
Prior art keywords
object content
described object
user
encrypted
drag operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610190772.5A
Other languages
Chinese (zh)
Other versions
CN105893854B (en
Inventor
卢镇洲
朱印
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610190772.5A priority Critical patent/CN105893854B/en
Publication of CN105893854A publication Critical patent/CN105893854A/en
Application granted granted Critical
Publication of CN105893854B publication Critical patent/CN105893854B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention relates to an encryption and decryption method and device, and belongs to the technical field of computers. The method includes the steps that dragging operation on target content on a terminal desktop by a user is detected, when it is determined that the dragged target content crosses a display interface of a terminal screen, if the target content is not encrypted, the technical scheme for encrypting the target content is carried out, the target content (like a certain APP, file, folder, picture or audio/video ) can be encrypted fast through the dragging operation, and the operation mode is simple, visual and convenient.

Description

Encryption and decryption method and device
Technical field
It relates to field of computer technology, particularly to a kind of encryption and decryption method and device.
Background technology
Along with the fast development of mobile terminal technology, user can use installation on mobile terminal whenever and wherever possible Application program is such as taken pictures, reads, watches video, is played game or communication etc..Along with mobile whole The reinforcement of end storage capacity, increasing user can store the information of some individuals in terminal, with convenient Oneself can inquire about use at any time.So, the security of the information of user's storage just becomes critically important.Existing It is: whole mobile terminal is encrypted that user is by deciphering to the security setting mode of mobile terminal content Display desktop could be entered and carry out consulting of information.Or, use third party's encryption software or setting option Certain application in terminal is encrypted, to protect the safety of information.
Summary of the invention
Disclosure embodiment provides a kind of encryption and decryption method and device.Described technical scheme is as follows:
First aspect according to disclosure embodiment, it is provided that a kind of encipher-decipher method, for terminal, the party Method includes:
User is for the drag operation of object content on terminal desktop in detection;
Determine whether described drag operation drags described object content and cross the display interface of terminal screen;
When determining that dragging described object content has crossed the display interface of terminal screen, it is determined that in described target Hold the most encrypted;
If described object content is the most encrypted, then described object content is encrypted;
If described object content is encrypted, then described object content is decrypted process.
Optionally, described object content includes: file, file, application program, picture or audio frequency and video.
Optionally, described described object content is encrypted, including:
Detect whether described user keeps the drag operation to described object content;
When described user keeps the drag operation to described object content, described object content is encrypted Process;
After described object content is encrypted, detect whether described user decontrols described target The drag operation of content;
If described user has decontroled the drag operation to described object content, then store described user to described The Crypted password of object content, completes the encryption to described object content.
Optionally, described be encrypted described object content includes:
Prompt the user whether to use biological characteristic to be encrypted;
It is encrypted if user selects to carry out biological characteristic, then starts the bio-identification template in terminal, connect Receive the input information of the biological characteristic of described user, according to the biological characteristic received, described object content is entered Row encryption.
Optionally, the described storage described user Crypted password to described object content, complete described target After the encryption of content, including:
Control the original position that described object content returns to before drag operation on described terminal desktop.
Optionally, described described object content is decrypted process, including:
Detect whether described user keeps the drag operation to described object content;
When described user keeps the drag operation to described object content, described object content is decrypted Process.
Optionally, described described object content is decrypted process, including:
Point out described user to input encrypted message, and determine that the encrypted message that described user inputs is the most correct;
If the encrypted message of described user input is correct, then described object content is decrypted, shows institute State object content to user.
Second aspect according to disclosure embodiment, it is provided that a kind of ciphering and deciphering device, for terminal, this dress Put and include:
Detection module, is configured to detect user for the drag operation of object content on terminal desktop;
First determines module, is configured to determine that whether described drag operation drags described object content and cross end The display interface of end screen;
Second determines module, is configured as determining that dragging described object content has crossed the display of terminal screen Interface, it is determined that described object content is the most encrypted;
First performs processing module, if it is the most encrypted to be configured to described object content, then to described target Content is encrypted;
Second performs processing module, encrypts if being configured to described object content, then in described target Hold and be decrypted process.
Optionally, described object content includes: file, file, application program, picture or audio frequency and video.
Optionally, described first execution processing module includes:
First detector unit, is configured to detect whether described user keeps the dragging to described object content to grasp Make;
Cryptographic processing unit, when being configured as the drag operation that described user keeps described object content, Described object content is encrypted;
Second detector unit, after being configured as being encrypted described object content, detection is described Whether user decontrols the drag operation to described object content;
Password memory cell, if being configured to described user to have decontroled the drag operation to described object content, Then store the described user Crypted password to described object content, complete the encryption to described object content.
Optionally, described first performs processing module, or described cryptographic processing unit is configured to: prompting Whether user uses biological characteristic to be encrypted;It is encrypted if user selects to carry out biological characteristic, then opens Bio-identification template in dynamic terminal, receives the input information of the biological characteristic of described user, according to being received Biological characteristic described object content is encrypted.
Optionally, described device also includes:
Control module, is configured to control described object content and returns to before drag operation on described terminal desktop Original position.
Optionally, described second execution processing module includes:
Detector unit, is configured to detect whether described user keeps the drag operation to described object content;
Decryption processing unit, when being configured as the drag operation that described user keeps described object content, Described object content is decrypted process.
Optionally, described second performs processing module, or decryption processing unit is configured to point out described use Family input encrypted message, and determine that the encrypted message that described user inputs is the most correct;If described user is defeated The encrypted message entered is correct, then be decrypted described object content, show that described object content is to user.
The third aspect according to disclosure embodiment, it is provided that a kind of ciphering and deciphering device, for terminal, including:
Processor;
For storing the memory of the executable instruction of processor;
Wherein, processor is configured to:
User is for the drag operation of object content on terminal desktop in detection;
Determine whether described drag operation drags described object content and cross the display interface of terminal screen;
When determining that dragging described object content has crossed the display interface of terminal screen, it is determined that in described target Hold the most encrypted;
If described object content is the most encrypted, then described object content is encrypted;
If described object content is encrypted, then described object content is decrypted process.
The technical scheme that disclosure embodiment provides can include following beneficial effect:
The technical program, and is being determined for the drag operation of object content on terminal desktop by detection user Drag target content has crossed the display interface of terminal screen, if described object content is the most encrypted, the most right The realization of the technical scheme that described object content is encrypted, quickly can be realized by drag operation At encryption to object content (such as certain APP, certain file or file, picture or audio frequency and video) Reason, mode of operation is simple, directly perceived, convenient.
It should be appreciated that it is only exemplary and explanatory that above general description and details hereinafter describe, The disclosure can not be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in specification and constitutes the part of this specification, it is shown that meet the disclosure Embodiment, and for explaining the principle of the disclosure together with specification.
Fig. 1 is the flow chart according to a kind of encipher-decipher method shown in an exemplary embodiment;
Fig. 2 to Fig. 5 is to carry out object content according to the drag target content shown in an exemplary embodiment The process schematic of encryption;
Fig. 6 is the block diagram according to a kind of ciphering and deciphering device shown in an exemplary embodiment;
Fig. 7 is the block diagram according to a kind of ciphering and deciphering device shown in an exemplary embodiment;
Fig. 8 is to perform processing module according to as shown in Figure 7 a kind of first shown in an exemplary embodiment Block diagram;
Fig. 9 is to perform processing module according to as shown in Figure 7 a kind of second shown in an exemplary embodiment Block diagram;
Figure 10 is the block diagram according to a kind of ciphering and deciphering device shown in an exemplary embodiment.
By above-mentioned accompanying drawing, it has been shown that the embodiment that the disclosure is clear and definite, hereinafter will be described in more detail. These accompanying drawings and word describe the scope being not intended to be limited disclosure design by any mode, but logical Crossing with reference to specific embodiment is the concept that those skilled in the art illustrate the disclosure.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Following retouches Stating when relating to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element. Embodiment described in following exemplary embodiment does not represent all embodiment party consistent with the disclosure Formula.On the contrary, they only with describe in detail in appended claims, the disclosure some in terms of mutually one The example of the apparatus and method caused.
The technical scheme that disclosure embodiment provides is applied to terminal, and this terminal can be to have screen display merit Can electronic equipment, such as the equipment such as mobile phone or panel computer, but be not limited to this, those skilled in the art Easy to understand, the embodiment of the present invention applies also for any mobile end with processor and display output device In end, it is particularly suited for having in the terminal of the display output device that multipoint-touch-technology realizes.It addition, should Bio-identification module it is provided with, if fingerprint identification module, voiceprint identification module are or/and image recognition mould in terminal Block etc., it is possible to be identified processing to the biological characteristic of electronic equipment holder input.It addition, this electronics sets Standby built-in processor, can process fast and effectively information, such as, carry out information at encryption and decryption The ability of reason.
Disclosure embodiment provides a kind of encipher-decipher method of application in terminal, can store in terminal File, file, picture or audio frequency and video and terminal on install application program carry out encryption and decryption process, Example, a kind of encryption and decryption technology scheme described by the disclosure can be: user is for terminal desktop in detection The drag operation of upper object content;Determine whether described drag operation drags described object content and cross end panel The display interface of curtain;When determining that dragging described object content has crossed the display interface of terminal screen, it is determined that Described object content is the most encrypted;If described object content is the most encrypted, then described object content is entered Row encryption;If described object content is encrypted, then described object content is decrypted process.Logical Cross and pull object content and just can realize the encryption and decryption to object content so that can be the most square in the operation of user Just the encryption and decryption to object content that completes processes.
Fig. 1 is the flow chart according to a kind of encipher-decipher method shown in an exemplary embodiment, this encryption and decryption side Method can apply in above-mentioned terminal.Seeing Fig. 1, this encipher-decipher method can include following several step:
In a step 101, detection user is for the drag operation of object content on terminal desktop;
Wherein, described object content includes: file, file, application program, picture or audio frequency and video.
In order to be more fully understood that the embodiment of the present invention, the touch screen technology to terminal realizes principle and carries out letter below Single introduction.Touch-screen, by touching detection part and touch screen controller forms, touches detection part and is arranged on aobvious Showing device screen front, (human body touch is similar to the touch-screen of electrostatic induction thin slice to be used for detecting user touch location Time, current sensing signal can be produced, touching detection part can be learnt by this current sensing signal of perception The contact of user), then associated touch information is sent to touch screen controller, touch screen controller receives After touching the touch information that transmitted of detection part, convert thereof into contact coordinate, then send to CPU (in Central Processing Unit) process, touch screen controller also can receive order that CPU sends and perform simultaneously.
Realizing principle based on above touch screen technology, detection user is in the target of display on terminal desktop The drag operation held can be just: user can be come the object content on terminal desktop by touch operation Display mark operates, and when user carries out touch control operation to terminal desktop, touch-screen will produce electric current sense Induction signal, touch detection part be may determine that by sensor current signal and detects the presence of operating of contacts, now, Touching detection part and send relevant touch information to touch screen controller, touch screen controller is according to reception To touch information determine that whether coordinate that operating of contacts is corresponding is the seat at the display mark place of object content Mark, when the coordinate at display mark place that the coordinate that the operating of contacts of user is corresponding is object content, determines User clicks on the display mark of the object content that have selected on terminal desktop, afterwards, determines the click behaviour of user Whether continue for scheduled duration, if continue for scheduled duration, then confirming that this object content to be entered by user Row drag operation.
Here, user by the display mark of display object content on a terminal screen is operated thus Realize the operation to object content, such as mobile object content, open the behaviour such as object content, delete target content Make.Wherein, when object content is file, picture or audio frequency and video, the display of object content is designated literary composition Part mark, picture identification or audio frequency and video mark, during object content during file, the display mark of object content Knowing is folder identifier, and when object content is application program, the display of object content is designated application program Icon.
In a step 102, determine whether described drag operation drags described object content and cross terminal screen Display interface;
When detecting that user to carry out drag operation to object content, then monitor the moving rail of this drag operation Mark, here, terminal can be come this dragging by the current sensing signal produced because of drag operation on touch-screen The track of operation detects, and judges whether this drag operation crosses end according to the motion track detected The display interface of end screen, when final on trajectory drag operation being detected exceedes the border of terminal display, Determine that described object content is the most encrypted.
In step 103, when determining that dragging described object content has crossed the display interface of terminal screen, then Determine that described object content is the most encrypted;
If described object content is the most encrypted, then perform step 104;
If described object content is encrypted, then perform step 105;
At step 104, described object content is encrypted;
In disclosure embodiment, described described object content is encrypted, may include that
Detect whether described user keeps the drag operation to described object content;
When described user keeps the drag operation to described object content, described object content is encrypted Process;
After described object content is encrypted, detect whether described user decontrols described target The drag operation of content;
If described user has decontroled the drag operation to described object content, then store described user to described The Crypted password of object content, completes the encryption to described object content.
Here it is possible to object content on terminal screen is shown what the touch control operation of mark produced by user Electric current determines whether user keeps the drag operation to object content or decontroled the dragging to object content Operation, when there being the electric current that object content shows the touch control operation marked on terminal screen, then confirms User keeps the drag operation to object content, when the display to object content produced on terminal screen marks Touch control operation current vanishes, then confirm user decontroled the drag operation to object content.
In disclosure embodiment, described be encrypted described object content may include that
Prompt the user whether to use biological characteristic to be encrypted;
It is encrypted if user selects to carry out biological characteristic, then starts the bio-identification template in terminal, connect Receive the input information of the biological characteristic of described user, according to the biological characteristic received, described object content is entered Row encryption.Here it is possible to by the bio-identification module arranged in terminal, such as fingerprint identification module, vocal print Identification module, or/and picture recognition module etc., gathers the biological characteristic of user's input and is identified.
In another embodiment, object content is encrypted and can also include: prompting user's input Object content is encrypted by numeral or graphical passwords information.
In disclosure embodiment, the described storage described user Crypted password to described object content, it is right to complete After the encryption of described object content, including:
Control the original position that described object content returns to before drag operation on described terminal desktop.Here, After detecting that user has decontroled the drag operation to object content, control object content return to before drag operation Original position on described terminal desktop.
In step 105, described object content is decrypted process.
In disclosure embodiment, described described object content is decrypted process, may include that
Detect whether described user keeps the drag operation to described object content;
When described user keeps the drag operation to described object content, described object content is decrypted Process.
In disclosure embodiment, described described object content is decrypted process, may include that
Point out described user to input encrypted message, and determine that the encrypted message that described user inputs is the most correct;
If the encrypted message of described user input is correct, then described object content is decrypted, shows institute State object content to user.
Seeing Fig. 2 to Fig. 5, giving of example is encrypted place by drag target content to object content The process of reason.User's drag target content A crosses the display border of terminal screen, and user is in target in prompting Appearance is encrypted, and user places a digit on the fingerprint identification module of terminal, and fingerprint identification module is to user The fingerprint of input is acquired and identifies, and is encrypted object content according to the finger print information collected, User unclamps the drag operation to object content, controls position on a terminal screen before object content returns to drag Put place.
In sum, the technical program by detection user for the drag operation of object content on terminal desktop, And determining that drag target content has crossed the display interface of terminal screen, if described object content is not added Close, then the realization to the technical scheme that described object content is encrypted, can be fast by drag operation The realization of speed is to object content (such as certain APP, certain file or file, picture or audio frequency and video) Encryption, mode of operation is simple, directly perceived, convenient.
Following for disclosure device embodiment, may be used for performing method of disclosure embodiment.For the disclosure The details not disclosed in device embodiment, refer to method of disclosure embodiment.
Fig. 6 is the block diagram according to a kind of ciphering and deciphering device 200 shown in an exemplary embodiment, this encryption and decryption Device 200 can pass through software, hardware or both be implemented in combination with become the some or all of of terminal, This terminal can be the electronic display unit such as mobile phone or panel computer.This ciphering and deciphering device 200 may include that
Detection module 201, can be configured to detect user for the dragging behaviour of object content on terminal desktop Make;
First determines module 202, can be configured to determine that whether described drag operation drags described object content Cross the display interface of terminal screen;
Second determines module 203, can be configured as determining that the described object content of dragging has crossed terminal screen Display interface, it is determined that described object content is the most encrypted;
First performs processing module 204, if it is the most encrypted to be configured to described object content, then to institute State object content to be encrypted;
Second performs processing module 205, encrypts if described object content can be configured to, then to described Object content is decrypted process.
In sum, the technical program by detection user for the drag operation of object content on terminal desktop, And determining that drag target content has crossed the display interface of terminal screen, if described object content is not added Close, then the realization to the technical scheme that described object content is encrypted, can be fast by drag operation The realization of speed is to object content (such as certain APP, certain file or file, picture or audio frequency and video) Encryption, mode of operation is simple, directly perceived, convenient.
Fig. 7 is the block diagram according to a kind of ciphering and deciphering device 300 shown in an exemplary embodiment, this encryption and decryption Device 300 can pass through software, hardware or both be implemented in combination with become the some or all of of terminal, This terminal can be the electronic display unit such as mobile phone or panel computer.This ciphering and deciphering device 300 may include that
Detection module 301, can be configured to detect user for the dragging behaviour of object content on terminal desktop Make;
First determines module 302, can be configured to determine that whether described drag operation drags described object content Cross the display interface of terminal screen;
Second determines module 303, can be configured as determining that the described object content of dragging has crossed terminal screen Display interface, it is determined that described object content is the most encrypted;
First performs processing module 304, if it is the most encrypted to be configured to described object content, then to institute State object content to be encrypted;
Second performs processing module 305, encrypts if described object content can be configured to, then to described Object content is decrypted process;
Control module 306, can be configured to control described object content and return to before drag operation in described terminal Original position on desktop.
Wherein, object content includes: file, file, application program, picture or audio frequency and video.
Seeing Fig. 8, the first execution processing module 304 as shown in Figure 7 may include that
First detector unit 3041, can be configured to detect whether described user keeps described object content Drag operation;
Cryptographic processing unit 3042, can be configured as described user and keep the dragging to described object content During operation, described object content is encrypted;
Second detector unit 3043, after can being configured as described object content is encrypted, Detect whether described user decontrols the drag operation to described object content;
Password memory cell 3044, has decontroled described object content if described user can be configured to Drag operation, then store the described user Crypted password to described object content, complete described object content Encryption.
Wherein, first performs processing module 304, or cryptographic processing unit 3042 can be configured to: carry Show whether user uses biological characteristic to be encrypted;It is encrypted, then if user selects to carry out biological characteristic Start the bio-identification template in terminal, receive the input information of the biological characteristic of described user, according to being connect Described object content is encrypted by the biological characteristic received.
Seeing Fig. 9, the second execution processing module 305 as shown in Figure 7 may include that
Detector unit 3051, can be configured to detect whether described user keeps dragging described object content Dynamic operation;
Decryption processing unit 3052, can be configured as described user and keep the dragging to described object content During operation, described object content is decrypted process.
Wherein, second performs processing module 305, or decryption processing unit 3052 can be additionally configured to carry Show that described user inputs encrypted message, and determine that the encrypted message that described user inputs is the most correct;If institute The encrypted message stating user's input is correct, then be decrypted described object content, show described object content To user.
In sum, the technical program by detection user for the drag operation of object content on terminal desktop, And determining that drag target content has crossed the display interface of terminal screen, if described object content is not added Close, then the realization to the technical scheme that described object content is encrypted, can be fast by drag operation The realization of speed is to object content (such as certain APP, certain file or file, picture or audio frequency and video) Encryption, mode of operation is simple, directly perceived, convenient.
About the device in above-described embodiment, wherein modules performs the concrete mode of operation relevant The embodiment of the method is described in detail, explanation will be not set forth in detail herein.
Refer to Figure 10, it illustrates a kind of shown in an exemplary embodiment for ciphering and deciphering device 400 Block diagram.Such as, device 400 can be the electronic display unit such as mobile phone or panel computer.
With reference to Figure 10, device 400 can include following one or more assembly: processes assembly 402, storage Device 404, power supply module 406, multimedia groupware 408, audio-frequency assembly 410, input/output (I/O) interface 412, sensor cluster 414, and communications component 416.
Process assembly 402 and generally control the integrated operation of device 400, such as with display, call, number The operation being associated according to communication, camera operation and record operation.Process assembly 402 and can include one or many Individual processor 420 performs instruction, to complete all or part of step of above-mentioned encipher-decipher method.Additionally, Process assembly 402 and can include one or more module, it is simple to process between assembly 402 and other assemblies Alternately.Such as, process assembly 402 and can include multi-media module, to facilitate multimedia groupware 408 and place Reason assembly 402 between mutual.
Memory 404 is configured to store various types of data to support the operation on device 400.This The example of a little data includes any application for operation on device 400 or the instruction of method, contacts number According to, telephone book data, message, picture, video etc..Memory 404 can be by any kind of volatibility Or non-volatile memory device or combinations thereof realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), Programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash memory, Disk or CD.
The various assemblies that power supply module 406 is device 400 provide electric power.Power supply module 406 can include electricity Management system, one or more power supplys, and other generate, manage and distribute electric power phase with for device 400 The assembly of association.
The screen of one output interface of offer that multimedia groupware 408 is included between device 400 and user. In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If Screen includes that touch panel, screen may be implemented as touch-screen, to receive the input signal from user. Touch panel includes that one or more touch sensor is with the gesture on sensing touch, slip and touch panel. Touch sensor can not only sense touch or the border of sliding action, but also detect and touch or slide behaviour Make relevant duration and pressure.In certain embodiments, multimedia groupware 308 includes that one preposition is taken the photograph As head and/or post-positioned pick-up head.When device 400 is in operator scheme, during such as screening-mode or video mode, Front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each front-facing camera and after Put camera can be a fixing optical lens system or there is focal length and optical zoom ability.
Audio-frequency assembly 410 is configured to output and/or input audio signal.Such as, audio-frequency assembly 410 includes One microphone (MIC), when device 400 is in operator scheme, such as call model, logging mode and voice During recognition mode, microphone is configured to receive external audio signal.The audio signal received can be entered One step is stored in memory 404 or sends via communications component 416.In certain embodiments, audio-frequency assembly 410 also include a loudspeaker, are used for exporting audio signal.
I/O interface 412 provides interface, above-mentioned peripheral interface for processing between assembly 402 and peripheral interface module Module can be keyboard, puts striking wheel, button etc..These buttons may include but be not limited to: home button, sound Amount button, start button and locking press button.
Sensor cluster 414 includes one or more sensor, for providing various aspects for device 400 State estimation.Such as, what sensor cluster 414 can detect device 400 opens/closed mode, assembly Relative positioning, such as assembly is display and the keypad of device 400, and sensor cluster 414 is all right The position of detection device 400 or 400 1 assemblies of device changes, existence that user contacts with device 400 or Do not exist, device 400 orientation or acceleration/deceleration and the temperature change of device 400.Sensor cluster 414 can To include proximity transducer, it is configured to when there is no any physical contact object near detecting. Sensor cluster 414 can also include optical sensor, such as CMOS or ccd image sensor, is used for becoming Use as in application.In certain embodiments, this sensor cluster 414 can also include acceleration transducer, Gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communications component 416 is configured to facilitate the logical of wired or wireless mode between device 400 and other equipment Letter.Device 400 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or they Combination.In one exemplary embodiment, communications component 416 receives wide from outside via broadcast channel The broadcast singal of broadcast management system or broadcast related information.In one exemplary embodiment, communications component 416 Also include near-field communication (NFC) module, to promote junction service.Such as, can be based on penetrating in NFC module Frequency identifies (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, indigo plant Tooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 400 can by one or more application specific integrated circuits (ASIC), Digital signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), Field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are real Existing, for the method performing the switching of above-mentioned display interface.
In the exemplary embodiment, a kind of non-transitory computer-readable storage medium including instruction is additionally provided Matter, such as, include the memory 304 of instruction, and above-mentioned instruction can be performed by the processor 420 of device 400 with complete Become above-mentioned encipher-decipher method.Such as, non-transitory computer-readable recording medium can be ROM, deposit at random Access to memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
A kind of non-transitory computer-readable recording medium, when the instruction in storage medium is by device 400 When reason device performs so that device 400 is able to carry out above-mentioned encipher-decipher method.
It should be appreciated that the disclosure is not limited to accurate knot described above and illustrated in the accompanying drawings Structure, and various modifications and changes can carried out without departing from the scope.The scope of the present disclosure is only by appended Claim limits.

Claims (15)

1. an encipher-decipher method, it is characterised in that for terminal, described method includes:
User is for the drag operation of object content on terminal desktop in detection;
Determine whether described drag operation drags described object content and cross the display interface of terminal screen;
When determining that dragging described object content has crossed the display interface of terminal screen, it is determined that in described target Hold the most encrypted;
If described object content is the most encrypted, then described object content is encrypted;
If described object content is encrypted, then described object content is decrypted process.
Method the most according to claim 1, it is characterised in that described object content includes: file, File, application program, picture or audio frequency and video.
Method the most according to claim 1, it is characterised in that described described object content is added Close process, including:
Detect whether described user keeps the drag operation to described object content;
When described user keeps the drag operation to described object content, described object content is encrypted Process;
After described object content is encrypted, detect whether described user decontrols described target The drag operation of content;
If described user has decontroled the drag operation to described object content, then store described user to described The Crypted password of object content, completes the encryption to described object content.
4. according to the method described in claim 1 or 3, it is characterised in that described described object content is entered Row encryption includes:
Prompt the user whether to use biological characteristic to be encrypted;
It is encrypted if user selects to carry out biological characteristic, then starts the bio-identification template in terminal, connect Receive the input information of the biological characteristic of described user, according to the biological characteristic received, described object content is entered Row encryption.
Method the most according to claim 3, it is characterised in that the described user of described storage is to described mesh The Crypted password of mark content, after completing the encryption to described object content, including:
Control the original position that described object content returns to before drag operation on described terminal desktop.
Method the most according to claim 1, it is characterised in that described described object content is solved Close process, including:
Detect whether described user keeps the drag operation to described object content;
When described user keeps the drag operation to described object content, described object content is decrypted Process.
7. according to the method described in claim 1 or 6, it is characterised in that described described object content is entered Row decryption processing, including:
Point out described user to input encrypted message, and determine that the encrypted message that described user inputs is the most correct;
If the encrypted message of described user input is correct, then described object content is decrypted, shows institute State object content to user.
8. a ciphering and deciphering device, it is characterised in that for terminal, described device includes:
Detection module, is configured to detect user for the drag operation of object content on terminal desktop;
First determines module, is configured to determine that whether described drag operation drags described object content and cross end The display interface of end screen;
Second determines module, is configured as determining that dragging described object content has crossed the display of terminal screen Interface, it is determined that described object content is the most encrypted;
First performs processing module, if it is the most encrypted to be configured to described object content, then to described target Content is encrypted;
Second performs processing module, encrypts if being configured to described object content, then in described target Hold and be decrypted process.
Device the most according to claim 8, it is characterised in that described object content includes: file, File, application program, picture or audio frequency and video.
Device the most according to claim 8, it is characterised in that described first performs processing module bag Include:
First detector unit, is configured to detect whether described user keeps the dragging to described object content to grasp Make;
Cryptographic processing unit, when being configured as the drag operation that described user keeps described object content, Described object content is encrypted;
Second detector unit, after being configured as being encrypted described object content, detection is described Whether user decontrols the drag operation to described object content;
Password memory cell, if being configured to described user to have decontroled the drag operation to described object content, Then store the described user Crypted password to described object content, complete the encryption to described object content.
Device described in 11. according to Claim 8 or 10, it is characterised in that described first execution processes mould Block, or described cryptographic processing unit is configured to: prompt the user whether to use biological characteristic to be encrypted; It is encrypted if user selects to carry out biological characteristic, then starts the bio-identification template in terminal, receive institute State the input information of the biological characteristic of user, according to the biological characteristic received, described object content is added Close.
12. devices according to claim 10, it is characterised in that described device also includes:
Control module, is configured to control described object content and returns to before drag operation on described terminal desktop Original position.
13. devices according to claim 8, it is characterised in that described second performs processing module bag Include:
Detector unit, is configured to detect whether described user keeps the drag operation to described object content;
Decryption processing unit, when being configured as the drag operation that described user keeps described object content, Described object content is decrypted process.
Device described in 14. according to Claim 8 or 13, it is characterised in that described second execution processes mould Block, or decryption processing unit is configured to point out described user to input encrypted message, and determine described user The encrypted message of input is the most correct;If the encrypted message of described user input is correct, then to described target Content is decrypted, and shows that described object content is to user.
15. 1 kinds of ciphering and deciphering devices, it is characterised in that for running the terminal having application program, including:
Processor;
For storing the memory of the executable instruction of described processor;
Wherein, described processor is configured to:
User is for the drag operation of object content on terminal desktop in detection;
Determine whether described drag operation drags described object content and cross the display interface of terminal screen;
When determining that dragging described object content has crossed the display interface of terminal screen, it is determined that in described target Hold the most encrypted;
If described object content is the most encrypted, then described object content is encrypted;
If described object content is encrypted, then described object content is decrypted process.
CN201610190772.5A 2016-03-30 2016-03-30 Encryption and decryption method and device Active CN105893854B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610190772.5A CN105893854B (en) 2016-03-30 2016-03-30 Encryption and decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610190772.5A CN105893854B (en) 2016-03-30 2016-03-30 Encryption and decryption method and device

Publications (2)

Publication Number Publication Date
CN105893854A true CN105893854A (en) 2016-08-24
CN105893854B CN105893854B (en) 2019-04-12

Family

ID=57014702

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610190772.5A Active CN105893854B (en) 2016-03-30 2016-03-30 Encryption and decryption method and device

Country Status (1)

Country Link
CN (1) CN105893854B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106384060A (en) * 2016-09-23 2017-02-08 维沃移动通信有限公司 Mobile terminal data encryption method and mobile terminal
CN106548078A (en) * 2016-10-20 2017-03-29 北京小米移动软件有限公司 Using encryption method and device
CN107220552A (en) * 2017-05-25 2017-09-29 维沃移动通信有限公司 A kind of encryption and decryption approaches and mobile terminal
CN108337355A (en) * 2017-01-19 2018-07-27 北京小米移动软件有限公司 Object Encryption Process and device
CN111382395A (en) * 2018-12-29 2020-07-07 北京小米移动软件有限公司 Control method and device of application icons

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103235903A (en) * 2013-04-12 2013-08-07 广东欧珀移动通信有限公司 Processing method and device for hiding programs of mobile terminal
CN104732121A (en) * 2015-03-24 2015-06-24 广东欧珀移动通信有限公司 Encryption setting method, decryption setting method and corresponding device of application program

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103235903A (en) * 2013-04-12 2013-08-07 广东欧珀移动通信有限公司 Processing method and device for hiding programs of mobile terminal
CN104732121A (en) * 2015-03-24 2015-06-24 广东欧珀移动通信有限公司 Encryption setting method, decryption setting method and corresponding device of application program

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106384060A (en) * 2016-09-23 2017-02-08 维沃移动通信有限公司 Mobile terminal data encryption method and mobile terminal
CN106384060B (en) * 2016-09-23 2019-11-15 维沃移动通信有限公司 A kind of mobile terminal data encryption method and mobile terminal
CN106548078A (en) * 2016-10-20 2017-03-29 北京小米移动软件有限公司 Using encryption method and device
CN108337355A (en) * 2017-01-19 2018-07-27 北京小米移动软件有限公司 Object Encryption Process and device
CN108337355B (en) * 2017-01-19 2020-10-13 北京小米移动软件有限公司 Object encryption method and device
CN107220552A (en) * 2017-05-25 2017-09-29 维沃移动通信有限公司 A kind of encryption and decryption approaches and mobile terminal
CN111382395A (en) * 2018-12-29 2020-07-07 北京小米移动软件有限公司 Control method and device of application icons

Also Published As

Publication number Publication date
CN105893854B (en) 2019-04-12

Similar Documents

Publication Publication Date Title
CN104503688B (en) The control method and device of intelligent hardware devices
CN104219058B (en) Authentication, identification authorization method and device
CN104503689B (en) Application interface display methods and device
CN104850769A (en) Method and device for executing operation
CN105389516A (en) Sensitive picture reminding method and apparatus
CN104008348A (en) Application program control method, application program control device and terminal
CN105893854A (en) Encryption and decryption method and device
CN105607805A (en) Corner mark processing method and apparatus for application icon
CN104850995A (en) Operation executing method and device
CN107102772A (en) Touch control method and device
CN107992257A (en) Split screen method and device
CN104391712A (en) Shutdown method and device
CN106909827A (en) Using account management method and device
CN105843503A (en) Application starting method and device as well as terminal equipment
CN107767133A (en) Virtual card opens chucking method, apparatus and system, storage medium
CN104036165A (en) Password processing method and device
CN106845199A (en) Object authentication method and device
CN107145797A (en) Display control method, device and the terminal device of application icon
CN106774802A (en) The reminding method of terminal power, device and terminal
CN105204712A (en) Method and device for displaying icons of folder
CN105046127A (en) Encryption and decryption method and apparatus
CN107197107A (en) Enabled instruction processing method and processing device
CN104506710B (en) Short message management method, terminal and device
CN106778198A (en) Perform the safety certifying method and device of operation
CN106778125A (en) unlocking method, device and equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant