CN105893854B - Encryption and decryption method and device - Google Patents

Encryption and decryption method and device Download PDF

Info

Publication number
CN105893854B
CN105893854B CN201610190772.5A CN201610190772A CN105893854B CN 105893854 B CN105893854 B CN 105893854B CN 201610190772 A CN201610190772 A CN 201610190772A CN 105893854 B CN105893854 B CN 105893854B
Authority
CN
China
Prior art keywords
object content
user
encrypted
drag operation
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610190772.5A
Other languages
Chinese (zh)
Other versions
CN105893854A (en
Inventor
卢镇洲
朱印
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610190772.5A priority Critical patent/CN105893854B/en
Publication of CN105893854A publication Critical patent/CN105893854A/en
Application granted granted Critical
Publication of CN105893854B publication Critical patent/CN105893854B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The disclosure belongs to field of computer technology about a kind of encryption and decryption method and device.This method is by detection user for the drag operation of object content on terminal desktop, and determining that drag target content crossed the display interface of terminal screen, if the object content is not encrypted, the realization for the technical solution that then object content is encrypted, it can quickly be realized by drag operation to object content (such as some APP, some file perhaps file picture or audio-video) encryption, mode of operation is simple, intuitive, conveniently.

Description

Encryption and decryption method and device
Technical field
This disclosure relates to field of computer technology, in particular to a kind of encryption and decryption method and device.
Background technique
With the fast development of mobile terminal technology, user can be whenever and wherever possible using the application journey installed on mobile terminal Sequence come taken pictures, read, watched video, play game or communication etc..With the reinforcement of mobile terminal storage capacity, more The information of some individuals can be stored at the terminal come more users, oneself can inquire use at any time to facilitate.So, user The safety of the information of storage just becomes critically important.The existing security setting mode to mobile terminal content is: to entire mobile Terminal is encrypted, and user just can enter the access that display desktop carries out information by decryption.Alternatively, being encrypted using third party soft Part or setting option encrypt to apply to some in terminal, to protect the safety of information.
Summary of the invention
The embodiment of the present disclosure provides a kind of encryption and decryption method and device.The technical solution is as follows:
According to the first aspect of the embodiments of the present disclosure, a kind of encipher-decipher method is provided, terminal is used for, this method comprises:
User is detected for the drag operation of object content on terminal desktop;
Determine whether the drag operation drags the display interface that the object content crosses terminal screen;
When the determining display interface for dragging the object content and having crossed terminal screen, it is determined that whether the object content It is encrypted;
If the object content is not encrypted, the object content is encrypted;
If the object content has encrypted, the object content is decrypted.
Optionally, the object content includes: file, file, application program, picture or audio-video.
It is optionally, described that the object content is encrypted, comprising:
Detect whether the user keeps drag operation to the object content;
When the user keeps the drag operation to the object content, the object content is encrypted;
After the object content is encrypted, detect whether the user decontrols to the object content Drag operation;
If the user has decontroled the drag operation to the object content, the user is stored in the target The Crypted password of appearance completes the encryption to the object content.
Optionally, the described object content is encrypted includes:
It prompts the user whether to be encrypted using biological characteristic;
If user selects to carry out biological characteristic to encrypt, start the bio-identification template in terminal, described in reception The input information of the biological characteristic of user encrypts the object content according to the received biological characteristic of institute.
Optionally, the storage user completes to the object content Crypted password of the object content After encryption, comprising:
It controls the object content and returns to original position before drag operation on the terminal desktop.
It is optionally, described that the object content is decrypted, comprising:
Detect whether the user keeps drag operation to the object content;
When the user keeps the drag operation to the object content, the object content is decrypted.
It is optionally, described that the object content is decrypted, comprising:
It prompts the user to input encrypted message, and determines whether the encrypted message of user's input is correct;
If the encrypted message of user's input is correct, the object content is decrypted, shows the target Content is to user.
According to the second aspect of an embodiment of the present disclosure, a kind of ciphering and deciphering device is provided, terminal is used for, which includes:
Detection module is configured as detection user for the drag operation of object content on terminal desktop;
First determining module, is configured to determine that whether the drag operation drags the object content and cross terminal screen Display interface;
Second determining module is configured as when the determining display interface for dragging the object content and having crossed terminal screen, Then determine whether the object content is encrypted;
First execute processing module, be not encrypted if being configured as the object content, to the object content into Row encryption;
Second executes processing module, has encrypted if being configured as the object content, carries out to the object content Decryption processing.
Optionally, the object content includes: file, file, application program, picture or audio-video.
Optionally, the first execution processing module includes:
First detection unit, is configured as detecting whether the user keeps drag operation to the object content;
Cryptographic processing unit is configured as when the user keeps the drag operation to the object content, to described Object content is encrypted;
Second detection unit is configured as after the object content is encrypted, and detecting the user is The no drag operation decontroled to the object content;
Password storage unit is deposited if being configured as the user has decontroled drag operation to the object content The user is stored up to the Crypted password of the object content, completes the encryption to the object content.
Optionally, the first execution processing module or the cryptographic processing unit are configured as: being prompted the user whether It is encrypted using biological characteristic;If user selects progress, biological characteristic is encrypted, and starts the bio-identification in terminal Template receives the input information of the biological characteristic of the user, is carried out according to the received biological characteristic of institute to the object content Encryption.
Optionally, described device further include:
Control module, be configured as controlling the object content return to it is original on the terminal desktop before drag operation At position.
Optionally, the second execution processing module includes:
Detection unit, is configured as detecting whether the user keeps drag operation to the object content;
Decryption processing unit is configured as when the user keeps the drag operation to the object content, to described Object content is decrypted.
Optionally, the second execution processing module or decryption processing unit are configured as that the user is prompted to input Encrypted message, and determine whether the encrypted message of user's input is correct;If the encrypted message of user's input is correct, Then the object content is decrypted, shows the object content to user.
According to the third aspect of an embodiment of the present disclosure, a kind of ciphering and deciphering device is provided, terminal is used for, comprising:
Processor;
The memory of executable instruction for storage processor;
Wherein, processor is configured as:
User is detected for the drag operation of object content on terminal desktop;
Determine whether the drag operation drags the display interface that the object content crosses terminal screen;
When the determining display interface for dragging the object content and having crossed terminal screen, it is determined that whether the object content It is encrypted;
If the object content is not encrypted, the object content is encrypted;
If the object content has encrypted, the object content is decrypted.
The technical solution that the embodiment of the present disclosure provides can include the following benefits:
The technical program drags mesh for the drag operation of object content on terminal desktop, and determining by detection user Mark content has crossed the display interface of terminal screen, if the object content is not encrypted, carries out to the object content The realization of the technical solution of encryption, can quickly be realized by drag operation to object content (such as some APP, some File perhaps file picture or audio-video) encryption, mode of operation is simple, intuitive, conveniently.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is a kind of flow chart of encipher-decipher method shown according to an exemplary embodiment;
Fig. 2 to Fig. 5 is drag target content shown according to an exemplary embodiment to carry out at encryption to object content The process schematic of reason;
Fig. 6 is a kind of block diagram of ciphering and deciphering device shown according to an exemplary embodiment;
Fig. 7 is a kind of block diagram of ciphering and deciphering device shown according to an exemplary embodiment;
Fig. 8 is the block diagram that one kind first as shown in Figure 7 shown according to an exemplary embodiment executes processing module;
Fig. 9 is the block diagram that one kind second as shown in Figure 7 shown according to an exemplary embodiment executes processing module;
Figure 10 is a kind of block diagram of ciphering and deciphering device shown according to an exemplary embodiment.
Through the above attached drawings, it has been shown that the specific embodiment of the disclosure will be hereinafter described in more detail.These attached drawings It is not intended to limit the scope of this disclosure concept by any means with verbal description, but is by referring to specific embodiments Those skilled in the art illustrate the concept of the disclosure.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
The technical solution that the embodiment of the present disclosure provides is applied to terminal, which can be the electricity with screen display function Sub- equipment, such as mobile phone or tablet computer equipment, but not limited to this, as it will be easily appreciated by one skilled in the art that the present invention is real Example is applied to apply also for being particularly suitable in any mobile terminal with processor and display output device with multi-point touch In the terminal for the display output device that technology is realized.In addition, bio-identification module is provided in the terminal, such as fingerprint recognition mould Block, voiceprint identification module or/and picture recognition module etc., the biological characteristic that can be inputted to electronic equipment holder identify Processing.In addition, the processor built in the electronic equipment, can quickly and effectively be handled information, such as information is carried out The ability of encryption and decryption processing.
The embodiment of the present disclosure provides a kind of encipher-decipher method applied at the terminal, can be to the text stored in terminal The application program installed in part, file, picture or audio-video and terminal carries out encryption and decryption processing, exemplary, disclosure institute A kind of encryption and decryption technology scheme of description can be with are as follows: drag operation of the detection user for object content on terminal desktop;It determines Whether the drag operation drags the display interface that the object content crosses terminal screen;The object content is dragged when determining The display interface of terminal screen is crossed, it is determined that whether the object content is encrypted;If the object content is not added It is close, then the object content is encrypted;If the object content has encrypted, the object content is solved Close processing.The encryption and decryption to object content can be realized by pulling object content, so that can be very square in the operation of user Just completion handles the encryption and decryption of object content.
Fig. 1 is a kind of flow chart of encipher-decipher method shown according to an exemplary embodiment, which can be with Applied in above-mentioned terminal.Referring to Fig. 1, which may include the following steps:
In a step 101, drag operation of the detection user for object content on terminal desktop;
Wherein, the object content includes: file, file, application program, picture or audio-video.
Embodiment for a better understanding of the present invention is below simply situated between to the touch screen technology realization principle of terminal It continues.Touch screen is made of touch detection component and touch screen controller, and touch detection component is mounted on before indicator screen, is used In detect user touch location (human body touch similar to electrostatic induction thin slice touch screen when, current sensing signal can be generated, touch Detection part can learn the contact of user by perceiving the current sensing signal), then associated touch information is sent to Touch screen controller converts thereof into contact after touch screen controller receives the touch information that touch detection component is transmitted Coordinate, then send CPU (central processing unit) to and handled, while touch screen controller can also receive the order that CPU is sent And it executes.
Based on above touch screen technology realization principle, user's dragging for the object content shown on terminal desktop is detected Dynamic operation are as follows: user can be grasped by touch operation come the display label to the object content on terminal desktop Make, when user carries out touch control operation to terminal desktop, touch screen will generate current sensing signal, and touch detection component passes through sense Answer current signal that can confirmly detect there are operating of contacts, at this point, touch detection component sends relevant touch information to Touch screen controller, touch screen controller determine whether the corresponding coordinate of operating of contacts is target according to the touch information received Coordinate where the display mark of content, where the corresponding coordinate of the operating of contacts of user is the display mark of object content It when coordinate, determines that user clicks the display mark for having selected the object content on terminal desktop, later, determines the click behaviour of user Whether continue for scheduled duration, if continue for scheduled duration, confirms that user will carry out drag operation to the object content.
Here, user carries out operation by the display mark of the object content to display on a terminal screen to realization pair The operation of object content, such as mobile object content, opening object content, the operation of delete target content.Wherein, work as object content Be file, picture perhaps audio-video when object content display be identified as file identification, picture identification or audio-video mark, When object content when file, the display of object content is identified as folder identifier, when object content is application program, in target The display of appearance is identified as the icon of application program.
In a step 102, determine whether the drag operation drags display circle that the object content crosses terminal screen Face;
When detecting that user will carry out drag operation to object content, then the motion track of the drag operation is monitored, this In, terminal can be by examining the track of the drag operation because of the current sensing signal of drag operation generation on touch screen It surveys, and judges whether the drag operation crosses the display interface of terminal screen according to the motion track detected, when detecting When the final on trajectory of drag operation is more than the boundary of terminal display, determine whether the object content is encrypted.
In step 103, when the determining display interface for dragging the object content and having crossed terminal screen, it is determined that described Whether object content is encrypted;
If the object content is not encrypted, 104 are thened follow the steps;
If the object content has encrypted, 105 are thened follow the steps;
At step 104, the object content is encrypted;
It is described that the object content is encrypted in the embodiment of the present disclosure, may include:
Detect whether the user keeps drag operation to the object content;
When the user keeps the drag operation to the object content, the object content is encrypted;
After the object content is encrypted, detect whether the user decontrols to the object content Drag operation;
If the user has decontroled the drag operation to the object content, the user is stored in the target The Crypted password of appearance completes the encryption to the object content.
Here it is possible to by user on terminal screen object content display label touch control operation generate electric current come It determines whether user keeps the drag operation to object content or decontroled the drag operation to object content, works as terminal screen The electric current of the upper touch control operation for having the display label to object content, then confirm that user keeps the dragging to object content to grasp Make, when the touch control operation current vanishes of the display label to object content generated on terminal screen, then confirms that user decontrols To the drag operation of object content.
In the embodiment of the present disclosure, the described object content is encrypted may include:
It prompts the user whether to be encrypted using biological characteristic;
If user selects to carry out biological characteristic to encrypt, start the bio-identification template in terminal, described in reception The input information of the biological characteristic of user encrypts the object content according to the received biological characteristic of institute.Here it is possible to By the bio-identification module being arranged in terminal, such as fingerprint identification module, voiceprint identification module or/and picture recognition module, To acquire the biological characteristic of user's input and identify.
In another embodiment, object content is encrypted can also include: prompt user input number or Person's graphical passwords information encrypts object content.
In the embodiment of the present disclosure, the storage user completes to the mesh Crypted password of the object content After the encryption for marking content, comprising:
It controls the object content and returns to original position before drag operation on the terminal desktop.Here, it detects After having decontroled the drag operation to object content to user, control object content is returned to before drag operation on the terminal desktop Original position.
In step 105, the object content is decrypted.
It is described that the object content is decrypted in the embodiment of the present disclosure, may include:
Detect whether the user keeps drag operation to the object content;
When the user keeps the drag operation to the object content, the object content is decrypted.
It is described that the object content is decrypted in the embodiment of the present disclosure, may include:
It prompts the user to input encrypted message, and determines whether the encrypted message of user's input is correct;
If the encrypted message of user's input is correct, the object content is decrypted, shows the target Content is to user.
It is exemplary to give through drag target content the mistake that object content is encrypted referring to fig. 2 to Fig. 5 Journey.User's drag target content A crosses the display boundary of terminal screen, and user is prompted to encrypt object content, and user will Finger is put on the fingerprint identification module of terminal, and the fingerprint that fingerprint identification module inputs user is acquired and identifies, and Object content is encrypted according to collected finger print information, user unclamps the drag operation to object content, controls target Content returns at the position before dragging on a terminal screen.
In conclusion the drag operation that the technical program is directed to object content on terminal desktop by detecting user, and Determine that drag target content has crossed the display interface of terminal screen, if the object content is not encrypted, to the mesh The realization of technical solution that mark content is encrypted, can quickly be realized by drag operation to object content (such as certain A APP, some file perhaps file picture or audio-video) encryption, mode of operation is simple, intuitive, conveniently.
Following is embodiment of the present disclosure, can be used for executing embodiments of the present disclosure.It is real for disclosure device Undisclosed details in example is applied, embodiments of the present disclosure is please referred to.
Fig. 6 is a kind of block diagram of ciphering and deciphering device 200 shown according to an exemplary embodiment, the ciphering and deciphering device 200 Can being implemented in combination with as some or all of of terminal by software, hardware or both, the terminal can be mobile phone or The electronic display units such as person's tablet computer.The ciphering and deciphering device 200 may include:
Detection module 201 can be configured as detection user for the drag operation of object content on terminal desktop;
First determining module 202 can be configured as and determine whether the drag operation drags the object content and cross The display interface of terminal screen;
Second determining module 203 can be configured as when the determining dragging object content has crossed the aobvious of terminal screen Show interface, it is determined that whether the object content is encrypted;
First executes processing module 204, is not encrypted if can be configured as the object content, to the target Content is encrypted;
Second executes processing module 205, has encrypted if can be configured as the object content, in the target Appearance is decrypted.
In conclusion the drag operation that the technical program is directed to object content on terminal desktop by detecting user, and Determine that drag target content has crossed the display interface of terminal screen, if the object content is not encrypted, to the mesh The realization of technical solution that mark content is encrypted, can quickly be realized by drag operation to object content (such as certain A APP, some file perhaps file picture or audio-video) encryption, mode of operation is simple, intuitive, conveniently.
Fig. 7 is a kind of block diagram of ciphering and deciphering device 300 shown according to an exemplary embodiment, the ciphering and deciphering device 300 Can being implemented in combination with as some or all of of terminal by software, hardware or both, the terminal can be mobile phone or The electronic display units such as person's tablet computer.The ciphering and deciphering device 300 may include:
Detection module 301 can be configured as detection user for the drag operation of object content on terminal desktop;
First determining module 302 can be configured as and determine whether the drag operation drags the object content and cross The display interface of terminal screen;
Second determining module 303 can be configured as when the determining dragging object content has crossed the aobvious of terminal screen Show interface, it is determined that whether the object content is encrypted;
First executes processing module 304, is not encrypted if can be configured as the object content, to the target Content is encrypted;
Second executes processing module 305, has encrypted if can be configured as the object content, in the target Appearance is decrypted;
Control module 306 can be configured as the control object content and return to before drag operation in the terminal desktop On original position.
Wherein, object content includes: file, file, application program, picture or audio-video.
Referring to Fig. 8, the first execution processing module 304 as shown in Figure 7 may include:
First detection unit 3041 can be configured as and detect whether the user keeps dragging to the object content Operation;
Cryptographic processing unit 3042 can be configured as when the user keeps the drag operation to the object content When, the object content is encrypted;
Second detection unit 3043 can be configured as after the object content is encrypted, and detect institute State whether user decontrols drag operation to the object content;
Password storage unit 3044, if can be configured as the user has decontroled the behaviour of the dragging to the object content Make, then stores the user to the Crypted password of the object content, complete the encryption to the object content.
Wherein, the first execution processing module 304 or cryptographic processing unit 3042 can be configured as: prompt user is It is no to be encrypted using biological characteristic;If user selects progress, biological characteristic is encrypted, and the biology started in terminal is known Other template receives the input information of the biological characteristic of the user, according to the received biological characteristic of institute to the object content into Row encryption.
Referring to Fig. 9, the second execution processing module 305 as shown in Figure 7 may include:
Detection unit 3051, can be configured as whether the detection user keeps the dragging to the object content to grasp Make;
Decryption processing unit 3052 can be configured as when the user keeps the drag operation to the object content When, the object content is decrypted.
Wherein, the second execution processing module 305 or decryption processing unit 3052 can be additionally configured to prompt the use Family inputs encrypted message, and determines whether the encrypted message of user's input is correct;If the message in cipher of user's input Breath is correct, then is decrypted to the object content, shows the object content to user.
In conclusion the drag operation that the technical program is directed to object content on terminal desktop by detecting user, and Determine that drag target content has crossed the display interface of terminal screen, if the object content is not encrypted, to the mesh The realization of technical solution that mark content is encrypted, can quickly be realized by drag operation to object content (such as certain A APP, some file perhaps file picture or audio-video) encryption, mode of operation is simple, intuitive, conveniently.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Referring to FIG. 10, it illustrates a kind of block diagrams for ciphering and deciphering device 400 shown in an exemplary embodiment.Example Such as, device 400 can be the electronic display units such as mobile phone or tablet computer.
Referring to Fig.1 0, device 400 may include following one or more components: processing component 402, memory 404, power supply Component 406, multimedia component 408, audio component 410, input/output (I/O) interface 412, sensor module 414, Yi Jitong Believe component 416.
The integrated operation of the usual control device 400 of processing component 402, such as with display, telephone call, data communication, phase Machine operation and record operate associated operation.Processing component 402 may include that one or more processors 420 refer to execute It enables, to complete all or part of the steps of above-mentioned encipher-decipher method.In addition, processing component 402 may include one or more moulds Block, convenient for the interaction between processing component 402 and other assemblies.For example, processing component 402 may include multi-media module, with Facilitate the interaction between multimedia component 408 and processing component 402.
Memory 404 is configured as storing various types of data to support the operation on device 400.These data Example includes the instruction for any application or method that operate on device 400, contact data, telephone book data, message, Picture, video etc..Memory 404 can be real by any kind of volatibility or non-volatile memory device or their combination Existing, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable is only It reads memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic Disk or CD.
Power supply module 406 provides electric power for the various assemblies of device 400.Power supply module 406 may include power management system System, one or more power supplys and other with for device 400 generate, manage, and distribute the associated component of electric power.
Multimedia component 408 includes the screen of one output interface of offer between device 400 and user.In some realities It applies in example, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen can To be implemented as touch screen, to receive input signal from the user.Touch panel include one or more touch sensors with Sense the gesture on touch, slide, and touch panel.Touch sensor can not only sense the boundary of a touch or slide action, and And also detect duration and pressure relevant to touch or slide.In some embodiments, multimedia component 308 includes One front camera and/or rear camera.It is such as in a shooting mode or a video mode, preceding when device 400 is in operation mode It sets camera and/or rear camera can receive external multi-medium data.Each front camera and rear camera can Be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 410 is configured as output and/or input audio signal.For example, audio component 410 includes a Mike Wind (MIC), when device 400 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone is matched It is set to reception external audio signal.The received audio signal can be further stored in memory 404 or via communication set Part 416 is sent.In some embodiments, audio component 410 further includes a loudspeaker, is used for output audio signal.
I/O interface 412 provides interface between processing component 402 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock Determine button.
Sensor module 414 includes one or more sensors, and the state for providing various aspects for device 400 is commented Estimate.For example, sensor module 414 can detecte the state that opens/closes of device 400, the relative positioning of component, such as component For the display and keypad of device 400, sensor module 414 can be with the position of 400 1 components of detection device 400 or device Set change, the existence or non-existence that user contacts with device 400, the temperature in 400 orientation of device or acceleration/deceleration and device 400 Variation.Sensor module 414 may include proximity sensor, be configured to detect without any physical contact near The presence of object.Sensor module 414 can also include optical sensor, such as CMOS or ccd image sensor, for answering in imaging With middle use.In some embodiments, which can also include acceleration transducer, gyro sensor, magnetic Sensor, pressure sensor or temperature sensor.
Communication component 416 is configured to facilitate the communication of wired or wireless way between device 400 and other equipment.Device 400 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.In an exemplary implementation In example, communication component 416 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, communication component 416 further includes near-field communication (NFC) module, to promote short range communication.For example, Radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, bluetooth can be based in NFC module (BT) technology and other technologies are realized.
In the exemplary embodiment, device 400 can be believed by one or more application specific integrated circuit (ASIC), number Number processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing above-mentioned display interface switching Method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 304 of instruction, above-metioned instruction can be executed by the processor 420 of device 400 to complete above-mentioned encipher-decipher method. For example, non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in storage medium is held by the processor of device 400 When row, so that device 400 is able to carry out above-mentioned encipher-decipher method.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (11)

1. a kind of encipher-decipher method, which is characterized in that be used for terminal, which comprises
User is detected for the drag operation of object content on terminal desktop, the object content includes: file, file, figure Piece or audio-video;
Determine whether the drag operation drags the display interface that the object content crosses terminal screen;
When the determining display interface for dragging the object content and having crossed terminal screen, it is determined that whether the object content is added It is close;
If the object content is not encrypted, detect whether the user keeps drag operation to the object content;
When the user keeps the drag operation to the object content, the object content is encrypted;
After the object content is encrypted, detect whether the user decontrols dragging to the object content Operation;
If the user has decontroled the drag operation to the object content, the user is stored to the object content Crypted password completes the encryption to the object content;
If the object content has encrypted, the object content is decrypted.
2. the method according to claim 1, wherein the described object content is encrypted includes:
It prompts the user whether to be encrypted using biological characteristic;
If user selects progress, biological characteristic is encrypted, and is started the bio-identification template in terminal, is received the user Biological characteristic input information, the object content is encrypted according to institute's received biological characteristic.
3. the method according to claim 1, wherein encryption of the storage user to the object content Password, after completing to the encryption of the object content, comprising:
It controls the object content and returns to original position before drag operation on the terminal desktop.
4. the method according to claim 1, wherein described be decrypted the object content, comprising:
Detect whether the user keeps drag operation to the object content;
When the user keeps the drag operation to the object content, the object content is decrypted.
5. method according to claim 1 or 4, which is characterized in that described that the object content is decrypted, packet It includes:
It prompts the user to input encrypted message, and determines whether the encrypted message of user's input is correct;
If the encrypted message of user's input is correct, the object content is decrypted, shows the object content To user.
6. a kind of ciphering and deciphering device, which is characterized in that be used for terminal, described device includes:
Detection module is configured as detection user for the drag operation of object content on terminal desktop, the object content packet It includes: file, file, application program, picture or audio-video;
First determining module, is configured to determine that whether the drag operation drags the object content and cross the aobvious of terminal screen Show interface;
Second determining module is configured as when determining the display interface for dragging the object content and having crossed terminal screen, then really Whether the fixed object content is encrypted;
Whether first executes processing module, is not encrypted if being configured as the object content, detect the user and keep pair The drag operation of the object content;When the user keeps the drag operation to the object content, in the target Appearance is encrypted;After the object content is encrypted, detect whether the user decontrols to the mesh Mark the drag operation of content;If the user has decontroled the drag operation to the object content, the user couple is stored The Crypted password of the object content completes the encryption to the object content;
Second executes processing module, has encrypted if being configured as the object content, the object content is decrypted Processing.
7. device according to claim 6, which is characterized in that described first executes at processing module or the encryption Reason unit is configured as: prompting the user whether to be encrypted using biological characteristic;If user selects to carry out biological characteristic progress Encryption, then start the bio-identification template in terminal, receive the input information of the biological characteristic of the user, received according to institute Biological characteristic encrypts the object content.
8. device according to claim 6, which is characterized in that described device further include:
Control module, is configured as controlling the object content and returns to the home position before drag operation on the terminal desktop Place.
9. device according to claim 6, which is characterized in that described second, which executes processing module, includes:
Detection unit, is configured as detecting whether the user keeps drag operation to the object content;
Decryption processing unit is configured as when the user keeps the drag operation to the object content, to the target Content is decrypted.
10. device according to claim 6 or 9, which is characterized in that described second executes at processing module or decryption Reason unit is configured as that the user is prompted to input encrypted message, and determines whether the encrypted message of user's input is correct; If the encrypted message of user's input is correct, the object content is decrypted, shows the object content to use Family.
11. a kind of ciphering and deciphering device, which is characterized in that for running the terminal for having application program, comprising:
Processor;
For storing the memory of the executable instruction of the processor;
Wherein, the processor is configured to:
User is detected for the drag operation of object content on terminal desktop, the object content includes: file, file, figure Piece or audio-video;
Determine whether the drag operation drags the display interface that the object content crosses terminal screen;
When the determining display interface for dragging the object content and having crossed terminal screen, it is determined that whether the object content is added It is close;
If the object content is not encrypted, detect whether the user keeps drag operation to the object content;
When the user keeps the drag operation to the object content, the object content is encrypted;
After the object content is encrypted, detect whether the user decontrols dragging to the object content Operation;
If the user has decontroled the drag operation to the object content, the user is stored to the object content Crypted password completes the encryption to the object content;
If the object content has encrypted, the object content is decrypted.
CN201610190772.5A 2016-03-30 2016-03-30 Encryption and decryption method and device Active CN105893854B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610190772.5A CN105893854B (en) 2016-03-30 2016-03-30 Encryption and decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610190772.5A CN105893854B (en) 2016-03-30 2016-03-30 Encryption and decryption method and device

Publications (2)

Publication Number Publication Date
CN105893854A CN105893854A (en) 2016-08-24
CN105893854B true CN105893854B (en) 2019-04-12

Family

ID=57014702

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610190772.5A Active CN105893854B (en) 2016-03-30 2016-03-30 Encryption and decryption method and device

Country Status (1)

Country Link
CN (1) CN105893854B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106384060B (en) * 2016-09-23 2019-11-15 维沃移动通信有限公司 A kind of mobile terminal data encryption method and mobile terminal
CN106548078A (en) * 2016-10-20 2017-03-29 北京小米移动软件有限公司 Using encryption method and device
CN108337355B (en) * 2017-01-19 2020-10-13 北京小米移动软件有限公司 Object encryption method and device
CN107220552B (en) * 2017-05-25 2019-11-05 维沃移动通信有限公司 A kind of encryption and decryption approaches and mobile terminal
CN111382395B (en) * 2018-12-29 2022-05-03 北京小米移动软件有限公司 Control method and device of application icons

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103235903A (en) * 2013-04-12 2013-08-07 广东欧珀移动通信有限公司 Processing method and device for hiding programs of mobile terminal
CN104732121A (en) * 2015-03-24 2015-06-24 广东欧珀移动通信有限公司 Encryption setting method, decryption setting method and corresponding device of application program

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103235903A (en) * 2013-04-12 2013-08-07 广东欧珀移动通信有限公司 Processing method and device for hiding programs of mobile terminal
CN104732121A (en) * 2015-03-24 2015-06-24 广东欧珀移动通信有限公司 Encryption setting method, decryption setting method and corresponding device of application program

Also Published As

Publication number Publication date
CN105893854A (en) 2016-08-24

Similar Documents

Publication Publication Date Title
CN104850769B (en) Operation executes method and device
CN104503688B (en) The control method and device of intelligent hardware devices
CN104219058B (en) Authentication, identification authorization method and device
CN104765552B (en) Right management method and device
CN103916233B (en) A kind of information ciphering method and device
CN105893854B (en) Encryption and decryption method and device
CN104536684B (en) interface display method and device
CN106547663B (en) Key management method and device
CN104866750A (en) Method and device for starting application
CN103914634A (en) Image encryption method, image encryption device and electronic device
CN105389516A (en) Sensitive picture reminding method and apparatus
CN104794382A (en) Application starting method and device
CN104850995A (en) Operation executing method and device
EP2940977B1 (en) Method and device for sending information in voice service
CN104933351A (en) Information security processing method and information security processing device
CN104573550A (en) Method and device for protecting data
CN104391712A (en) Shutdown method and device
CN105843503B (en) Using open method, device and terminal device
CN107798309B (en) Fingerprint input method and device and computer readable storage medium
CN104036165B (en) Cipher processing method and device
TW202101392A (en) Access control method and device, electronic device and storage medium
CN105282162B (en) The processing method and processing device of account management business
CN106778225A (en) The method and apparatus for processing password
CN105046127A (en) Encryption and decryption method and apparatus
CN105204712A (en) Method and device for displaying icons of folder

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant