CN105893854B - Encryption and decryption method and device - Google Patents
Encryption and decryption method and device Download PDFInfo
- Publication number
- CN105893854B CN105893854B CN201610190772.5A CN201610190772A CN105893854B CN 105893854 B CN105893854 B CN 105893854B CN 201610190772 A CN201610190772 A CN 201610190772A CN 105893854 B CN105893854 B CN 105893854B
- Authority
- CN
- China
- Prior art keywords
- object content
- user
- encrypted
- drag operation
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
The disclosure belongs to field of computer technology about a kind of encryption and decryption method and device.This method is by detection user for the drag operation of object content on terminal desktop, and determining that drag target content crossed the display interface of terminal screen, if the object content is not encrypted, the realization for the technical solution that then object content is encrypted, it can quickly be realized by drag operation to object content (such as some APP, some file perhaps file picture or audio-video) encryption, mode of operation is simple, intuitive, conveniently.
Description
Technical field
This disclosure relates to field of computer technology, in particular to a kind of encryption and decryption method and device.
Background technique
With the fast development of mobile terminal technology, user can be whenever and wherever possible using the application journey installed on mobile terminal
Sequence come taken pictures, read, watched video, play game or communication etc..With the reinforcement of mobile terminal storage capacity, more
The information of some individuals can be stored at the terminal come more users, oneself can inquire use at any time to facilitate.So, user
The safety of the information of storage just becomes critically important.The existing security setting mode to mobile terminal content is: to entire mobile
Terminal is encrypted, and user just can enter the access that display desktop carries out information by decryption.Alternatively, being encrypted using third party soft
Part or setting option encrypt to apply to some in terminal, to protect the safety of information.
Summary of the invention
The embodiment of the present disclosure provides a kind of encryption and decryption method and device.The technical solution is as follows:
According to the first aspect of the embodiments of the present disclosure, a kind of encipher-decipher method is provided, terminal is used for, this method comprises:
User is detected for the drag operation of object content on terminal desktop;
Determine whether the drag operation drags the display interface that the object content crosses terminal screen;
When the determining display interface for dragging the object content and having crossed terminal screen, it is determined that whether the object content
It is encrypted;
If the object content is not encrypted, the object content is encrypted;
If the object content has encrypted, the object content is decrypted.
Optionally, the object content includes: file, file, application program, picture or audio-video.
It is optionally, described that the object content is encrypted, comprising:
Detect whether the user keeps drag operation to the object content;
When the user keeps the drag operation to the object content, the object content is encrypted;
After the object content is encrypted, detect whether the user decontrols to the object content
Drag operation;
If the user has decontroled the drag operation to the object content, the user is stored in the target
The Crypted password of appearance completes the encryption to the object content.
Optionally, the described object content is encrypted includes:
It prompts the user whether to be encrypted using biological characteristic;
If user selects to carry out biological characteristic to encrypt, start the bio-identification template in terminal, described in reception
The input information of the biological characteristic of user encrypts the object content according to the received biological characteristic of institute.
Optionally, the storage user completes to the object content Crypted password of the object content
After encryption, comprising:
It controls the object content and returns to original position before drag operation on the terminal desktop.
It is optionally, described that the object content is decrypted, comprising:
Detect whether the user keeps drag operation to the object content;
When the user keeps the drag operation to the object content, the object content is decrypted.
It is optionally, described that the object content is decrypted, comprising:
It prompts the user to input encrypted message, and determines whether the encrypted message of user's input is correct;
If the encrypted message of user's input is correct, the object content is decrypted, shows the target
Content is to user.
According to the second aspect of an embodiment of the present disclosure, a kind of ciphering and deciphering device is provided, terminal is used for, which includes:
Detection module is configured as detection user for the drag operation of object content on terminal desktop;
First determining module, is configured to determine that whether the drag operation drags the object content and cross terminal screen
Display interface;
Second determining module is configured as when the determining display interface for dragging the object content and having crossed terminal screen,
Then determine whether the object content is encrypted;
First execute processing module, be not encrypted if being configured as the object content, to the object content into
Row encryption;
Second executes processing module, has encrypted if being configured as the object content, carries out to the object content
Decryption processing.
Optionally, the object content includes: file, file, application program, picture or audio-video.
Optionally, the first execution processing module includes:
First detection unit, is configured as detecting whether the user keeps drag operation to the object content;
Cryptographic processing unit is configured as when the user keeps the drag operation to the object content, to described
Object content is encrypted;
Second detection unit is configured as after the object content is encrypted, and detecting the user is
The no drag operation decontroled to the object content;
Password storage unit is deposited if being configured as the user has decontroled drag operation to the object content
The user is stored up to the Crypted password of the object content, completes the encryption to the object content.
Optionally, the first execution processing module or the cryptographic processing unit are configured as: being prompted the user whether
It is encrypted using biological characteristic;If user selects progress, biological characteristic is encrypted, and starts the bio-identification in terminal
Template receives the input information of the biological characteristic of the user, is carried out according to the received biological characteristic of institute to the object content
Encryption.
Optionally, described device further include:
Control module, be configured as controlling the object content return to it is original on the terminal desktop before drag operation
At position.
Optionally, the second execution processing module includes:
Detection unit, is configured as detecting whether the user keeps drag operation to the object content;
Decryption processing unit is configured as when the user keeps the drag operation to the object content, to described
Object content is decrypted.
Optionally, the second execution processing module or decryption processing unit are configured as that the user is prompted to input
Encrypted message, and determine whether the encrypted message of user's input is correct;If the encrypted message of user's input is correct,
Then the object content is decrypted, shows the object content to user.
According to the third aspect of an embodiment of the present disclosure, a kind of ciphering and deciphering device is provided, terminal is used for, comprising:
Processor;
The memory of executable instruction for storage processor;
Wherein, processor is configured as:
User is detected for the drag operation of object content on terminal desktop;
Determine whether the drag operation drags the display interface that the object content crosses terminal screen;
When the determining display interface for dragging the object content and having crossed terminal screen, it is determined that whether the object content
It is encrypted;
If the object content is not encrypted, the object content is encrypted;
If the object content has encrypted, the object content is decrypted.
The technical solution that the embodiment of the present disclosure provides can include the following benefits:
The technical program drags mesh for the drag operation of object content on terminal desktop, and determining by detection user
Mark content has crossed the display interface of terminal screen, if the object content is not encrypted, carries out to the object content
The realization of the technical solution of encryption, can quickly be realized by drag operation to object content (such as some APP, some
File perhaps file picture or audio-video) encryption, mode of operation is simple, intuitive, conveniently.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure
Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is a kind of flow chart of encipher-decipher method shown according to an exemplary embodiment;
Fig. 2 to Fig. 5 is drag target content shown according to an exemplary embodiment to carry out at encryption to object content
The process schematic of reason;
Fig. 6 is a kind of block diagram of ciphering and deciphering device shown according to an exemplary embodiment;
Fig. 7 is a kind of block diagram of ciphering and deciphering device shown according to an exemplary embodiment;
Fig. 8 is the block diagram that one kind first as shown in Figure 7 shown according to an exemplary embodiment executes processing module;
Fig. 9 is the block diagram that one kind second as shown in Figure 7 shown according to an exemplary embodiment executes processing module;
Figure 10 is a kind of block diagram of ciphering and deciphering device shown according to an exemplary embodiment.
Through the above attached drawings, it has been shown that the specific embodiment of the disclosure will be hereinafter described in more detail.These attached drawings
It is not intended to limit the scope of this disclosure concept by any means with verbal description, but is by referring to specific embodiments
Those skilled in the art illustrate the concept of the disclosure.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
The technical solution that the embodiment of the present disclosure provides is applied to terminal, which can be the electricity with screen display function
Sub- equipment, such as mobile phone or tablet computer equipment, but not limited to this, as it will be easily appreciated by one skilled in the art that the present invention is real
Example is applied to apply also for being particularly suitable in any mobile terminal with processor and display output device with multi-point touch
In the terminal for the display output device that technology is realized.In addition, bio-identification module is provided in the terminal, such as fingerprint recognition mould
Block, voiceprint identification module or/and picture recognition module etc., the biological characteristic that can be inputted to electronic equipment holder identify
Processing.In addition, the processor built in the electronic equipment, can quickly and effectively be handled information, such as information is carried out
The ability of encryption and decryption processing.
The embodiment of the present disclosure provides a kind of encipher-decipher method applied at the terminal, can be to the text stored in terminal
The application program installed in part, file, picture or audio-video and terminal carries out encryption and decryption processing, exemplary, disclosure institute
A kind of encryption and decryption technology scheme of description can be with are as follows: drag operation of the detection user for object content on terminal desktop;It determines
Whether the drag operation drags the display interface that the object content crosses terminal screen;The object content is dragged when determining
The display interface of terminal screen is crossed, it is determined that whether the object content is encrypted;If the object content is not added
It is close, then the object content is encrypted;If the object content has encrypted, the object content is solved
Close processing.The encryption and decryption to object content can be realized by pulling object content, so that can be very square in the operation of user
Just completion handles the encryption and decryption of object content.
Fig. 1 is a kind of flow chart of encipher-decipher method shown according to an exemplary embodiment, which can be with
Applied in above-mentioned terminal.Referring to Fig. 1, which may include the following steps:
In a step 101, drag operation of the detection user for object content on terminal desktop;
Wherein, the object content includes: file, file, application program, picture or audio-video.
Embodiment for a better understanding of the present invention is below simply situated between to the touch screen technology realization principle of terminal
It continues.Touch screen is made of touch detection component and touch screen controller, and touch detection component is mounted on before indicator screen, is used
In detect user touch location (human body touch similar to electrostatic induction thin slice touch screen when, current sensing signal can be generated, touch
Detection part can learn the contact of user by perceiving the current sensing signal), then associated touch information is sent to
Touch screen controller converts thereof into contact after touch screen controller receives the touch information that touch detection component is transmitted
Coordinate, then send CPU (central processing unit) to and handled, while touch screen controller can also receive the order that CPU is sent
And it executes.
Based on above touch screen technology realization principle, user's dragging for the object content shown on terminal desktop is detected
Dynamic operation are as follows: user can be grasped by touch operation come the display label to the object content on terminal desktop
Make, when user carries out touch control operation to terminal desktop, touch screen will generate current sensing signal, and touch detection component passes through sense
Answer current signal that can confirmly detect there are operating of contacts, at this point, touch detection component sends relevant touch information to
Touch screen controller, touch screen controller determine whether the corresponding coordinate of operating of contacts is target according to the touch information received
Coordinate where the display mark of content, where the corresponding coordinate of the operating of contacts of user is the display mark of object content
It when coordinate, determines that user clicks the display mark for having selected the object content on terminal desktop, later, determines the click behaviour of user
Whether continue for scheduled duration, if continue for scheduled duration, confirms that user will carry out drag operation to the object content.
Here, user carries out operation by the display mark of the object content to display on a terminal screen to realization pair
The operation of object content, such as mobile object content, opening object content, the operation of delete target content.Wherein, work as object content
Be file, picture perhaps audio-video when object content display be identified as file identification, picture identification or audio-video mark,
When object content when file, the display of object content is identified as folder identifier, when object content is application program, in target
The display of appearance is identified as the icon of application program.
In a step 102, determine whether the drag operation drags display circle that the object content crosses terminal screen
Face;
When detecting that user will carry out drag operation to object content, then the motion track of the drag operation is monitored, this
In, terminal can be by examining the track of the drag operation because of the current sensing signal of drag operation generation on touch screen
It surveys, and judges whether the drag operation crosses the display interface of terminal screen according to the motion track detected, when detecting
When the final on trajectory of drag operation is more than the boundary of terminal display, determine whether the object content is encrypted.
In step 103, when the determining display interface for dragging the object content and having crossed terminal screen, it is determined that described
Whether object content is encrypted;
If the object content is not encrypted, 104 are thened follow the steps;
If the object content has encrypted, 105 are thened follow the steps;
At step 104, the object content is encrypted;
It is described that the object content is encrypted in the embodiment of the present disclosure, may include:
Detect whether the user keeps drag operation to the object content;
When the user keeps the drag operation to the object content, the object content is encrypted;
After the object content is encrypted, detect whether the user decontrols to the object content
Drag operation;
If the user has decontroled the drag operation to the object content, the user is stored in the target
The Crypted password of appearance completes the encryption to the object content.
Here it is possible to by user on terminal screen object content display label touch control operation generate electric current come
It determines whether user keeps the drag operation to object content or decontroled the drag operation to object content, works as terminal screen
The electric current of the upper touch control operation for having the display label to object content, then confirm that user keeps the dragging to object content to grasp
Make, when the touch control operation current vanishes of the display label to object content generated on terminal screen, then confirms that user decontrols
To the drag operation of object content.
In the embodiment of the present disclosure, the described object content is encrypted may include:
It prompts the user whether to be encrypted using biological characteristic;
If user selects to carry out biological characteristic to encrypt, start the bio-identification template in terminal, described in reception
The input information of the biological characteristic of user encrypts the object content according to the received biological characteristic of institute.Here it is possible to
By the bio-identification module being arranged in terminal, such as fingerprint identification module, voiceprint identification module or/and picture recognition module,
To acquire the biological characteristic of user's input and identify.
In another embodiment, object content is encrypted can also include: prompt user input number or
Person's graphical passwords information encrypts object content.
In the embodiment of the present disclosure, the storage user completes to the mesh Crypted password of the object content
After the encryption for marking content, comprising:
It controls the object content and returns to original position before drag operation on the terminal desktop.Here, it detects
After having decontroled the drag operation to object content to user, control object content is returned to before drag operation on the terminal desktop
Original position.
In step 105, the object content is decrypted.
It is described that the object content is decrypted in the embodiment of the present disclosure, may include:
Detect whether the user keeps drag operation to the object content;
When the user keeps the drag operation to the object content, the object content is decrypted.
It is described that the object content is decrypted in the embodiment of the present disclosure, may include:
It prompts the user to input encrypted message, and determines whether the encrypted message of user's input is correct;
If the encrypted message of user's input is correct, the object content is decrypted, shows the target
Content is to user.
It is exemplary to give through drag target content the mistake that object content is encrypted referring to fig. 2 to Fig. 5
Journey.User's drag target content A crosses the display boundary of terminal screen, and user is prompted to encrypt object content, and user will
Finger is put on the fingerprint identification module of terminal, and the fingerprint that fingerprint identification module inputs user is acquired and identifies, and
Object content is encrypted according to collected finger print information, user unclamps the drag operation to object content, controls target
Content returns at the position before dragging on a terminal screen.
In conclusion the drag operation that the technical program is directed to object content on terminal desktop by detecting user, and
Determine that drag target content has crossed the display interface of terminal screen, if the object content is not encrypted, to the mesh
The realization of technical solution that mark content is encrypted, can quickly be realized by drag operation to object content (such as certain
A APP, some file perhaps file picture or audio-video) encryption, mode of operation is simple, intuitive, conveniently.
Following is embodiment of the present disclosure, can be used for executing embodiments of the present disclosure.It is real for disclosure device
Undisclosed details in example is applied, embodiments of the present disclosure is please referred to.
Fig. 6 is a kind of block diagram of ciphering and deciphering device 200 shown according to an exemplary embodiment, the ciphering and deciphering device 200
Can being implemented in combination with as some or all of of terminal by software, hardware or both, the terminal can be mobile phone or
The electronic display units such as person's tablet computer.The ciphering and deciphering device 200 may include:
Detection module 201 can be configured as detection user for the drag operation of object content on terminal desktop;
First determining module 202 can be configured as and determine whether the drag operation drags the object content and cross
The display interface of terminal screen;
Second determining module 203 can be configured as when the determining dragging object content has crossed the aobvious of terminal screen
Show interface, it is determined that whether the object content is encrypted;
First executes processing module 204, is not encrypted if can be configured as the object content, to the target
Content is encrypted;
Second executes processing module 205, has encrypted if can be configured as the object content, in the target
Appearance is decrypted.
In conclusion the drag operation that the technical program is directed to object content on terminal desktop by detecting user, and
Determine that drag target content has crossed the display interface of terminal screen, if the object content is not encrypted, to the mesh
The realization of technical solution that mark content is encrypted, can quickly be realized by drag operation to object content (such as certain
A APP, some file perhaps file picture or audio-video) encryption, mode of operation is simple, intuitive, conveniently.
Fig. 7 is a kind of block diagram of ciphering and deciphering device 300 shown according to an exemplary embodiment, the ciphering and deciphering device 300
Can being implemented in combination with as some or all of of terminal by software, hardware or both, the terminal can be mobile phone or
The electronic display units such as person's tablet computer.The ciphering and deciphering device 300 may include:
Detection module 301 can be configured as detection user for the drag operation of object content on terminal desktop;
First determining module 302 can be configured as and determine whether the drag operation drags the object content and cross
The display interface of terminal screen;
Second determining module 303 can be configured as when the determining dragging object content has crossed the aobvious of terminal screen
Show interface, it is determined that whether the object content is encrypted;
First executes processing module 304, is not encrypted if can be configured as the object content, to the target
Content is encrypted;
Second executes processing module 305, has encrypted if can be configured as the object content, in the target
Appearance is decrypted;
Control module 306 can be configured as the control object content and return to before drag operation in the terminal desktop
On original position.
Wherein, object content includes: file, file, application program, picture or audio-video.
Referring to Fig. 8, the first execution processing module 304 as shown in Figure 7 may include:
First detection unit 3041 can be configured as and detect whether the user keeps dragging to the object content
Operation;
Cryptographic processing unit 3042 can be configured as when the user keeps the drag operation to the object content
When, the object content is encrypted;
Second detection unit 3043 can be configured as after the object content is encrypted, and detect institute
State whether user decontrols drag operation to the object content;
Password storage unit 3044, if can be configured as the user has decontroled the behaviour of the dragging to the object content
Make, then stores the user to the Crypted password of the object content, complete the encryption to the object content.
Wherein, the first execution processing module 304 or cryptographic processing unit 3042 can be configured as: prompt user is
It is no to be encrypted using biological characteristic;If user selects progress, biological characteristic is encrypted, and the biology started in terminal is known
Other template receives the input information of the biological characteristic of the user, according to the received biological characteristic of institute to the object content into
Row encryption.
Referring to Fig. 9, the second execution processing module 305 as shown in Figure 7 may include:
Detection unit 3051, can be configured as whether the detection user keeps the dragging to the object content to grasp
Make;
Decryption processing unit 3052 can be configured as when the user keeps the drag operation to the object content
When, the object content is decrypted.
Wherein, the second execution processing module 305 or decryption processing unit 3052 can be additionally configured to prompt the use
Family inputs encrypted message, and determines whether the encrypted message of user's input is correct;If the message in cipher of user's input
Breath is correct, then is decrypted to the object content, shows the object content to user.
In conclusion the drag operation that the technical program is directed to object content on terminal desktop by detecting user, and
Determine that drag target content has crossed the display interface of terminal screen, if the object content is not encrypted, to the mesh
The realization of technical solution that mark content is encrypted, can quickly be realized by drag operation to object content (such as certain
A APP, some file perhaps file picture or audio-video) encryption, mode of operation is simple, intuitive, conveniently.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method
Embodiment in be described in detail, no detailed explanation will be given here.
Referring to FIG. 10, it illustrates a kind of block diagrams for ciphering and deciphering device 400 shown in an exemplary embodiment.Example
Such as, device 400 can be the electronic display units such as mobile phone or tablet computer.
Referring to Fig.1 0, device 400 may include following one or more components: processing component 402, memory 404, power supply
Component 406, multimedia component 408, audio component 410, input/output (I/O) interface 412, sensor module 414, Yi Jitong
Believe component 416.
The integrated operation of the usual control device 400 of processing component 402, such as with display, telephone call, data communication, phase
Machine operation and record operate associated operation.Processing component 402 may include that one or more processors 420 refer to execute
It enables, to complete all or part of the steps of above-mentioned encipher-decipher method.In addition, processing component 402 may include one or more moulds
Block, convenient for the interaction between processing component 402 and other assemblies.For example, processing component 402 may include multi-media module, with
Facilitate the interaction between multimedia component 408 and processing component 402.
Memory 404 is configured as storing various types of data to support the operation on device 400.These data
Example includes the instruction for any application or method that operate on device 400, contact data, telephone book data, message,
Picture, video etc..Memory 404 can be real by any kind of volatibility or non-volatile memory device or their combination
Existing, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable is only
It reads memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic
Disk or CD.
Power supply module 406 provides electric power for the various assemblies of device 400.Power supply module 406 may include power management system
System, one or more power supplys and other with for device 400 generate, manage, and distribute the associated component of electric power.
Multimedia component 408 includes the screen of one output interface of offer between device 400 and user.In some realities
It applies in example, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen can
To be implemented as touch screen, to receive input signal from the user.Touch panel include one or more touch sensors with
Sense the gesture on touch, slide, and touch panel.Touch sensor can not only sense the boundary of a touch or slide action, and
And also detect duration and pressure relevant to touch or slide.In some embodiments, multimedia component 308 includes
One front camera and/or rear camera.It is such as in a shooting mode or a video mode, preceding when device 400 is in operation mode
It sets camera and/or rear camera can receive external multi-medium data.Each front camera and rear camera can
Be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 410 is configured as output and/or input audio signal.For example, audio component 410 includes a Mike
Wind (MIC), when device 400 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone is matched
It is set to reception external audio signal.The received audio signal can be further stored in memory 404 or via communication set
Part 416 is sent.In some embodiments, audio component 410 further includes a loudspeaker, is used for output audio signal.
I/O interface 412 provides interface between processing component 402 and peripheral interface module, and above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock
Determine button.
Sensor module 414 includes one or more sensors, and the state for providing various aspects for device 400 is commented
Estimate.For example, sensor module 414 can detecte the state that opens/closes of device 400, the relative positioning of component, such as component
For the display and keypad of device 400, sensor module 414 can be with the position of 400 1 components of detection device 400 or device
Set change, the existence or non-existence that user contacts with device 400, the temperature in 400 orientation of device or acceleration/deceleration and device 400
Variation.Sensor module 414 may include proximity sensor, be configured to detect without any physical contact near
The presence of object.Sensor module 414 can also include optical sensor, such as CMOS or ccd image sensor, for answering in imaging
With middle use.In some embodiments, which can also include acceleration transducer, gyro sensor, magnetic
Sensor, pressure sensor or temperature sensor.
Communication component 416 is configured to facilitate the communication of wired or wireless way between device 400 and other equipment.Device
400 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.In an exemplary implementation
In example, communication component 416 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, communication component 416 further includes near-field communication (NFC) module, to promote short range communication.For example,
Radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, bluetooth can be based in NFC module
(BT) technology and other technologies are realized.
In the exemplary embodiment, device 400 can be believed by one or more application specific integrated circuit (ASIC), number
Number processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing above-mentioned display interface switching
Method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
It such as include the memory 304 of instruction, above-metioned instruction can be executed by the processor 420 of device 400 to complete above-mentioned encipher-decipher method.
For example, non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk
With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in storage medium is held by the processor of device 400
When row, so that device 400 is able to carry out above-mentioned encipher-decipher method.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.
Claims (11)
1. a kind of encipher-decipher method, which is characterized in that be used for terminal, which comprises
User is detected for the drag operation of object content on terminal desktop, the object content includes: file, file, figure
Piece or audio-video;
Determine whether the drag operation drags the display interface that the object content crosses terminal screen;
When the determining display interface for dragging the object content and having crossed terminal screen, it is determined that whether the object content is added
It is close;
If the object content is not encrypted, detect whether the user keeps drag operation to the object content;
When the user keeps the drag operation to the object content, the object content is encrypted;
After the object content is encrypted, detect whether the user decontrols dragging to the object content
Operation;
If the user has decontroled the drag operation to the object content, the user is stored to the object content
Crypted password completes the encryption to the object content;
If the object content has encrypted, the object content is decrypted.
2. the method according to claim 1, wherein the described object content is encrypted includes:
It prompts the user whether to be encrypted using biological characteristic;
If user selects progress, biological characteristic is encrypted, and is started the bio-identification template in terminal, is received the user
Biological characteristic input information, the object content is encrypted according to institute's received biological characteristic.
3. the method according to claim 1, wherein encryption of the storage user to the object content
Password, after completing to the encryption of the object content, comprising:
It controls the object content and returns to original position before drag operation on the terminal desktop.
4. the method according to claim 1, wherein described be decrypted the object content, comprising:
Detect whether the user keeps drag operation to the object content;
When the user keeps the drag operation to the object content, the object content is decrypted.
5. method according to claim 1 or 4, which is characterized in that described that the object content is decrypted, packet
It includes:
It prompts the user to input encrypted message, and determines whether the encrypted message of user's input is correct;
If the encrypted message of user's input is correct, the object content is decrypted, shows the object content
To user.
6. a kind of ciphering and deciphering device, which is characterized in that be used for terminal, described device includes:
Detection module is configured as detection user for the drag operation of object content on terminal desktop, the object content packet
It includes: file, file, application program, picture or audio-video;
First determining module, is configured to determine that whether the drag operation drags the object content and cross the aobvious of terminal screen
Show interface;
Second determining module is configured as when determining the display interface for dragging the object content and having crossed terminal screen, then really
Whether the fixed object content is encrypted;
Whether first executes processing module, is not encrypted if being configured as the object content, detect the user and keep pair
The drag operation of the object content;When the user keeps the drag operation to the object content, in the target
Appearance is encrypted;After the object content is encrypted, detect whether the user decontrols to the mesh
Mark the drag operation of content;If the user has decontroled the drag operation to the object content, the user couple is stored
The Crypted password of the object content completes the encryption to the object content;
Second executes processing module, has encrypted if being configured as the object content, the object content is decrypted
Processing.
7. device according to claim 6, which is characterized in that described first executes at processing module or the encryption
Reason unit is configured as: prompting the user whether to be encrypted using biological characteristic;If user selects to carry out biological characteristic progress
Encryption, then start the bio-identification template in terminal, receive the input information of the biological characteristic of the user, received according to institute
Biological characteristic encrypts the object content.
8. device according to claim 6, which is characterized in that described device further include:
Control module, is configured as controlling the object content and returns to the home position before drag operation on the terminal desktop
Place.
9. device according to claim 6, which is characterized in that described second, which executes processing module, includes:
Detection unit, is configured as detecting whether the user keeps drag operation to the object content;
Decryption processing unit is configured as when the user keeps the drag operation to the object content, to the target
Content is decrypted.
10. device according to claim 6 or 9, which is characterized in that described second executes at processing module or decryption
Reason unit is configured as that the user is prompted to input encrypted message, and determines whether the encrypted message of user's input is correct;
If the encrypted message of user's input is correct, the object content is decrypted, shows the object content to use
Family.
11. a kind of ciphering and deciphering device, which is characterized in that for running the terminal for having application program, comprising:
Processor;
For storing the memory of the executable instruction of the processor;
Wherein, the processor is configured to:
User is detected for the drag operation of object content on terminal desktop, the object content includes: file, file, figure
Piece or audio-video;
Determine whether the drag operation drags the display interface that the object content crosses terminal screen;
When the determining display interface for dragging the object content and having crossed terminal screen, it is determined that whether the object content is added
It is close;
If the object content is not encrypted, detect whether the user keeps drag operation to the object content;
When the user keeps the drag operation to the object content, the object content is encrypted;
After the object content is encrypted, detect whether the user decontrols dragging to the object content
Operation;
If the user has decontroled the drag operation to the object content, the user is stored to the object content
Crypted password completes the encryption to the object content;
If the object content has encrypted, the object content is decrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610190772.5A CN105893854B (en) | 2016-03-30 | 2016-03-30 | Encryption and decryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610190772.5A CN105893854B (en) | 2016-03-30 | 2016-03-30 | Encryption and decryption method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105893854A CN105893854A (en) | 2016-08-24 |
CN105893854B true CN105893854B (en) | 2019-04-12 |
Family
ID=57014702
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610190772.5A Active CN105893854B (en) | 2016-03-30 | 2016-03-30 | Encryption and decryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105893854B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106384060B (en) * | 2016-09-23 | 2019-11-15 | 维沃移动通信有限公司 | A kind of mobile terminal data encryption method and mobile terminal |
CN106548078A (en) * | 2016-10-20 | 2017-03-29 | 北京小米移动软件有限公司 | Using encryption method and device |
CN108337355B (en) * | 2017-01-19 | 2020-10-13 | 北京小米移动软件有限公司 | Object encryption method and device |
CN107220552B (en) * | 2017-05-25 | 2019-11-05 | 维沃移动通信有限公司 | A kind of encryption and decryption approaches and mobile terminal |
CN111382395B (en) * | 2018-12-29 | 2022-05-03 | 北京小米移动软件有限公司 | Control method and device of application icons |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103235903A (en) * | 2013-04-12 | 2013-08-07 | 广东欧珀移动通信有限公司 | Processing method and device for hiding programs of mobile terminal |
CN104732121A (en) * | 2015-03-24 | 2015-06-24 | 广东欧珀移动通信有限公司 | Encryption setting method, decryption setting method and corresponding device of application program |
-
2016
- 2016-03-30 CN CN201610190772.5A patent/CN105893854B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103235903A (en) * | 2013-04-12 | 2013-08-07 | 广东欧珀移动通信有限公司 | Processing method and device for hiding programs of mobile terminal |
CN104732121A (en) * | 2015-03-24 | 2015-06-24 | 广东欧珀移动通信有限公司 | Encryption setting method, decryption setting method and corresponding device of application program |
Also Published As
Publication number | Publication date |
---|---|
CN105893854A (en) | 2016-08-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104850769B (en) | Operation executes method and device | |
CN104503688B (en) | The control method and device of intelligent hardware devices | |
CN104219058B (en) | Authentication, identification authorization method and device | |
CN104765552B (en) | Right management method and device | |
CN103916233B (en) | A kind of information ciphering method and device | |
CN105893854B (en) | Encryption and decryption method and device | |
CN104536684B (en) | interface display method and device | |
CN106547663B (en) | Key management method and device | |
CN104866750A (en) | Method and device for starting application | |
CN103914634A (en) | Image encryption method, image encryption device and electronic device | |
CN105389516A (en) | Sensitive picture reminding method and apparatus | |
CN104794382A (en) | Application starting method and device | |
CN104850995A (en) | Operation executing method and device | |
EP2940977B1 (en) | Method and device for sending information in voice service | |
CN104933351A (en) | Information security processing method and information security processing device | |
CN104573550A (en) | Method and device for protecting data | |
CN104391712A (en) | Shutdown method and device | |
CN105843503B (en) | Using open method, device and terminal device | |
CN107798309B (en) | Fingerprint input method and device and computer readable storage medium | |
CN104036165B (en) | Cipher processing method and device | |
TW202101392A (en) | Access control method and device, electronic device and storage medium | |
CN105282162B (en) | The processing method and processing device of account management business | |
CN106778225A (en) | The method and apparatus for processing password | |
CN105046127A (en) | Encryption and decryption method and apparatus | |
CN105204712A (en) | Method and device for displaying icons of folder |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |