CN105912947A - File processing method and device based on external equipment - Google Patents
File processing method and device based on external equipment Download PDFInfo
- Publication number
- CN105912947A CN105912947A CN201610206660.4A CN201610206660A CN105912947A CN 105912947 A CN105912947 A CN 105912947A CN 201610206660 A CN201610206660 A CN 201610206660A CN 105912947 A CN105912947 A CN 105912947A
- Authority
- CN
- China
- Prior art keywords
- external equipment
- identifier
- destination object
- user
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Abstract
The embodiment of the invention discloses a file processing method and device based on external equipment used for utilizing the external equipment to conceal, encrypt files, display and decrypt files. The method of the embodiment comprises following steps: determining whether an identification number of currently-connected external equipment is a stored identification number or not when connection with any external equipment is achieved and generating a first judging result, wherein the identification number is used for indentifying the identity of the external equipment; and concealing or displaying an icon of a target object based on the first judging result, wherein the target object comprises a target folder and/or a target file and the target object is a pre-set unlocking password encrypted by the user and set to be decrypted after use.In the embodiment, a terminal is used for displaying or concealing the target file for the stored identification number based on the identification number of the external equipment.The external equipment is utilized for concealing or displaying the target folder and encryption and decryption methods are utilized so that safety of the target file and the target folder is protected.
Description
Technical field
The present invention relates to mobile terminal document processing technology field, especially relate to a kind of based on external equipment
Document handling method and device.
Background technology
In present life, along with popularizing of intelligent terminal, such as the intelligence such as mobile phone, panel computer is eventually
End equipment becomes the many user's indispensable instruments in live and work.And it is based on intelligent terminal
Various application programs are also because its multiformity and ease for use become many users and solve the important hands of problem
Section.Intelligent terminal is mounted with various types of application according to use habit and the demand of user mostly
Program, user is generally for the convenience used, it will usually set up file to some application program therein
Carry out Classification Management.
User usually can store some private file in intelligent terminal and be unwilling to be known by others, but
In actual applications, sometimes can ignore because of use thus reveal some privacy content.
Summary of the invention
Embodiments provide a kind of document handling method based on external equipment and device, for right
File destination and destination folder are hidden and encrypt, and recycling external equipment shows and deciphers
File, the safety of protection file and the privacy of user.
In view of this, a first aspect of the present invention provides a kind of document handling method based on external equipment,
Including:
When being connected with any external equipment, it is judged that whether the identifier of the current external equipment connected is
The identifier of storage, generates the first judged result, and described identifier is for identifying the identity of external equipment;
Hiding according to described first judged result or the icon of display destination object, described destination object includes
Destination folder and/or file destination, described destination object is encrypted and is provided with through user with deciphering
Default unlocking pin.
In conjunction with the first aspect of the embodiment of the present invention, in the first reality of the first aspect of the embodiment of the present invention
Executing in mode, described hiding according to described first judged result or display destination object icon includes:
If the identifier of the current external equipment connected is the identifier stored, then show described target pair
The icon of elephant;
If the identifier of the current external equipment connected is not the identifier stored, then hide described target
The icon of object.
Any in conjunction with among the first aspect of the embodiment of the present invention, the first embodiment of first aspect
One, in the second embodiment of the first aspect of the embodiment of the present invention, also includes:
If the identifier of the current external equipment connected is not the identifier stored, then send inquiry message,
Described inquiry message is for inquiring whether user stores the identifier of the external equipment of current connection;
If getting the storage instruction of user input, then sending identity request information, described storage instructs
For determining the identifier of the current external equipment connected of storage, described identity request information makes for request
User inputs authentication information;
If the authentication information of user input matches with the authentication information that prestores, then storage is current
The identifier of the external equipment connected.
In conjunction with the first aspect of the embodiment of the present invention, first aspect the first to the second embodiment it
In any one, in the third embodiment of the first aspect of the embodiment of the present invention, also include:
When the icon of described destination object is shown and gets the user figure for described destination object
During target click commands, display reminding information, described information is used for pointing out user input to unlock close
Code;
If the described unlocking pin of user input matches with described default unlocking pin, then to described mesh
Mark object deciphering, releases the locking of the access rights to described destination object.
In conjunction with the first aspect of the embodiment of the present invention, first aspect the first to the third embodiment it
In any one, in the 4th kind of embodiment of the first aspect of the embodiment of the present invention, including:
Described default unlocking pin includes in finger-print cipher, letter code, numerical ciphers, action password one
Individual or multiple combinations.
The described authentication information that prestores includes finger print information, alphabetical information, digital information, action message
In one or more combination.
A second aspect of the present invention provides a kind of device, including:
Generation module, for when being connected with any external equipment, it is judged that the current external equipment connected
Whether identifier is the identifier stored, and generates the first judged result, outside described identifier is used for identifying
Connect the identity of equipment;
Display module, for hiding according to described first judged result or the icon of display destination object, institute
Stating destination object and include destination folder and/or file destination, described destination object is encrypted also through user
It is provided with the default unlocking pin deciphered.
In conjunction with the second aspect of the embodiment of the present invention, in the first reality of the second aspect of the embodiment of the present invention
Executing in mode, described display module includes:
Display unit, if the identifier for the current external equipment connected is the identifier stored, then
Show the icon of described destination object;
Hidden unit, if the identifier for the current external equipment connected is not the identifier stored,
Then hide the icon of described destination object.
Any one in conjunction with in the second aspect of the embodiment of the present invention and the first embodiment of second aspect
Kind, in the second embodiment of the second aspect of the embodiment of the present invention, also include:
Inquiry module, if the identifier for the current external equipment connected is not the identifier stored,
Then sending inquiry message, described inquiry message is for inquiring whether user stores current the external of connection and set
Standby identifier;
Request module, if for the storage instruction getting user input, then sending identity request information,
Described storage instruction is for determining the identifier of the current external equipment connected of storage, and described identity request is believed
Breath is used for asking user to input authentication information;
Memory module, if the authentication information inputted for user and the authentication information phase that prestores
Join, then the identifier of the current external equipment connected of storage.
In conjunction with the second aspect of the embodiment of the present invention, the first embodiment of second aspect and second aspect
The second embodiment in any one, the embodiment of the present invention second aspect the third implement
In mode, also include:
Reminding module, when the icon of described destination object is shown and gets user for described mesh
During the click commands of icon of mark object, display reminding information, described information is used for pointing out user
Input unlocking pin;
Deciphering module, if the described unlocking pin inputted for user and described default unlocking pin phase
Join, then described destination object is deciphered, release the locking of the access rights to described destination object.
Real to the third in conjunction with the second aspect of the embodiment of the present invention, the first embodiment of second aspect
Execute in mode any one, in the 4th kind of embodiment of the second aspect of the embodiment of the present invention, bag
Include:
Described default unlocking pin includes in finger-print cipher, letter code, numerical ciphers, action password one
Individual or multiple combinations.
The described authentication information that prestores includes finger print information, alphabetical information, digital information, action message
In one or more combination.
As can be seen from the above technical solutions, the embodiment of the present invention has the advantage that
The embodiment of the present invention provides a kind of document handling method based on external equipment and device.Work as terminal
When being connected with external equipment, it is judged that whether the identifier of the current external equipment connected is the identification stored
Number.And according to judgment result displays or vanishing target file and destination folder.When file or file
After double-layered quilt shows, user also need to obtain file destination by inputting correct unlocking pin and
The access rights of destination folder.This by utilizing external equipment that destination folder is hidden or aobvious
Show, the method encrypted and decipher that protection destination folder and the safety of respective file protect use
The privacy at family.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below will be to required in embodiment
Accompanying drawing to be used is briefly described, it should be apparent that, the accompanying drawing in describing below is only the present invention
Embodiment, for those of ordinary skill in the art, on the premise of not paying creative work,
Other accompanying drawing can also be obtained according to the accompanying drawing provided.
Fig. 1 is an embodiment of a kind of based on external equipment the document handling method of the embodiment of the present invention
Schematic diagram;
Fig. 2 is another enforcement of a kind of based on external equipment the document handling method of the embodiment of the present invention
Illustrate and be intended to;
Fig. 3 is an embodiment schematic diagram of a kind of device of the embodiment of the present invention.
Detailed description of the invention
Embodiments provide a kind of file processing method based on external equipment, for file
Folder is hidden and encrypts, and recycling external equipment shows and decipher file, the peace of protection file
Complete and the privacy of user.
In order to make those skilled in the art be more fully understood that the present invention program, real below in conjunction with the present invention
Execute the accompanying drawing in example, the technical scheme in the embodiment of the present invention be clearly and completely described, it is clear that
Described embodiment is only the embodiment of a present invention part rather than whole embodiments.Based on
Embodiment in the present invention, those of ordinary skill in the art are obtained under not making creative work premise
The every other embodiment obtained, all should belong to the scope of protection of the invention.
Term " first " in description and claims of this specification and above-mentioned accompanying drawing, " second ", "
Three ", the (if present) such as " the 4th " be for distinguishing similar object, specific without being used for describing
Order or precedence.Should be appreciated that the data of so use can be exchanged in the appropriate case, in order to
The embodiments described herein can be implemented with the order in addition to the content except here illustrating or describe.This
Outward, term " includes " and " having " and their any deformation, it is intended that cover non-exclusive
Comprise, such as, contain series of steps or the process of unit, method, system, product or equipment not
Be necessarily limited to those steps or the unit clearly listed, but can include the most clearly listing or for
Other step that these processes, method, product or equipment are intrinsic or unit.
In embodiments of the present invention, terminal obtains the identifier of external equipment, and terminal is by identifier and target
File matches, and sets up mapping relations.Terminal shows according to mapping relations or vanishing target file.
Below related work flow process is described in detail, refers to Fig. 1 herein.
Step 101, when being connected with any external equipment, it is judged that the identifier of the current external equipment connected
Whether it is the identifier stored, generates judged result;
When terminal is connected with any external equipment, can judge that the identifier of the external equipment currently connected is
The no identifier for having stored, generates judged result.Because each external equipment has only one pair
The identifier answered, therefore terminal may determine that after being connected to external equipment the identifier of this external equipment has
It is not recorded.Here external equipment can be earphone or other equipment, is not especially limited herein.
Step 102, or the icon of display destination object hiding according to judged result;
After obtaining judged result, terminal can select display or vanishing target object according to judged result
Icon.Goal object includes file and/or file, user arrange selection.Mesh
Mark object is encrypted and is provided with through user with the default unlocking pin deciphered, and encrypts and has i.e. locked mesh
The access rights of mark file or folder, need user input with to preset the unblock that unlocking pin mates close
Code just can obtain access rights.Default unlocking pin include finger-print cipher, letter code, numerical ciphers,
Combinations one or more in action password
In the embodiment of the present invention, because file destination and file are encrypted by terminal, lock onto target
The access rights of file, so user needs to input unlocking pin just can obtain access rights.Below
Related work flow process is described in detail, refers to Fig. 2 herein.
In the embodiment of the present invention, step 201 is identical with step 101, and here is omitted.
If the identifier of the external equipment that step 202 currently connects is the identifier stored, then show institute
State the icon of destination object;
If the identifier of the external equipment being currently connected with terminal is the identification through the storage of terminal record
Number, then terminal can show the icon of file destination and file.
If the identifier of the external equipment that step 203 currently connects is not the identifier stored, then hide
The icon of described destination object;
If the identifier of the external equipment being currently connected with terminal is not the identification through the storage of terminal record
Number, then terminal can vanishing target file and the icon of file.
If the identifier of the external equipment that step 204 currently connects is not the identifier stored, then send
Inquiry message;
The identifier judging the external equipment being connected with terminal after step 203 is not the identifier stored
Time, except vanishing target file and the icon of file, it is also possible to send inquiry message, this inquiry message
For inquiring whether user stores the identifier of the external equipment of current connection.If terminal storage is worked as
The identifier of the external equipment of front connection, in use afterwards, as long as this external equipment is with terminal even
Icon will be shown when connecing.
If step 205 gets the storage instruction of user input, then send identity request information;
When user sends the feedback information for inquiry message, i.e. send storage instruction and determine and need storage
During the identifier of the current external equipment connected, terminal can send identity request information, and request user is tested
Card identity, prevents the setting of any one user change identifier, only allows making by authentication
User changes identifier and arranges, and increases the identifier of the external equipment of storage.
If the authentication information of step 206 user input matches with the authentication information that prestores, then
The identifier of the current external equipment connected of storage;
If user have input correct authentication information, the authentication information i.e. inputted with prestore
Authentication information is mated, it was demonstrated that user is to be verified mandate to change terminal and set identifier
Put, then terminal can carry out storing the step of the identifier of the external equipment of current connection.Prestore authentication
Information includes combinations one or more in finger print information, alphabetical information, digital information, action message.
Step 207, when the icon of destination object is shown and gets the user figure for destination object
During target click commands, display reminding information;
When terminal is connected with external equipment, and the identifier of external equipment is through terminal storage,
Then terminal can show the icon of file destination and file.When user desires access to file destination and file
Folder and after clicking on icon, terminal can send information, prompting user input unlocking pin.
If the unlocking pin of step 208 user input matches with default unlocking pin, then to target pair
As deciphering, release the locking of the access rights to destination object.
Unlock with presetting when user have input correct unlocking pin, the i.e. unlocking pin of user input
After code matches, terminal can release file destination and the locking of the access rights of file.User
File destination and file can be accessed.
Above the file processing method based on external equipment in the embodiment of the present invention is described,
Below the device in the embodiment of the present invention is described.
Referring to Fig. 3, an embodiment of a kind of device in the embodiment of the present invention includes:
Device include generation module 301, display module 302, inquiry module 303, request module 304,
Memory module 305, reminding module 306, deciphering module 307.
Generation module 301, for when being connected with any external equipment, it is judged that the current external equipment connected
Identifier whether be the identifier stored, generate the first judged result, identifier is used for identifying external
The identity of equipment.
Display module 302, for hiding according to the first judged result or the icon of display destination object, target
Object includes destination folder and/or file destination, and destination object is encrypted and is provided with through user with
The default unlocking pin of deciphering.
Further, display module 302 includes display unit 3021, hidden unit 3022.
Display unit 3021, if the identifier for the current external equipment connected is the identifier stored,
Then show the icon of destination object.
Hidden unit 3022, if the identifier for the current external equipment connected is not the identification stored
Number, then the icon of vanishing target object.
Inquiry module 303, if the identifier for the current external equipment connected is not the identification stored
Number, then sending inquiry message, inquiry message is for inquiring whether user stores current the external of connection and set
Standby identifier.
Request module 304, if for the storage instruction getting user input, then sending identity request letter
Breath, storage instruction is for determining the identifier of the current external equipment connected of storage, and identity request information is used
In request user input authentication information.
Memory module 305, if the authentication information inputted for user and the authentication information phase that prestores
Coupling, the then identifier of the current external equipment connected of storage.
Reminding module 306, when the icon of destination object is shown and gets user for destination object
The click commands of icon time, display reminding information, information is used for pointing out user input to unlock close
Code.
Deciphering module 307, if the unlocking pin for user input matches with default unlocking pin, then
Destination object is deciphered, releases the locking of the access rights to destination object.
Those skilled in the art is it can be understood that arrive, and for convenience and simplicity of description, above-mentioned retouches
The specific works process of the system stated, device and unit, is referred to the correspondence in preceding method embodiment
Process, does not repeats them here.
In several embodiments provided herein, it should be understood that disclosed system, device and
Method, can realize by another way.Such as, device embodiment described above is only shown
Meaning property, such as, the division of described unit, be only a kind of logic function and divide, actual can when realizing
There to be other dividing mode, the most multiple unit or assembly can in conjunction with or be desirably integrated into another
System, or some features can ignore, or do not perform.Another point, shown or discussed each other
Coupling direct-coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit
Or communication connection, can be electrical, machinery or other form.
The described unit illustrated as separating component can be or may not be physically separate, makees
The parts shown for unit can be or may not be physical location, i.e. may be located at a place,
Or can also be distributed on multiple NE.Can select according to the actual needs part therein or
The whole unit of person realizes the purpose of the present embodiment scheme.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit,
Can also be that unit is individually physically present, it is also possible to two or more unit are integrated in a list
In unit.Above-mentioned integrated unit both can realize to use the form of hardware, it would however also be possible to employ software function list
The form of unit realizes.
If described integrated unit realizes and as independent production marketing using the form of SFU software functional unit
Or when using, can be stored in a computer read/write memory medium.Based on such understanding, this
The part that the most in other words prior art contributed of technical scheme of invention or this technical scheme
Completely or partially can embody with the form of software product, this computer software product is stored in one
In storage medium, including some instructions with so that computer equipment (can be personal computer,
Server, or the network equipment etc.) perform completely or partially walking of method described in each embodiment of the present invention
Suddenly.And aforesaid storage medium includes: USB flash disk, portable hard drive, read only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD
Etc. the various media that can store program code.
The above, above example only in order to technical scheme to be described, is not intended to limit;
Although being described in detail the present invention with reference to previous embodiment, those of ordinary skill in the art should
Work as understanding: the technical scheme described in foregoing embodiments still can be modified by it, or to it
Middle part technical characteristic carries out equivalent;And these amendments or replacement, do not make appropriate technical solution
Essence depart from various embodiments of the present invention technical scheme spirit and scope.
Claims (10)
1. a document handling method based on external equipment, it is characterised in that including:
When being connected with any external equipment, it is judged that whether the identifier of the current external equipment connected is
The identifier of storage, generates the first judged result, and described identifier is for identifying the identity of external equipment;
Hiding according to described first judged result or the icon of display destination object, described destination object includes
Destination folder and/or file destination, described destination object is encrypted and is provided with through user with deciphering
Default unlocking pin.
Document handling method based on external equipment the most according to claim 1, it is characterised in that
Described hiding according to described first judged result or display destination object icon includes:
If the identifier of the current external equipment connected is the identifier stored, then show described target pair
The icon of elephant;
If the identifier of the current external equipment connected is not the identifier stored, then hide described target
The icon of object.
Document handling method based on external equipment the most according to claim 2, it is characterised in that
Also include:
If the identifier of the current external equipment connected is not the identifier stored, then send inquiry message,
Described inquiry message is for inquiring whether user stores the identifier of the external equipment of current connection;
If getting the storage instruction of user input, then sending identity request information, described storage instructs
For determining the identifier of the current external equipment connected of storage, described identity request information makes for request
User inputs authentication information;
If the authentication information of user input matches with the authentication information that prestores, then storage is current
The identifier of the external equipment connected.
Document handling method based on external equipment the most according to claim 2, it is characterised in that
Also include:
When the icon of described destination object is shown and gets the user figure for described destination object
During target click commands, display reminding information, described information is used for pointing out user input to unlock close
Code;
If the described unlocking pin of user input matches with described default unlocking pin, then to described mesh
Mark object deciphering, releases the locking of the access rights to described destination object.
5., according to the document handling method based on external equipment described in claim 1 or 3, its feature exists
In, including:
Described default unlocking pin includes in finger-print cipher, letter code, numerical ciphers, action password one
Individual or multiple combinations.
The described authentication information that prestores includes finger print information, alphabetical information, digital information, action message
In one or more combination.
6. a device, it is characterised in that including:
Generation module, for when being connected with any external equipment, it is judged that the current external equipment connected
Whether identifier is the identifier stored, and generates the first judged result, outside described identifier is used for identifying
Connect the identity of equipment;
Display module, for hiding according to described first judged result or the icon of display destination object, institute
Stating destination object and include destination folder and/or file destination, described destination object is encrypted also through user
It is provided with the default unlocking pin deciphered.
Device the most according to claim 6, it is characterised in that described display module includes:
Display unit, if the identifier for the current external equipment connected is the identifier stored, then
Show the icon of described destination object;
Hidden unit, if the identifier for the current external equipment connected is not the identifier stored,
Then hide the icon of described destination object.
Device the most according to claim 7, it is characterised in that also include:
Inquiry module, if the identifier for the current external equipment connected is not the identifier stored,
Then sending inquiry message, described inquiry message is for inquiring whether user stores current the external of connection and set
Standby identifier;
Request module, if for the storage instruction getting user input, then sending identity request information,
Described storage instruction is for determining the identifier of the current external equipment connected of storage, and described identity request is believed
Breath is used for asking user to input authentication information;
Memory module, if the authentication information inputted for user and the authentication information phase that prestores
Join, then the identifier of the current external equipment connected of storage.
Device the most according to claim 7, it is characterised in that also include:
Reminding module, when the icon of described destination object is shown and gets user for described mesh
During the click commands of icon of mark object, display reminding information, described information is used for pointing out user
Input unlocking pin;
Deciphering module, if the described unlocking pin inputted for user and described default unlocking pin phase
Join, then described destination object is deciphered, release the locking of the access rights to described destination object.
10. according to device described in claim 6 or 8, it is characterised in that including:
Described default unlocking pin includes in finger-print cipher, letter code, numerical ciphers, action password one
Individual or multiple combinations.
The described authentication information that prestores includes finger print information, alphabetical information, digital information, action message
In one or more combination.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610206660.4A CN105912947A (en) | 2016-03-31 | 2016-03-31 | File processing method and device based on external equipment |
PCT/CN2016/113490 WO2017166884A1 (en) | 2016-03-31 | 2016-12-30 | File processing method and apparatus employing external device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610206660.4A CN105912947A (en) | 2016-03-31 | 2016-03-31 | File processing method and device based on external equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105912947A true CN105912947A (en) | 2016-08-31 |
Family
ID=56745505
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610206660.4A Pending CN105912947A (en) | 2016-03-31 | 2016-03-31 | File processing method and device based on external equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105912947A (en) |
WO (1) | WO2017166884A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017166884A1 (en) * | 2016-03-31 | 2017-10-05 | 宇龙计算机通信科技(深圳)有限公司 | File processing method and apparatus employing external device |
CN108121904A (en) * | 2017-12-04 | 2018-06-05 | 北京三快在线科技有限公司 | Unlocking method, device, electronic equipment and server |
CN109857274A (en) * | 2018-12-25 | 2019-06-07 | 深圳视爵光旭电子有限公司 | A kind of display device and its control method, system |
CN113626796A (en) * | 2021-08-16 | 2021-11-09 | 深圳市康冠商用科技有限公司 | Permission obtaining method and device based on USB flash disk, display equipment and storage medium |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108257272A (en) * | 2018-01-22 | 2018-07-06 | 珠海优特电力科技股份有限公司 | Replicate the method and system of unlocker device |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006259942A (en) * | 2005-03-16 | 2006-09-28 | Nec Corp | Security management system, server device, client terminal and security protection method used therefor |
CN101399666A (en) * | 2007-09-28 | 2009-04-01 | 中国银联股份有限公司 | Safety control method and system for digital certificate of file |
CN101459723A (en) * | 2007-12-14 | 2009-06-17 | 希姆通信息技术(上海)有限公司 | Secret keeping processing method for mobile phone information |
US20090222500A1 (en) * | 2008-02-29 | 2009-09-03 | Waremax Electronics Corp. | Information storage device and method capable of hiding confidential files |
CN201698408U (en) * | 2010-06-23 | 2011-01-05 | 沈刚 | Storing mechanism capable of hiding or displaying part of storage space through RF induction manner |
CN103338445A (en) * | 2013-06-19 | 2013-10-02 | 深圳市垦鑫达科技有限公司 | File encryption and decryption method and system |
CN103577761A (en) * | 2013-10-25 | 2014-02-12 | 北京奇虎科技有限公司 | Method and device for processing privacy data in mobile equipment |
CN103761067A (en) * | 2013-12-13 | 2014-04-30 | 昆山五昌新精密电子工业有限公司 | Processing system and processing method for encryption/decryption of data files |
CN204087190U (en) * | 2013-12-13 | 2015-01-07 | 昆山五昌新精密电子工业有限公司 | The disposal system of the enciphering/deciphering of data file |
CN105307287A (en) * | 2015-10-19 | 2016-02-03 | 宇龙计算机通信科技(深圳)有限公司 | Connection method and wearable equipment |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201233601Y (en) * | 2008-05-05 | 2009-05-06 | 丁卓 | File concealment system and apparatus based on USB equipment |
US8224796B1 (en) * | 2009-09-11 | 2012-07-17 | Symantec Corporation | Systems and methods for preventing data loss on external devices |
CN105279453B (en) * | 2015-09-25 | 2018-04-06 | 南京伍安信息科技有限公司 | It is a kind of to support the partitions of file for separating storage management to hide system and method |
CN105912947A (en) * | 2016-03-31 | 2016-08-31 | 宇龙计算机通信科技(深圳)有限公司 | File processing method and device based on external equipment |
-
2016
- 2016-03-31 CN CN201610206660.4A patent/CN105912947A/en active Pending
- 2016-12-30 WO PCT/CN2016/113490 patent/WO2017166884A1/en active Application Filing
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006259942A (en) * | 2005-03-16 | 2006-09-28 | Nec Corp | Security management system, server device, client terminal and security protection method used therefor |
CN101399666A (en) * | 2007-09-28 | 2009-04-01 | 中国银联股份有限公司 | Safety control method and system for digital certificate of file |
CN101459723A (en) * | 2007-12-14 | 2009-06-17 | 希姆通信息技术(上海)有限公司 | Secret keeping processing method for mobile phone information |
US20090222500A1 (en) * | 2008-02-29 | 2009-09-03 | Waremax Electronics Corp. | Information storage device and method capable of hiding confidential files |
CN201698408U (en) * | 2010-06-23 | 2011-01-05 | 沈刚 | Storing mechanism capable of hiding or displaying part of storage space through RF induction manner |
CN103338445A (en) * | 2013-06-19 | 2013-10-02 | 深圳市垦鑫达科技有限公司 | File encryption and decryption method and system |
CN103577761A (en) * | 2013-10-25 | 2014-02-12 | 北京奇虎科技有限公司 | Method and device for processing privacy data in mobile equipment |
CN103761067A (en) * | 2013-12-13 | 2014-04-30 | 昆山五昌新精密电子工业有限公司 | Processing system and processing method for encryption/decryption of data files |
CN204087190U (en) * | 2013-12-13 | 2015-01-07 | 昆山五昌新精密电子工业有限公司 | The disposal system of the enciphering/deciphering of data file |
CN105307287A (en) * | 2015-10-19 | 2016-02-03 | 宇龙计算机通信科技(深圳)有限公司 | Connection method and wearable equipment |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017166884A1 (en) * | 2016-03-31 | 2017-10-05 | 宇龙计算机通信科技(深圳)有限公司 | File processing method and apparatus employing external device |
CN108121904A (en) * | 2017-12-04 | 2018-06-05 | 北京三快在线科技有限公司 | Unlocking method, device, electronic equipment and server |
CN108121904B (en) * | 2017-12-04 | 2019-09-17 | 北京三快在线科技有限公司 | Unlocking method, device, electronic equipment and server |
CN109857274A (en) * | 2018-12-25 | 2019-06-07 | 深圳视爵光旭电子有限公司 | A kind of display device and its control method, system |
CN113626796A (en) * | 2021-08-16 | 2021-11-09 | 深圳市康冠商用科技有限公司 | Permission obtaining method and device based on USB flash disk, display equipment and storage medium |
CN113626796B (en) * | 2021-08-16 | 2022-05-03 | 深圳市康冠商用科技有限公司 | Permission obtaining method and device based on USB flash disk, display equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2017166884A1 (en) | 2017-10-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105912947A (en) | File processing method and device based on external equipment | |
CN101120355B (en) | System for creating control structure for versatile content control | |
US20060294391A1 (en) | Data encryption and decryption method | |
CN104834868A (en) | Electronic data protection method, device and terminal equipment | |
CN105117635B (en) | A kind of safety system and method for local data | |
CN104657674A (en) | Isolation protection system and isolation protection method of private data in mobile phone | |
CN101361076A (en) | Mobile memory system for secure storage and delivery of media content | |
CN105005731A (en) | Data encryption and decryption methods and mobile terminal | |
CN112165490B (en) | Encryption method, decryption method, storage medium and terminal equipment | |
CN104573551A (en) | File processing method and mobile terminal | |
CN102750497A (en) | Method and device for deciphering private information | |
KR101625785B1 (en) | Method and device for information security management of mobile terminal, and mobile terminal | |
CN103455761A (en) | File encryption and decryption method and device and electronic device | |
US8667025B2 (en) | Variable substitution data processing method | |
CN104768148A (en) | Message encryption method and device | |
KR20210046357A (en) | Method and apparatus for key storing and recovery for blockchain based system | |
EP4343592A1 (en) | Personal digital identity management system and method | |
CN102202057B (en) | System and method for safely dumping data of mobile memory | |
US8656179B2 (en) | Using hidden secrets and token devices to create secure volumes | |
CN104915583A (en) | Interface decryption processing method and mobile terminal | |
CN105022965B (en) | A kind of data ciphering method and device | |
US20050129246A1 (en) | Intelligent digital secure LockBox and access key distribution system (DLB) | |
CN105704096B (en) | Document decryption method and device | |
WO2017120745A1 (en) | Method, device, and system for processing profile | |
CN102098391B (en) | Communication terminal and communication information processing method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160831 |