CN105912947A - File processing method and device based on external equipment - Google Patents

File processing method and device based on external equipment Download PDF

Info

Publication number
CN105912947A
CN105912947A CN201610206660.4A CN201610206660A CN105912947A CN 105912947 A CN105912947 A CN 105912947A CN 201610206660 A CN201610206660 A CN 201610206660A CN 105912947 A CN105912947 A CN 105912947A
Authority
CN
China
Prior art keywords
external equipment
identifier
destination object
user
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610206660.4A
Other languages
Chinese (zh)
Inventor
杨俊�
李家军
饶俊成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610206660.4A priority Critical patent/CN105912947A/en
Publication of CN105912947A publication Critical patent/CN105912947A/en
Priority to PCT/CN2016/113490 priority patent/WO2017166884A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The embodiment of the invention discloses a file processing method and device based on external equipment used for utilizing the external equipment to conceal, encrypt files, display and decrypt files. The method of the embodiment comprises following steps: determining whether an identification number of currently-connected external equipment is a stored identification number or not when connection with any external equipment is achieved and generating a first judging result, wherein the identification number is used for indentifying the identity of the external equipment; and concealing or displaying an icon of a target object based on the first judging result, wherein the target object comprises a target folder and/or a target file and the target object is a pre-set unlocking password encrypted by the user and set to be decrypted after use.In the embodiment, a terminal is used for displaying or concealing the target file for the stored identification number based on the identification number of the external equipment.The external equipment is utilized for concealing or displaying the target folder and encryption and decryption methods are utilized so that safety of the target file and the target folder is protected.

Description

Document handling method based on external equipment and device
Technical field
The present invention relates to mobile terminal document processing technology field, especially relate to a kind of based on external equipment Document handling method and device.
Background technology
In present life, along with popularizing of intelligent terminal, such as the intelligence such as mobile phone, panel computer is eventually End equipment becomes the many user's indispensable instruments in live and work.And it is based on intelligent terminal Various application programs are also because its multiformity and ease for use become many users and solve the important hands of problem Section.Intelligent terminal is mounted with various types of application according to use habit and the demand of user mostly Program, user is generally for the convenience used, it will usually set up file to some application program therein Carry out Classification Management.
User usually can store some private file in intelligent terminal and be unwilling to be known by others, but In actual applications, sometimes can ignore because of use thus reveal some privacy content.
Summary of the invention
Embodiments provide a kind of document handling method based on external equipment and device, for right File destination and destination folder are hidden and encrypt, and recycling external equipment shows and deciphers File, the safety of protection file and the privacy of user.
In view of this, a first aspect of the present invention provides a kind of document handling method based on external equipment, Including:
When being connected with any external equipment, it is judged that whether the identifier of the current external equipment connected is The identifier of storage, generates the first judged result, and described identifier is for identifying the identity of external equipment;
Hiding according to described first judged result or the icon of display destination object, described destination object includes Destination folder and/or file destination, described destination object is encrypted and is provided with through user with deciphering Default unlocking pin.
In conjunction with the first aspect of the embodiment of the present invention, in the first reality of the first aspect of the embodiment of the present invention Executing in mode, described hiding according to described first judged result or display destination object icon includes:
If the identifier of the current external equipment connected is the identifier stored, then show described target pair The icon of elephant;
If the identifier of the current external equipment connected is not the identifier stored, then hide described target The icon of object.
Any in conjunction with among the first aspect of the embodiment of the present invention, the first embodiment of first aspect One, in the second embodiment of the first aspect of the embodiment of the present invention, also includes:
If the identifier of the current external equipment connected is not the identifier stored, then send inquiry message, Described inquiry message is for inquiring whether user stores the identifier of the external equipment of current connection;
If getting the storage instruction of user input, then sending identity request information, described storage instructs For determining the identifier of the current external equipment connected of storage, described identity request information makes for request User inputs authentication information;
If the authentication information of user input matches with the authentication information that prestores, then storage is current The identifier of the external equipment connected.
In conjunction with the first aspect of the embodiment of the present invention, first aspect the first to the second embodiment it In any one, in the third embodiment of the first aspect of the embodiment of the present invention, also include:
When the icon of described destination object is shown and gets the user figure for described destination object During target click commands, display reminding information, described information is used for pointing out user input to unlock close Code;
If the described unlocking pin of user input matches with described default unlocking pin, then to described mesh Mark object deciphering, releases the locking of the access rights to described destination object.
In conjunction with the first aspect of the embodiment of the present invention, first aspect the first to the third embodiment it In any one, in the 4th kind of embodiment of the first aspect of the embodiment of the present invention, including:
Described default unlocking pin includes in finger-print cipher, letter code, numerical ciphers, action password one Individual or multiple combinations.
The described authentication information that prestores includes finger print information, alphabetical information, digital information, action message In one or more combination.
A second aspect of the present invention provides a kind of device, including:
Generation module, for when being connected with any external equipment, it is judged that the current external equipment connected Whether identifier is the identifier stored, and generates the first judged result, outside described identifier is used for identifying Connect the identity of equipment;
Display module, for hiding according to described first judged result or the icon of display destination object, institute Stating destination object and include destination folder and/or file destination, described destination object is encrypted also through user It is provided with the default unlocking pin deciphered.
In conjunction with the second aspect of the embodiment of the present invention, in the first reality of the second aspect of the embodiment of the present invention Executing in mode, described display module includes:
Display unit, if the identifier for the current external equipment connected is the identifier stored, then Show the icon of described destination object;
Hidden unit, if the identifier for the current external equipment connected is not the identifier stored, Then hide the icon of described destination object.
Any one in conjunction with in the second aspect of the embodiment of the present invention and the first embodiment of second aspect Kind, in the second embodiment of the second aspect of the embodiment of the present invention, also include:
Inquiry module, if the identifier for the current external equipment connected is not the identifier stored, Then sending inquiry message, described inquiry message is for inquiring whether user stores current the external of connection and set Standby identifier;
Request module, if for the storage instruction getting user input, then sending identity request information, Described storage instruction is for determining the identifier of the current external equipment connected of storage, and described identity request is believed Breath is used for asking user to input authentication information;
Memory module, if the authentication information inputted for user and the authentication information phase that prestores Join, then the identifier of the current external equipment connected of storage.
In conjunction with the second aspect of the embodiment of the present invention, the first embodiment of second aspect and second aspect The second embodiment in any one, the embodiment of the present invention second aspect the third implement In mode, also include:
Reminding module, when the icon of described destination object is shown and gets user for described mesh During the click commands of icon of mark object, display reminding information, described information is used for pointing out user Input unlocking pin;
Deciphering module, if the described unlocking pin inputted for user and described default unlocking pin phase Join, then described destination object is deciphered, release the locking of the access rights to described destination object.
Real to the third in conjunction with the second aspect of the embodiment of the present invention, the first embodiment of second aspect Execute in mode any one, in the 4th kind of embodiment of the second aspect of the embodiment of the present invention, bag Include:
Described default unlocking pin includes in finger-print cipher, letter code, numerical ciphers, action password one Individual or multiple combinations.
The described authentication information that prestores includes finger print information, alphabetical information, digital information, action message In one or more combination.
As can be seen from the above technical solutions, the embodiment of the present invention has the advantage that
The embodiment of the present invention provides a kind of document handling method based on external equipment and device.Work as terminal When being connected with external equipment, it is judged that whether the identifier of the current external equipment connected is the identification stored Number.And according to judgment result displays or vanishing target file and destination folder.When file or file After double-layered quilt shows, user also need to obtain file destination by inputting correct unlocking pin and The access rights of destination folder.This by utilizing external equipment that destination folder is hidden or aobvious Show, the method encrypted and decipher that protection destination folder and the safety of respective file protect use The privacy at family.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below will be to required in embodiment Accompanying drawing to be used is briefly described, it should be apparent that, the accompanying drawing in describing below is only the present invention Embodiment, for those of ordinary skill in the art, on the premise of not paying creative work, Other accompanying drawing can also be obtained according to the accompanying drawing provided.
Fig. 1 is an embodiment of a kind of based on external equipment the document handling method of the embodiment of the present invention Schematic diagram;
Fig. 2 is another enforcement of a kind of based on external equipment the document handling method of the embodiment of the present invention Illustrate and be intended to;
Fig. 3 is an embodiment schematic diagram of a kind of device of the embodiment of the present invention.
Detailed description of the invention
Embodiments provide a kind of file processing method based on external equipment, for file Folder is hidden and encrypts, and recycling external equipment shows and decipher file, the peace of protection file Complete and the privacy of user.
In order to make those skilled in the art be more fully understood that the present invention program, real below in conjunction with the present invention Execute the accompanying drawing in example, the technical scheme in the embodiment of the present invention be clearly and completely described, it is clear that Described embodiment is only the embodiment of a present invention part rather than whole embodiments.Based on Embodiment in the present invention, those of ordinary skill in the art are obtained under not making creative work premise The every other embodiment obtained, all should belong to the scope of protection of the invention.
Term " first " in description and claims of this specification and above-mentioned accompanying drawing, " second ", " Three ", the (if present) such as " the 4th " be for distinguishing similar object, specific without being used for describing Order or precedence.Should be appreciated that the data of so use can be exchanged in the appropriate case, in order to The embodiments described herein can be implemented with the order in addition to the content except here illustrating or describe.This Outward, term " includes " and " having " and their any deformation, it is intended that cover non-exclusive Comprise, such as, contain series of steps or the process of unit, method, system, product or equipment not Be necessarily limited to those steps or the unit clearly listed, but can include the most clearly listing or for Other step that these processes, method, product or equipment are intrinsic or unit.
In embodiments of the present invention, terminal obtains the identifier of external equipment, and terminal is by identifier and target File matches, and sets up mapping relations.Terminal shows according to mapping relations or vanishing target file. Below related work flow process is described in detail, refers to Fig. 1 herein.
Step 101, when being connected with any external equipment, it is judged that the identifier of the current external equipment connected Whether it is the identifier stored, generates judged result;
When terminal is connected with any external equipment, can judge that the identifier of the external equipment currently connected is The no identifier for having stored, generates judged result.Because each external equipment has only one pair The identifier answered, therefore terminal may determine that after being connected to external equipment the identifier of this external equipment has It is not recorded.Here external equipment can be earphone or other equipment, is not especially limited herein.
Step 102, or the icon of display destination object hiding according to judged result;
After obtaining judged result, terminal can select display or vanishing target object according to judged result Icon.Goal object includes file and/or file, user arrange selection.Mesh Mark object is encrypted and is provided with through user with the default unlocking pin deciphered, and encrypts and has i.e. locked mesh The access rights of mark file or folder, need user input with to preset the unblock that unlocking pin mates close Code just can obtain access rights.Default unlocking pin include finger-print cipher, letter code, numerical ciphers, Combinations one or more in action password
In the embodiment of the present invention, because file destination and file are encrypted by terminal, lock onto target The access rights of file, so user needs to input unlocking pin just can obtain access rights.Below Related work flow process is described in detail, refers to Fig. 2 herein.
In the embodiment of the present invention, step 201 is identical with step 101, and here is omitted.
If the identifier of the external equipment that step 202 currently connects is the identifier stored, then show institute State the icon of destination object;
If the identifier of the external equipment being currently connected with terminal is the identification through the storage of terminal record Number, then terminal can show the icon of file destination and file.
If the identifier of the external equipment that step 203 currently connects is not the identifier stored, then hide The icon of described destination object;
If the identifier of the external equipment being currently connected with terminal is not the identification through the storage of terminal record Number, then terminal can vanishing target file and the icon of file.
If the identifier of the external equipment that step 204 currently connects is not the identifier stored, then send Inquiry message;
The identifier judging the external equipment being connected with terminal after step 203 is not the identifier stored Time, except vanishing target file and the icon of file, it is also possible to send inquiry message, this inquiry message For inquiring whether user stores the identifier of the external equipment of current connection.If terminal storage is worked as The identifier of the external equipment of front connection, in use afterwards, as long as this external equipment is with terminal even Icon will be shown when connecing.
If step 205 gets the storage instruction of user input, then send identity request information;
When user sends the feedback information for inquiry message, i.e. send storage instruction and determine and need storage During the identifier of the current external equipment connected, terminal can send identity request information, and request user is tested Card identity, prevents the setting of any one user change identifier, only allows making by authentication User changes identifier and arranges, and increases the identifier of the external equipment of storage.
If the authentication information of step 206 user input matches with the authentication information that prestores, then The identifier of the current external equipment connected of storage;
If user have input correct authentication information, the authentication information i.e. inputted with prestore Authentication information is mated, it was demonstrated that user is to be verified mandate to change terminal and set identifier Put, then terminal can carry out storing the step of the identifier of the external equipment of current connection.Prestore authentication Information includes combinations one or more in finger print information, alphabetical information, digital information, action message.
Step 207, when the icon of destination object is shown and gets the user figure for destination object During target click commands, display reminding information;
When terminal is connected with external equipment, and the identifier of external equipment is through terminal storage, Then terminal can show the icon of file destination and file.When user desires access to file destination and file Folder and after clicking on icon, terminal can send information, prompting user input unlocking pin.
If the unlocking pin of step 208 user input matches with default unlocking pin, then to target pair As deciphering, release the locking of the access rights to destination object.
Unlock with presetting when user have input correct unlocking pin, the i.e. unlocking pin of user input After code matches, terminal can release file destination and the locking of the access rights of file.User File destination and file can be accessed.
Above the file processing method based on external equipment in the embodiment of the present invention is described, Below the device in the embodiment of the present invention is described.
Referring to Fig. 3, an embodiment of a kind of device in the embodiment of the present invention includes:
Device include generation module 301, display module 302, inquiry module 303, request module 304, Memory module 305, reminding module 306, deciphering module 307.
Generation module 301, for when being connected with any external equipment, it is judged that the current external equipment connected Identifier whether be the identifier stored, generate the first judged result, identifier is used for identifying external The identity of equipment.
Display module 302, for hiding according to the first judged result or the icon of display destination object, target Object includes destination folder and/or file destination, and destination object is encrypted and is provided with through user with The default unlocking pin of deciphering.
Further, display module 302 includes display unit 3021, hidden unit 3022.
Display unit 3021, if the identifier for the current external equipment connected is the identifier stored, Then show the icon of destination object.
Hidden unit 3022, if the identifier for the current external equipment connected is not the identification stored Number, then the icon of vanishing target object.
Inquiry module 303, if the identifier for the current external equipment connected is not the identification stored Number, then sending inquiry message, inquiry message is for inquiring whether user stores current the external of connection and set Standby identifier.
Request module 304, if for the storage instruction getting user input, then sending identity request letter Breath, storage instruction is for determining the identifier of the current external equipment connected of storage, and identity request information is used In request user input authentication information.
Memory module 305, if the authentication information inputted for user and the authentication information phase that prestores Coupling, the then identifier of the current external equipment connected of storage.
Reminding module 306, when the icon of destination object is shown and gets user for destination object The click commands of icon time, display reminding information, information is used for pointing out user input to unlock close Code.
Deciphering module 307, if the unlocking pin for user input matches with default unlocking pin, then Destination object is deciphered, releases the locking of the access rights to destination object.
Those skilled in the art is it can be understood that arrive, and for convenience and simplicity of description, above-mentioned retouches The specific works process of the system stated, device and unit, is referred to the correspondence in preceding method embodiment Process, does not repeats them here.
In several embodiments provided herein, it should be understood that disclosed system, device and Method, can realize by another way.Such as, device embodiment described above is only shown Meaning property, such as, the division of described unit, be only a kind of logic function and divide, actual can when realizing There to be other dividing mode, the most multiple unit or assembly can in conjunction with or be desirably integrated into another System, or some features can ignore, or do not perform.Another point, shown or discussed each other Coupling direct-coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit Or communication connection, can be electrical, machinery or other form.
The described unit illustrated as separating component can be or may not be physically separate, makees The parts shown for unit can be or may not be physical location, i.e. may be located at a place, Or can also be distributed on multiple NE.Can select according to the actual needs part therein or The whole unit of person realizes the purpose of the present embodiment scheme.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, Can also be that unit is individually physically present, it is also possible to two or more unit are integrated in a list In unit.Above-mentioned integrated unit both can realize to use the form of hardware, it would however also be possible to employ software function list The form of unit realizes.
If described integrated unit realizes and as independent production marketing using the form of SFU software functional unit Or when using, can be stored in a computer read/write memory medium.Based on such understanding, this The part that the most in other words prior art contributed of technical scheme of invention or this technical scheme Completely or partially can embody with the form of software product, this computer software product is stored in one In storage medium, including some instructions with so that computer equipment (can be personal computer, Server, or the network equipment etc.) perform completely or partially walking of method described in each embodiment of the present invention Suddenly.And aforesaid storage medium includes: USB flash disk, portable hard drive, read only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD Etc. the various media that can store program code.
The above, above example only in order to technical scheme to be described, is not intended to limit; Although being described in detail the present invention with reference to previous embodiment, those of ordinary skill in the art should Work as understanding: the technical scheme described in foregoing embodiments still can be modified by it, or to it Middle part technical characteristic carries out equivalent;And these amendments or replacement, do not make appropriate technical solution Essence depart from various embodiments of the present invention technical scheme spirit and scope.

Claims (10)

1. a document handling method based on external equipment, it is characterised in that including:
When being connected with any external equipment, it is judged that whether the identifier of the current external equipment connected is The identifier of storage, generates the first judged result, and described identifier is for identifying the identity of external equipment;
Hiding according to described first judged result or the icon of display destination object, described destination object includes Destination folder and/or file destination, described destination object is encrypted and is provided with through user with deciphering Default unlocking pin.
Document handling method based on external equipment the most according to claim 1, it is characterised in that Described hiding according to described first judged result or display destination object icon includes:
If the identifier of the current external equipment connected is the identifier stored, then show described target pair The icon of elephant;
If the identifier of the current external equipment connected is not the identifier stored, then hide described target The icon of object.
Document handling method based on external equipment the most according to claim 2, it is characterised in that Also include:
If the identifier of the current external equipment connected is not the identifier stored, then send inquiry message, Described inquiry message is for inquiring whether user stores the identifier of the external equipment of current connection;
If getting the storage instruction of user input, then sending identity request information, described storage instructs For determining the identifier of the current external equipment connected of storage, described identity request information makes for request User inputs authentication information;
If the authentication information of user input matches with the authentication information that prestores, then storage is current The identifier of the external equipment connected.
Document handling method based on external equipment the most according to claim 2, it is characterised in that Also include:
When the icon of described destination object is shown and gets the user figure for described destination object During target click commands, display reminding information, described information is used for pointing out user input to unlock close Code;
If the described unlocking pin of user input matches with described default unlocking pin, then to described mesh Mark object deciphering, releases the locking of the access rights to described destination object.
5., according to the document handling method based on external equipment described in claim 1 or 3, its feature exists In, including:
Described default unlocking pin includes in finger-print cipher, letter code, numerical ciphers, action password one Individual or multiple combinations.
The described authentication information that prestores includes finger print information, alphabetical information, digital information, action message In one or more combination.
6. a device, it is characterised in that including:
Generation module, for when being connected with any external equipment, it is judged that the current external equipment connected Whether identifier is the identifier stored, and generates the first judged result, outside described identifier is used for identifying Connect the identity of equipment;
Display module, for hiding according to described first judged result or the icon of display destination object, institute Stating destination object and include destination folder and/or file destination, described destination object is encrypted also through user It is provided with the default unlocking pin deciphered.
Device the most according to claim 6, it is characterised in that described display module includes:
Display unit, if the identifier for the current external equipment connected is the identifier stored, then Show the icon of described destination object;
Hidden unit, if the identifier for the current external equipment connected is not the identifier stored, Then hide the icon of described destination object.
Device the most according to claim 7, it is characterised in that also include:
Inquiry module, if the identifier for the current external equipment connected is not the identifier stored, Then sending inquiry message, described inquiry message is for inquiring whether user stores current the external of connection and set Standby identifier;
Request module, if for the storage instruction getting user input, then sending identity request information, Described storage instruction is for determining the identifier of the current external equipment connected of storage, and described identity request is believed Breath is used for asking user to input authentication information;
Memory module, if the authentication information inputted for user and the authentication information phase that prestores Join, then the identifier of the current external equipment connected of storage.
Device the most according to claim 7, it is characterised in that also include:
Reminding module, when the icon of described destination object is shown and gets user for described mesh During the click commands of icon of mark object, display reminding information, described information is used for pointing out user Input unlocking pin;
Deciphering module, if the described unlocking pin inputted for user and described default unlocking pin phase Join, then described destination object is deciphered, release the locking of the access rights to described destination object.
10. according to device described in claim 6 or 8, it is characterised in that including:
Described default unlocking pin includes in finger-print cipher, letter code, numerical ciphers, action password one Individual or multiple combinations.
The described authentication information that prestores includes finger print information, alphabetical information, digital information, action message In one or more combination.
CN201610206660.4A 2016-03-31 2016-03-31 File processing method and device based on external equipment Pending CN105912947A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610206660.4A CN105912947A (en) 2016-03-31 2016-03-31 File processing method and device based on external equipment
PCT/CN2016/113490 WO2017166884A1 (en) 2016-03-31 2016-12-30 File processing method and apparatus employing external device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610206660.4A CN105912947A (en) 2016-03-31 2016-03-31 File processing method and device based on external equipment

Publications (1)

Publication Number Publication Date
CN105912947A true CN105912947A (en) 2016-08-31

Family

ID=56745505

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610206660.4A Pending CN105912947A (en) 2016-03-31 2016-03-31 File processing method and device based on external equipment

Country Status (2)

Country Link
CN (1) CN105912947A (en)
WO (1) WO2017166884A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017166884A1 (en) * 2016-03-31 2017-10-05 宇龙计算机通信科技(深圳)有限公司 File processing method and apparatus employing external device
CN108121904A (en) * 2017-12-04 2018-06-05 北京三快在线科技有限公司 Unlocking method, device, electronic equipment and server
CN109857274A (en) * 2018-12-25 2019-06-07 深圳视爵光旭电子有限公司 A kind of display device and its control method, system
CN113626796A (en) * 2021-08-16 2021-11-09 深圳市康冠商用科技有限公司 Permission obtaining method and device based on USB flash disk, display equipment and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108257272A (en) * 2018-01-22 2018-07-06 珠海优特电力科技股份有限公司 Replicate the method and system of unlocker device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006259942A (en) * 2005-03-16 2006-09-28 Nec Corp Security management system, server device, client terminal and security protection method used therefor
CN101399666A (en) * 2007-09-28 2009-04-01 中国银联股份有限公司 Safety control method and system for digital certificate of file
CN101459723A (en) * 2007-12-14 2009-06-17 希姆通信息技术(上海)有限公司 Secret keeping processing method for mobile phone information
US20090222500A1 (en) * 2008-02-29 2009-09-03 Waremax Electronics Corp. Information storage device and method capable of hiding confidential files
CN201698408U (en) * 2010-06-23 2011-01-05 沈刚 Storing mechanism capable of hiding or displaying part of storage space through RF induction manner
CN103338445A (en) * 2013-06-19 2013-10-02 深圳市垦鑫达科技有限公司 File encryption and decryption method and system
CN103577761A (en) * 2013-10-25 2014-02-12 北京奇虎科技有限公司 Method and device for processing privacy data in mobile equipment
CN103761067A (en) * 2013-12-13 2014-04-30 昆山五昌新精密电子工业有限公司 Processing system and processing method for encryption/decryption of data files
CN204087190U (en) * 2013-12-13 2015-01-07 昆山五昌新精密电子工业有限公司 The disposal system of the enciphering/deciphering of data file
CN105307287A (en) * 2015-10-19 2016-02-03 宇龙计算机通信科技(深圳)有限公司 Connection method and wearable equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201233601Y (en) * 2008-05-05 2009-05-06 丁卓 File concealment system and apparatus based on USB equipment
US8224796B1 (en) * 2009-09-11 2012-07-17 Symantec Corporation Systems and methods for preventing data loss on external devices
CN105279453B (en) * 2015-09-25 2018-04-06 南京伍安信息科技有限公司 It is a kind of to support the partitions of file for separating storage management to hide system and method
CN105912947A (en) * 2016-03-31 2016-08-31 宇龙计算机通信科技(深圳)有限公司 File processing method and device based on external equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006259942A (en) * 2005-03-16 2006-09-28 Nec Corp Security management system, server device, client terminal and security protection method used therefor
CN101399666A (en) * 2007-09-28 2009-04-01 中国银联股份有限公司 Safety control method and system for digital certificate of file
CN101459723A (en) * 2007-12-14 2009-06-17 希姆通信息技术(上海)有限公司 Secret keeping processing method for mobile phone information
US20090222500A1 (en) * 2008-02-29 2009-09-03 Waremax Electronics Corp. Information storage device and method capable of hiding confidential files
CN201698408U (en) * 2010-06-23 2011-01-05 沈刚 Storing mechanism capable of hiding or displaying part of storage space through RF induction manner
CN103338445A (en) * 2013-06-19 2013-10-02 深圳市垦鑫达科技有限公司 File encryption and decryption method and system
CN103577761A (en) * 2013-10-25 2014-02-12 北京奇虎科技有限公司 Method and device for processing privacy data in mobile equipment
CN103761067A (en) * 2013-12-13 2014-04-30 昆山五昌新精密电子工业有限公司 Processing system and processing method for encryption/decryption of data files
CN204087190U (en) * 2013-12-13 2015-01-07 昆山五昌新精密电子工业有限公司 The disposal system of the enciphering/deciphering of data file
CN105307287A (en) * 2015-10-19 2016-02-03 宇龙计算机通信科技(深圳)有限公司 Connection method and wearable equipment

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017166884A1 (en) * 2016-03-31 2017-10-05 宇龙计算机通信科技(深圳)有限公司 File processing method and apparatus employing external device
CN108121904A (en) * 2017-12-04 2018-06-05 北京三快在线科技有限公司 Unlocking method, device, electronic equipment and server
CN108121904B (en) * 2017-12-04 2019-09-17 北京三快在线科技有限公司 Unlocking method, device, electronic equipment and server
CN109857274A (en) * 2018-12-25 2019-06-07 深圳视爵光旭电子有限公司 A kind of display device and its control method, system
CN113626796A (en) * 2021-08-16 2021-11-09 深圳市康冠商用科技有限公司 Permission obtaining method and device based on USB flash disk, display equipment and storage medium
CN113626796B (en) * 2021-08-16 2022-05-03 深圳市康冠商用科技有限公司 Permission obtaining method and device based on USB flash disk, display equipment and storage medium

Also Published As

Publication number Publication date
WO2017166884A1 (en) 2017-10-05

Similar Documents

Publication Publication Date Title
CN105912947A (en) File processing method and device based on external equipment
CN101120355B (en) System for creating control structure for versatile content control
US20060294391A1 (en) Data encryption and decryption method
CN104834868A (en) Electronic data protection method, device and terminal equipment
CN105117635B (en) A kind of safety system and method for local data
CN104657674A (en) Isolation protection system and isolation protection method of private data in mobile phone
CN101361076A (en) Mobile memory system for secure storage and delivery of media content
CN105005731A (en) Data encryption and decryption methods and mobile terminal
CN112165490B (en) Encryption method, decryption method, storage medium and terminal equipment
CN104573551A (en) File processing method and mobile terminal
CN102750497A (en) Method and device for deciphering private information
KR101625785B1 (en) Method and device for information security management of mobile terminal, and mobile terminal
CN103455761A (en) File encryption and decryption method and device and electronic device
US8667025B2 (en) Variable substitution data processing method
CN104768148A (en) Message encryption method and device
KR20210046357A (en) Method and apparatus for key storing and recovery for blockchain based system
EP4343592A1 (en) Personal digital identity management system and method
CN102202057B (en) System and method for safely dumping data of mobile memory
US8656179B2 (en) Using hidden secrets and token devices to create secure volumes
CN104915583A (en) Interface decryption processing method and mobile terminal
CN105022965B (en) A kind of data ciphering method and device
US20050129246A1 (en) Intelligent digital secure LockBox and access key distribution system (DLB)
CN105704096B (en) Document decryption method and device
WO2017120745A1 (en) Method, device, and system for processing profile
CN102098391B (en) Communication terminal and communication information processing method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160831