CN106156642A - Data ciphering method and device - Google Patents
Data ciphering method and device Download PDFInfo
- Publication number
- CN106156642A CN106156642A CN201610605179.2A CN201610605179A CN106156642A CN 106156642 A CN106156642 A CN 106156642A CN 201610605179 A CN201610605179 A CN 201610605179A CN 106156642 A CN106156642 A CN 106156642A
- Authority
- CN
- China
- Prior art keywords
- key
- content
- strings
- data
- text
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Abstract
The embodiment of the invention discloses a kind of data ciphering method, including: the data object on monitoring end of scan, obtain the content of text of the data object scanned;Judge described content of text whether with default key character String matching;When coupling, obtain the key preset;It is encrypted by the corresponding operating of data object described in described double secret key.Additionally, the embodiment of the invention also discloses a kind of data encryption device.Use the present invention, the operation ease of data encryption can be improved.
Description
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of data ciphering method and device.
Background technology
Along with the development of terminal technology, function integrated in terminal also gets more and more, and user stores on mobile phone
Information also get more and more.From the point of view of user, mobile phone is not only the instrument made a phone call and send short messages, and also comprises in mobile phone
The photo of user, wechat, microblogging, further comprises the relevant informations such as Alipay, Net silver, the credit card.
User is using during mobile phone, need the part private data in mobile phone or needs are maintained secrecy its
He is encrypted data, and in the prior art, user needs to enter into corresponding encryption handling interface, and selects in this interface
Need the file being encrypted or maintaining secrecy and this document is encrypted.It is to say, encryption user is required for entering each time
Just can operate to corresponding encryption handling interface, from the point of view of user, the complex steps of its operation and repetition, there is operation
The not enough problem of convenience.
Summary of the invention
Based on this, for solving the convenience deficiency of the operation that the encryption method of terminal document exists in above-mentioned conventional art
Technical problem, spy proposes a kind of data ciphering method.
A kind of data ciphering method, including:
Data object on monitoring end of scan, obtains the content of text of the data object scanned;
Judge described content of text whether with default key character String matching;
When coupling, obtain the key preset;
It is encrypted by the corresponding operating of data object described in described double secret key.
Optionally, in one embodiment, described data object is file;
The step of the content of text of the data object that described acquisition scans also includes: the file scanned described in acquisition
Filename;
Described judge described content of text whether with the step of default key character String matching particularly as follows: sweep described in Pan Duaning
Whether the filename of the file retouched is with described default key-strings as initial character string;
The described step being encrypted by the corresponding operating of data object described in described double secret key is particularly as follows: pass through described
The opening operation of file described in double secret key is encrypted.
Optionally, in one embodiment, described data object is the data that user inputs in Text Entry assembly
Content;
The described step being encrypted by the corresponding operating of data object described in described double secret key particularly as follows:
Carry out data transmission or locally stored after being encrypted by data content described in described double secret key.
Optionally, in one embodiment, described method also includes:
Receive key-strings and instruction is set, receive the key-strings of input and corresponding with described key-strings
Key also stores.
Optionally, in one embodiment, described key-strings has multiple;
Described judge described content of text whether with the step of default key character String matching particularly as follows:
Search the key-strings mated with described content of text, if finding, be then judged to coupling, and look into described in acquisition
The key-strings found is as target critical character string;
Described acquisition preset key step particularly as follows:
Obtain the key corresponding with described target critical character string preset.
Additionally, for solving the skill that in above-mentioned conventional art, the convenience of the operation that the encryption method of terminal document exists is not enough
Art problem, spy proposes a kind of data encryption device.
A kind of data encryption device, including:
Data object scan module, for monitoring the data object on end of scan, the data object that acquisition scans
Content of text;
Judge module, for judge described content of text whether with default key character String matching;
Key Acquisition Module, for when described content of text is with the key character String matching preset, it is close that acquisition is preset
Key;
Encrypting module, for being encrypted by the corresponding operating of data object described in described double secret key.
Optionally, in one embodiment, described data object is file;
Described data object scan module is additionally operable to the filename of the file scanned described in acquisition;
Described judge module be additionally operable to judge described in the filename of file that scans whether with described default keyword
Symbol string is initial character string;
Described encrypting module is additionally operable to be encrypted by the opening operation of file described in described double secret key.
Optionally, in one embodiment, described data object is the data that user inputs in Text Entry assembly
Content;
Described encrypting module carry out data transmission after being additionally operable to be encrypted by data content described in described double secret key or
Locally stored.
Optionally, in one embodiment, described device also includes that key-strings arranges module, is used for receiving keyword
Symbol string arranges instruction, receives the key-strings and the key corresponding with described key-strings inputted and stores.
Optionally, in one embodiment, described key-strings has multiple;
Described judge module is additionally operable to search the key-strings mated with described content of text, if finding, then judges
Described content of text and the key character String matching preset, and the key-strings found described in acquisition is as target keywords
Symbol string;
Described Key Acquisition Module is additionally operable to obtain the key corresponding with described target critical character string preset.
Implement the embodiment of the present invention, will have the advantages that
After have employed above-mentioned data ciphering method and device, for the data file in terminal, user has only to counting
Arrange and key character String matching according in the content of text (such as data file name, the word content etc. comprised) that file is corresponding
Related content, terminal, when associative operation being detected, can be somebody's turn to do according to the key of default key-strings and correspondence
Data file is encrypted.It is to say, user need not carry out special operation in file management or the encryption handling page,
In arbitrary operation scenario, as long as in the file needing encryption, add and the key character preset according to default requirement
This document can be encrypted by the content that string is corresponding, adds the motility of cryptographic operation and the convenience of operation, improves
Consumer's Experience.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to
Other accompanying drawing is obtained according to these accompanying drawings.
Wherein:
Fig. 1 is the schematic flow sheet of a kind of data ciphering method in an embodiment;
Fig. 2 is the structural representation of a kind of data encryption device in an embodiment;
Fig. 3 is the structural representation of the computer equipment running aforementioned data encryption method in an embodiment.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise
Embodiment, broadly falls into the scope of protection of the invention.
Ask for solving the technology that in above-mentioned conventional art, the convenience of the operation that the encryption method of terminal document exists is not enough
Topic, in the present embodiment, spy proposes a kind of data ciphering method, and the realization of the method can be dependent on computer program, this meter
Calculation i.e. program can be the application program that encryption is applied, the encipheror etc. being arranged in terminal, and this computer program can run
On computer system based on von Neumann system.This computer system can be to run above computer program such as
The terminal units such as smart mobile phone, panel computer, notebook computer, PC.
Concrete, as it is shown in figure 1, above-mentioned data ciphering method comprises the steps:
Step S102: the data object on monitoring end of scan, obtains the content of text of the data object scanned;
Step S104: judge described content of text whether with default key character String matching;If it is not, then perform step
S110: do not process;The most then perform step S106: obtain the key preset;Step S108: described in described double secret key
The corresponding operating of data object is encrypted.
In specific embodiment, the data object of encryption can be information of file, file, note, transmission etc., according to
The encryption condition that user is previously set, such as, includes and the pre-conditioned dependency number mated in above-mentioned a certain data object
According to time, then this data object is encrypted.
Data object in terminal is monitored scanning, for all data objects scanned, obtains its correspondence
Content of text, such as, when data object is file or folder, the content of text of acquisition can be this document or file
File name or Folder Name;The most such as, when the information that data object is note or transmission, in the text of acquisition
Appearance can be the particular content that the information of note or transmission is comprised.
Content of text for the data object scanned, it is judged that text content whether with default key-strings
Join, if coupling, then needing this data object is further encrypted, if not mating, then need not this data object is entered
Row encryption, does not i.e. carry out any process to this data object.
Concrete, above-mentioned judge content of text whether with the process of default key character String matching, can be to judge to obtain
The process of the character string of the key character String matching whether included in the content of text got and preset, it is also possible to be to judge to obtain
The content of text got whether process with default key-strings as initial character string, concrete can be according to data object
The content of text of particular type and correspondence determines.
In one embodiment, as a example by data object is as file, obtain the content of text of the data object scanned
Step is particularly as follows: obtain the filename of this document, and in step s 106, it is judged that whether the filename of this document is with default
Key-strings is initial character string, and such as, if the key-strings preset is " king covers ground tiger ", the most above-mentioned file is entitled
Time " king covers ground tiger+filename ", then judge that content of text mates with the key-strings preset, as " king covers ground tiger
Contact address list ".
In another optional embodiment, as a example by data object is as file, the data object that acquisition scans
The step of content of text is particularly as follows: obtain the Folder Name of this document folder, and judges that the Folder Name that this document presss from both sides is
No with default key-strings as initial character string, such as, if the key-strings preset is " king covers ground tiger ", the most above-mentioned
When folder name is referred to as " king covers ground tiger+Folder Name ", then judge that content of text is to mate with the key-strings preset
, such as " king covers brave 2016 Beijing trip photograph albums ".
Optionally, in another optional embodiment, input in Text Entry assembly with data object for user
Data content as a example by, the content of text obtained in step s 102 is the number that above-mentioned user inputs in Text Entry assembly
According to content, i.e. the content of user's input, then judge data content that user inputs in Text Entry assembly be whether with
The key-strings preset is initial character string, the most then the content of text in determination step S104 and the key character preset
Be coupling between string, i.e. result of determination in step S104 is affirmative.
It should be noted that in the above-mentioned optional embodiment enumerated, judge content of text whether with default key
It is all to judge whether the character string in fact of content of text is key-strings, in other embodiments during string matching
In, it is also possible to it is to judge whether the terminator-string of content of text is default key-strings, and certainly, user can also set
Other judge the mode of coupling, such as, whether include default key-strings in content of text.
In the case of judged result in step S104 is for being, i.e. need the data object scanned is encrypted
In the case of, in addition it is also necessary to obtain the key of encryption before encryption, in the present embodiment, the key of encryption be can be system in advance
Set, it is also possible to be that user needs to carry out self-defined setting according to self, such as, finger be set arranging key-strings
When making, user not only needs to arrange key-strings, in addition it is also necessary to arranging the key corresponding with this key-strings, this key can be used
During to data object encryption.
Concrete, the method for above-mentioned data encryption also includes: receives key-strings and arranges instruction, receives the key of input
Character string and the key corresponding with described key-strings also store.It is to say, according to the key-strings of user's input
Instruction is set, receives the character string of user's input as key-strings, receive for input key as with key character
The key that string is corresponding, and by the above-mentioned key-strings received and key storage corresponding position in the terminal.Need
Illustrate, in the present embodiment, the corresponding relation that further comprises between key-strings and key stored in the lump, namely
Saying, key is corresponding with key-strings, and, in the case of the judged result in step S104 is for being, obtains and walk
Key corresponding to the key-strings used in rapid S104 is as the key preset obtained in step S106.
It should be noted that in the present embodiment, the number of the key-strings pre-set can be with more than one, at this
In the case of Zhong, above-mentioned judge content of text and preset the step whether mated of key-strings be then: all of default
Key-strings being searched the key-strings mated with content of text, if finding, then judging content of text and the pass preset
Key characters string is coupling, and using the key-strings that finds as target critical character string;If not finding coupling
Key-strings, then judge that content of text is unmatched with default key-strings.It should be noted that in this enforcement
In example, during the above-mentioned key-strings that lookup is mated with content of text in all default key-strings, sentence
Whether disconnected content of text can be such as the front associated description to step S104 with the rule of some key character String matching, herein
Repeat no more.
In the case of finding the key-strings mated with content of text, the key obtained in step s 106 be with
The key that the target critical character string that finds is corresponding, say, that user is arranging the close of key-strings and its correspondence
During key, different key can be set for different key-strings, and use different under different occasions
Key-strings.It is to say, the key-strings stored in the terminal includes multiple, the key of its correspondence also includes many
Individual, and the related content stored further comprises the corresponding relation between key-strings and key, is determining key character
In the case of string, the key corresponding with this key-strings can be obtained.Such as, user can set according to different application scenarios
Put different key-strings, and different keys is set.
In the case of key gets, it is encrypted by the associative operation of this data key object, such as, user
In Text Entry assembly, the data content of input is to need to send in the dialog interface of instant communication software (such as wechat)
Information time because detect data content that user inputs for key-strings as initial character string, then by above-mentioned data
Content is sent to the server that instant communication software is corresponding by key after being encrypted.In other embodiments, if user exists
In file or folder administration page, the filename of some file or the Folder Name of some file are revised as
Filename with key-strings as initial character string or Folder Name, then terminal is when operation user being detected, to this
File or file are encrypted and store the file or folder after encryption.
It should be noted that when user carries out certain operation in terminal for data object, such as revise the literary composition of file
Part name or amendment file Folder Name or in input frame assembly input data content and send or input
Inputting data content in frame assembly and preserve or edit note content preservation etc., terminal can monitor user in terminal
The associative operation carried out, and monitor the data object that user carries out operating, and obtain the content of text of this data object, at text
When content and the key character String matching preset, it is encrypted by the associative operation of corresponding data key object, such as,
Under the amendment operation of the title of data object, data object is encrypted and stores, what data object was stored
In the case of, this data object is encrypted and stores, in the case of data object is transmitted or transmits, to this number
It is encrypted according to object and the data object after encryption is transmitted or data transmission.
If it is to say, monitoring user the data object of terminal is carried out when arbitrarily operating, perform above-mentioned steps S102-
S110, and determine according to the corresponding operating of user and added by the corresponding operating of data key object in step S108
Close operation.
Additionally, for solving the skill that in above-mentioned conventional art, the convenience of the operation that the encryption method of terminal document exists is not enough
Art problem, in one embodiment, as shown in Figure 2, it is also proposed that a kind of data encryption device, including data object scan module
102, judge module 104, Key Acquisition Module 106, encrypting module 108, wherein:
Data object scan module 102, for monitoring the data object on end of scan, obtains the data object scanned
Content of text;
Judge module 104, for judge described content of text whether with default key character String matching;
Key Acquisition Module 106, for when described content of text is with the key character String matching preset, acquisition is preset
Key;
Encrypting module 108, for being encrypted by the corresponding operating of data object described in described double secret key.
Optionally, in one embodiment, above-mentioned data object is file;Described data object scan module 102 is also used
Filename in the file scanned described in acquisition;Judge module 104 is additionally operable to the filename of the file scanned described in judgement
Whether with described default key-strings as initial character string;Encrypting module 108 is additionally operable to by literary composition described in described double secret key
The opening operation of part is encrypted.
Optionally, in one embodiment, above-mentioned data object is the data that user inputs in Text Entry assembly
Content;Encrypting module 108 is carried out data transmission after being additionally operable to be encrypted by data content described in described double secret key or local
Storage.
Optionally, in one embodiment, as in figure 2 it is shown, said apparatus also includes that key-strings arranges module 110,
Instruction is set for receiving key-strings, receives the key-strings of input and the key corresponding with described key-strings
And store.
Optionally, in one embodiment, above-mentioned key-strings has multiple;Judge module 104 is additionally operable to search and institute
Stating the key-strings of content of text coupling, if finding, then judging described content of text and the key character String matching preset,
And the key-strings found described in obtaining is as target critical character string;Key Acquisition Module 106 is additionally operable to obtain and presets
The key corresponding with described target critical character string.
Implement the embodiment of the present invention, will have the advantages that
After have employed above-mentioned data ciphering method and device, for the data file in terminal, user has only to counting
Arrange and key character String matching according in the content of text (such as data file name, the word content etc. comprised) that file is corresponding
Related content, terminal, when associative operation being detected, can be somebody's turn to do according to the key of default key-strings and correspondence
Data file is encrypted.It is to say, user need not carry out special operation in file management or the encryption handling page,
In arbitrary operation scenario, as long as in the file needing encryption, add and the key character preset according to default requirement
This document can be encrypted by the content that string is corresponding, adds the motility of cryptographic operation and the convenience of operation, improves
Consumer's Experience.
In one embodiment, as it is shown on figure 3, Fig. 3 illustrate a kind of run above-mentioned data ciphering method based on Feng Nuo
Terminal according to the computer system of graceful system.This computer system can be the terminals such as smart mobile phone, panel computer, palm PC
Equipment.Concrete, it may include the outer input interface 1001 that connected by system bus, processor 1002, memorizer 1003 and
Output interface 1004.Wherein, outer input interface 1001 optionally can at least include network interface 10012.Memorizer 1003 can
Including external memory 10032 (such as hard disk, CD or floppy disk etc.) and built-in storage 10034.Output interface 1004 can at least wrap
Include display screen 10042 equipment such as grade.
In the present embodiment, the operation of this method is stored in based on computer program, the program file of this computer program
In the external memory 10032 of aforementioned computer system based on von Neumann system, operationally it is loaded into built-in storage
In 10034, it is transferred to after being then compiled as machine code in processor 1002 perform, so that based on von Neumann system
Computer system in form data object scan module 102 in logic, judge module 104, Key Acquisition Module 106, add
Close module 108 and key-strings arrange module 110.And during above-mentioned data ciphering method performs, the parameter of input
All received by outer input interface 1001, and be transferred in memorizer 1003 caching, be then input in processor 1002 enter
Row processes, and the result data of process or be cached in memorizer 1003 subsequently processes, or is passed to output interface
1004 export.
Concrete, above-mentioned processor 1002 is used for performing to operate as follows: the data object on monitoring end of scan, acquisition is swept
The content of text of the data object retouched;Judge described content of text whether with default key character String matching;When coupling,
Obtain the key preset;It is encrypted by the corresponding operating of data object described in described double secret key.
In an alternate embodiment of the invention, data object is file;Above-mentioned processor 1002 is additionally operable to perform to operate as follows: obtain
The filename of the described file scanned;Above-mentioned processor 1002 be additionally operable to judge described in the filename of file that scans whether
With described default key-strings as initial character string;Above-mentioned processor 1002 is additionally operable to by file described in described double secret key
Opening operation be encrypted.
In an optional embodiment, data object is the data content that user inputs in Text Entry assembly;
Above-mentioned processor 1002 is additionally operable to perform: carry out data transmission after being encrypted by data content described in described double secret key or this
Ground storage.
In an optional embodiment, said external input interface 1001 is additionally operable to perform to receive key-strings and arranges
Instruction, key-strings that above-mentioned processor 1002 is additionally operable to perform to receive input and corresponding with described key-strings close
Key, above-mentioned memorizer 1003 is additionally operable to perform storage key-strings and the key corresponding with described key-strings.
In an optional embodiment, key-strings has multiple;Above-mentioned processor 1002 be additionally operable to perform search with
The key-strings of described content of text coupling, if finding, is then judged to coupling, and the key character found described in acquisition
String is as target critical character string;Above-mentioned processor 1002 be additionally operable to perform obtain preset with described target critical character string pair
The key answered.
The above disclosed present pre-ferred embodiments that is only, can not limit the right model of the present invention with this certainly
Enclose, the equivalent variations therefore made according to the claims in the present invention, still belong to the scope that the present invention is contained.
Claims (10)
1. a data ciphering method, it is characterised in that including:
Data object on monitoring end of scan, obtains the content of text of the data object scanned;
Judge described content of text whether with default key character String matching;
When coupling, obtain the key preset;
It is encrypted by the corresponding operating of data object described in described double secret key.
Data ciphering method the most according to claim 1, it is characterised in that described data object is file;
The step of the content of text of the data object that described acquisition scans also includes: the file of the file scanned described in acquisition
Name;
Described judge described content of text whether with the step of default key character String matching particularly as follows: scan described in Pan Duaning
The filename of file whether with described default key-strings as initial character string;
The described step being encrypted by the corresponding operating of data object described in described double secret key is particularly as follows: pass through described key
The opening operation of described file is encrypted.
Data ciphering method the most according to claim 1, it is characterised in that described data object is that user inputs at text
The data content of input in frame assembly;
The described step being encrypted by the corresponding operating of data object described in described double secret key particularly as follows:
Carry out data transmission or locally stored after being encrypted by data content described in described double secret key.
4. according to the arbitrary described data ciphering method of claims 1 to 3, it is characterised in that described method also includes:
Receive key-strings and instruction is set, receive the key-strings of input and the key corresponding with described key-strings
And store.
Data ciphering method the most according to claim 1, it is characterised in that described key-strings has multiple;
Described judge described content of text whether with the step of default key character String matching particularly as follows:
Search the key-strings mated with described content of text, if finding, be then judged to coupling, and find described in acquisition
Key-strings as target critical character string;
Described acquisition preset key step particularly as follows:
Obtain the key corresponding with described target critical character string preset.
6. a data encryption device, it is characterised in that including:
Data object scan module, for monitoring the data object on end of scan, obtains the text of the data object scanned
Content;
Judge module, for judge described content of text whether with default key character String matching;
Key Acquisition Module, for when described content of text is with the key character String matching preset, obtaining the key preset;
Encrypting module, for being encrypted by the corresponding operating of data object described in described double secret key.
Data encryption device the most according to claim 6, it is characterised in that described data object is file;
Described data object scan module is additionally operable to the filename of the file scanned described in acquisition;
Described judge module be additionally operable to judge described in the filename of file that scans whether with described default key-strings
For initial character string;
Described encrypting module is additionally operable to be encrypted by the opening operation of file described in described double secret key.
Data encryption device the most according to claim 6, it is characterised in that described data object is that user inputs at text
The data content of input in frame assembly;
Described encrypting module is carried out data transmission after being additionally operable to be encrypted by data content described in described double secret key or local
Storage.
9. according to the arbitrary described data encryption device of claim 6 to 8, it is characterised in that described device also includes keyword
Symbol string arranges module, is used for receiving key-strings and arranges instruction, receive input key-strings and with described keyword
Accord with key corresponding to string and store.
Data encryption device the most according to claim 6, it is characterised in that described key-strings has multiple;
Described judge module is additionally operable to search the key-strings mated with described content of text, if finding, then judges described
Content of text and the key character String matching preset, and the key-strings found described in acquisition is as target critical character
String;
Described Key Acquisition Module is additionally operable to obtain the key corresponding with described target critical character string preset.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610605179.2A CN106156642A (en) | 2016-07-28 | 2016-07-28 | Data ciphering method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610605179.2A CN106156642A (en) | 2016-07-28 | 2016-07-28 | Data ciphering method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106156642A true CN106156642A (en) | 2016-11-23 |
Family
ID=58060846
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610605179.2A Pending CN106156642A (en) | 2016-07-28 | 2016-07-28 | Data ciphering method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106156642A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106791087A (en) * | 2016-12-20 | 2017-05-31 | 北京小米移动软件有限公司 | The storage method of information, device and equipment |
CN109558581A (en) * | 2017-09-27 | 2019-04-02 | 北京国双科技有限公司 | A kind of content monitoring method and device |
CN110058870A (en) * | 2019-03-16 | 2019-07-26 | 平安城市建设科技(深圳)有限公司 | Automatic detection upgrade method, device, equipment and storage medium |
CN112835864A (en) * | 2021-02-03 | 2021-05-25 | 北京联创信安科技股份有限公司 | File storage method, device, equipment and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101299842A (en) * | 2007-04-30 | 2008-11-05 | 广东国笔科技有限公司 | Method for seeking mobile phone storage information |
CN101957894A (en) * | 2009-07-17 | 2011-01-26 | 精品科技股份有限公司 | System and method for controlling and managing authority of conditional electronic file |
CN102118503A (en) * | 2011-01-25 | 2011-07-06 | 宇龙计算机通信科技(深圳)有限公司 | Data protection method, device and terminal |
CN102567421A (en) * | 2010-12-27 | 2012-07-11 | 北大方正集团有限公司 | Document retrieval method and device |
CN103678651A (en) * | 2013-12-20 | 2014-03-26 | Tcl集团股份有限公司 | Sensitive word searching method and device |
CN103916233A (en) * | 2014-03-28 | 2014-07-09 | 小米科技有限责任公司 | Information encryption method and device |
CN104317976A (en) * | 2014-11-21 | 2015-01-28 | 四川智诚天逸科技有限公司 | Method for storing information |
WO2015096578A1 (en) * | 2013-12-27 | 2015-07-02 | 北京金山办公软件有限公司 | Document encryption prompt method and system |
CN105554745A (en) * | 2016-01-27 | 2016-05-04 | 广东欧珀移动通信有限公司 | Information management method and system |
-
2016
- 2016-07-28 CN CN201610605179.2A patent/CN106156642A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101299842A (en) * | 2007-04-30 | 2008-11-05 | 广东国笔科技有限公司 | Method for seeking mobile phone storage information |
CN101957894A (en) * | 2009-07-17 | 2011-01-26 | 精品科技股份有限公司 | System and method for controlling and managing authority of conditional electronic file |
CN102567421A (en) * | 2010-12-27 | 2012-07-11 | 北大方正集团有限公司 | Document retrieval method and device |
CN102118503A (en) * | 2011-01-25 | 2011-07-06 | 宇龙计算机通信科技(深圳)有限公司 | Data protection method, device and terminal |
CN103678651A (en) * | 2013-12-20 | 2014-03-26 | Tcl集团股份有限公司 | Sensitive word searching method and device |
WO2015096578A1 (en) * | 2013-12-27 | 2015-07-02 | 北京金山办公软件有限公司 | Document encryption prompt method and system |
CN103916233A (en) * | 2014-03-28 | 2014-07-09 | 小米科技有限责任公司 | Information encryption method and device |
CN104317976A (en) * | 2014-11-21 | 2015-01-28 | 四川智诚天逸科技有限公司 | Method for storing information |
CN105554745A (en) * | 2016-01-27 | 2016-05-04 | 广东欧珀移动通信有限公司 | Information management method and system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106791087A (en) * | 2016-12-20 | 2017-05-31 | 北京小米移动软件有限公司 | The storage method of information, device and equipment |
CN109558581A (en) * | 2017-09-27 | 2019-04-02 | 北京国双科技有限公司 | A kind of content monitoring method and device |
CN109558581B (en) * | 2017-09-27 | 2022-09-27 | 北京国双科技有限公司 | Content monitoring method and device |
CN110058870A (en) * | 2019-03-16 | 2019-07-26 | 平安城市建设科技(深圳)有限公司 | Automatic detection upgrade method, device, equipment and storage medium |
CN112835864A (en) * | 2021-02-03 | 2021-05-25 | 北京联创信安科技股份有限公司 | File storage method, device, equipment and storage medium |
CN112835864B (en) * | 2021-02-03 | 2024-02-20 | 北京联创信安科技股份有限公司 | File storage method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104346471A (en) | Method, device and system for determining to-be-pushed application based on geological position information | |
KR102355973B1 (en) | Apparatus and method for detecting smishing message | |
US10496696B2 (en) | Search method and apparatus | |
CN106156642A (en) | Data ciphering method and device | |
CN108696490A (en) | The recognition methods of account permission and device | |
CN112106049A (en) | System and method for generating private data isolation and reporting | |
CN106569860A (en) | Application management method and terminal | |
CN105187632B (en) | Method and device for determining mobile phone number | |
CN106354570A (en) | Account information copying and pasting method and device | |
CN111651749A (en) | Method and device for finding account based on password, computer equipment and storage medium | |
CN111368196A (en) | Model parameter updating method, device, equipment and readable storage medium | |
JP2019510303A (en) | Icon processing method and apparatus for application | |
CN106529232A (en) | Startup method and device | |
CN113869063A (en) | Data recommendation method and device, electronic equipment and storage medium | |
CN107301236A (en) | Application searches method, mobile terminal, server and computer-readable recording medium | |
CN111817944A (en) | Picture sharing method and device and electronic equipment | |
CN106254226A (en) | A kind of information synchronization method and device | |
CN112104571B (en) | Service distribution method, device, computer equipment and computer storage medium | |
CN108460116A (en) | Searching method, device, computer equipment, storage medium and search system | |
CN113835820A (en) | Graphic code display method and device | |
CN113010918A (en) | Information processing method and device | |
CN114860295A (en) | Resource file updating method, device, equipment and readable storage medium | |
CN113840035A (en) | Information sharing method and device, electronic equipment and readable storage medium | |
CN114448722A (en) | Cross-browser login method and device, computer equipment and storage medium | |
CN114125139A (en) | Information processing method and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161123 |
|
RJ01 | Rejection of invention patent application after publication |