CN106156642A - Data ciphering method and device - Google Patents

Data ciphering method and device Download PDF

Info

Publication number
CN106156642A
CN106156642A CN201610605179.2A CN201610605179A CN106156642A CN 106156642 A CN106156642 A CN 106156642A CN 201610605179 A CN201610605179 A CN 201610605179A CN 106156642 A CN106156642 A CN 106156642A
Authority
CN
China
Prior art keywords
key
content
strings
data
text
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610605179.2A
Other languages
Chinese (zh)
Inventor
罗龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610605179.2A priority Critical patent/CN106156642A/en
Publication of CN106156642A publication Critical patent/CN106156642A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The embodiment of the invention discloses a kind of data ciphering method, including: the data object on monitoring end of scan, obtain the content of text of the data object scanned;Judge described content of text whether with default key character String matching;When coupling, obtain the key preset;It is encrypted by the corresponding operating of data object described in described double secret key.Additionally, the embodiment of the invention also discloses a kind of data encryption device.Use the present invention, the operation ease of data encryption can be improved.

Description

Data ciphering method and device
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of data ciphering method and device.
Background technology
Along with the development of terminal technology, function integrated in terminal also gets more and more, and user stores on mobile phone Information also get more and more.From the point of view of user, mobile phone is not only the instrument made a phone call and send short messages, and also comprises in mobile phone The photo of user, wechat, microblogging, further comprises the relevant informations such as Alipay, Net silver, the credit card.
User is using during mobile phone, need the part private data in mobile phone or needs are maintained secrecy its He is encrypted data, and in the prior art, user needs to enter into corresponding encryption handling interface, and selects in this interface Need the file being encrypted or maintaining secrecy and this document is encrypted.It is to say, encryption user is required for entering each time Just can operate to corresponding encryption handling interface, from the point of view of user, the complex steps of its operation and repetition, there is operation The not enough problem of convenience.
Summary of the invention
Based on this, for solving the convenience deficiency of the operation that the encryption method of terminal document exists in above-mentioned conventional art Technical problem, spy proposes a kind of data ciphering method.
A kind of data ciphering method, including:
Data object on monitoring end of scan, obtains the content of text of the data object scanned;
Judge described content of text whether with default key character String matching;
When coupling, obtain the key preset;
It is encrypted by the corresponding operating of data object described in described double secret key.
Optionally, in one embodiment, described data object is file;
The step of the content of text of the data object that described acquisition scans also includes: the file scanned described in acquisition Filename;
Described judge described content of text whether with the step of default key character String matching particularly as follows: sweep described in Pan Duaning Whether the filename of the file retouched is with described default key-strings as initial character string;
The described step being encrypted by the corresponding operating of data object described in described double secret key is particularly as follows: pass through described The opening operation of file described in double secret key is encrypted.
Optionally, in one embodiment, described data object is the data that user inputs in Text Entry assembly Content;
The described step being encrypted by the corresponding operating of data object described in described double secret key particularly as follows:
Carry out data transmission or locally stored after being encrypted by data content described in described double secret key.
Optionally, in one embodiment, described method also includes:
Receive key-strings and instruction is set, receive the key-strings of input and corresponding with described key-strings Key also stores.
Optionally, in one embodiment, described key-strings has multiple;
Described judge described content of text whether with the step of default key character String matching particularly as follows:
Search the key-strings mated with described content of text, if finding, be then judged to coupling, and look into described in acquisition The key-strings found is as target critical character string;
Described acquisition preset key step particularly as follows:
Obtain the key corresponding with described target critical character string preset.
Additionally, for solving the skill that in above-mentioned conventional art, the convenience of the operation that the encryption method of terminal document exists is not enough Art problem, spy proposes a kind of data encryption device.
A kind of data encryption device, including:
Data object scan module, for monitoring the data object on end of scan, the data object that acquisition scans Content of text;
Judge module, for judge described content of text whether with default key character String matching;
Key Acquisition Module, for when described content of text is with the key character String matching preset, it is close that acquisition is preset Key;
Encrypting module, for being encrypted by the corresponding operating of data object described in described double secret key.
Optionally, in one embodiment, described data object is file;
Described data object scan module is additionally operable to the filename of the file scanned described in acquisition;
Described judge module be additionally operable to judge described in the filename of file that scans whether with described default keyword Symbol string is initial character string;
Described encrypting module is additionally operable to be encrypted by the opening operation of file described in described double secret key.
Optionally, in one embodiment, described data object is the data that user inputs in Text Entry assembly Content;
Described encrypting module carry out data transmission after being additionally operable to be encrypted by data content described in described double secret key or Locally stored.
Optionally, in one embodiment, described device also includes that key-strings arranges module, is used for receiving keyword Symbol string arranges instruction, receives the key-strings and the key corresponding with described key-strings inputted and stores.
Optionally, in one embodiment, described key-strings has multiple;
Described judge module is additionally operable to search the key-strings mated with described content of text, if finding, then judges Described content of text and the key character String matching preset, and the key-strings found described in acquisition is as target keywords Symbol string;
Described Key Acquisition Module is additionally operable to obtain the key corresponding with described target critical character string preset.
Implement the embodiment of the present invention, will have the advantages that
After have employed above-mentioned data ciphering method and device, for the data file in terminal, user has only to counting Arrange and key character String matching according in the content of text (such as data file name, the word content etc. comprised) that file is corresponding Related content, terminal, when associative operation being detected, can be somebody's turn to do according to the key of default key-strings and correspondence Data file is encrypted.It is to say, user need not carry out special operation in file management or the encryption handling page, In arbitrary operation scenario, as long as in the file needing encryption, add and the key character preset according to default requirement This document can be encrypted by the content that string is corresponding, adds the motility of cryptographic operation and the convenience of operation, improves Consumer's Experience.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to Other accompanying drawing is obtained according to these accompanying drawings.
Wherein:
Fig. 1 is the schematic flow sheet of a kind of data ciphering method in an embodiment;
Fig. 2 is the structural representation of a kind of data encryption device in an embodiment;
Fig. 3 is the structural representation of the computer equipment running aforementioned data encryption method in an embodiment.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise Embodiment, broadly falls into the scope of protection of the invention.
Ask for solving the technology that in above-mentioned conventional art, the convenience of the operation that the encryption method of terminal document exists is not enough Topic, in the present embodiment, spy proposes a kind of data ciphering method, and the realization of the method can be dependent on computer program, this meter Calculation i.e. program can be the application program that encryption is applied, the encipheror etc. being arranged in terminal, and this computer program can run On computer system based on von Neumann system.This computer system can be to run above computer program such as The terminal units such as smart mobile phone, panel computer, notebook computer, PC.
Concrete, as it is shown in figure 1, above-mentioned data ciphering method comprises the steps:
Step S102: the data object on monitoring end of scan, obtains the content of text of the data object scanned;
Step S104: judge described content of text whether with default key character String matching;If it is not, then perform step S110: do not process;The most then perform step S106: obtain the key preset;Step S108: described in described double secret key The corresponding operating of data object is encrypted.
In specific embodiment, the data object of encryption can be information of file, file, note, transmission etc., according to The encryption condition that user is previously set, such as, includes and the pre-conditioned dependency number mated in above-mentioned a certain data object According to time, then this data object is encrypted.
Data object in terminal is monitored scanning, for all data objects scanned, obtains its correspondence Content of text, such as, when data object is file or folder, the content of text of acquisition can be this document or file File name or Folder Name;The most such as, when the information that data object is note or transmission, in the text of acquisition Appearance can be the particular content that the information of note or transmission is comprised.
Content of text for the data object scanned, it is judged that text content whether with default key-strings Join, if coupling, then needing this data object is further encrypted, if not mating, then need not this data object is entered Row encryption, does not i.e. carry out any process to this data object.
Concrete, above-mentioned judge content of text whether with the process of default key character String matching, can be to judge to obtain The process of the character string of the key character String matching whether included in the content of text got and preset, it is also possible to be to judge to obtain The content of text got whether process with default key-strings as initial character string, concrete can be according to data object The content of text of particular type and correspondence determines.
In one embodiment, as a example by data object is as file, obtain the content of text of the data object scanned Step is particularly as follows: obtain the filename of this document, and in step s 106, it is judged that whether the filename of this document is with default Key-strings is initial character string, and such as, if the key-strings preset is " king covers ground tiger ", the most above-mentioned file is entitled Time " king covers ground tiger+filename ", then judge that content of text mates with the key-strings preset, as " king covers ground tiger Contact address list ".
In another optional embodiment, as a example by data object is as file, the data object that acquisition scans The step of content of text is particularly as follows: obtain the Folder Name of this document folder, and judges that the Folder Name that this document presss from both sides is No with default key-strings as initial character string, such as, if the key-strings preset is " king covers ground tiger ", the most above-mentioned When folder name is referred to as " king covers ground tiger+Folder Name ", then judge that content of text is to mate with the key-strings preset , such as " king covers brave 2016 Beijing trip photograph albums ".
Optionally, in another optional embodiment, input in Text Entry assembly with data object for user Data content as a example by, the content of text obtained in step s 102 is the number that above-mentioned user inputs in Text Entry assembly According to content, i.e. the content of user's input, then judge data content that user inputs in Text Entry assembly be whether with The key-strings preset is initial character string, the most then the content of text in determination step S104 and the key character preset Be coupling between string, i.e. result of determination in step S104 is affirmative.
It should be noted that in the above-mentioned optional embodiment enumerated, judge content of text whether with default key It is all to judge whether the character string in fact of content of text is key-strings, in other embodiments during string matching In, it is also possible to it is to judge whether the terminator-string of content of text is default key-strings, and certainly, user can also set Other judge the mode of coupling, such as, whether include default key-strings in content of text.
In the case of judged result in step S104 is for being, i.e. need the data object scanned is encrypted In the case of, in addition it is also necessary to obtain the key of encryption before encryption, in the present embodiment, the key of encryption be can be system in advance Set, it is also possible to be that user needs to carry out self-defined setting according to self, such as, finger be set arranging key-strings When making, user not only needs to arrange key-strings, in addition it is also necessary to arranging the key corresponding with this key-strings, this key can be used During to data object encryption.
Concrete, the method for above-mentioned data encryption also includes: receives key-strings and arranges instruction, receives the key of input Character string and the key corresponding with described key-strings also store.It is to say, according to the key-strings of user's input Instruction is set, receives the character string of user's input as key-strings, receive for input key as with key character The key that string is corresponding, and by the above-mentioned key-strings received and key storage corresponding position in the terminal.Need Illustrate, in the present embodiment, the corresponding relation that further comprises between key-strings and key stored in the lump, namely Saying, key is corresponding with key-strings, and, in the case of the judged result in step S104 is for being, obtains and walk Key corresponding to the key-strings used in rapid S104 is as the key preset obtained in step S106.
It should be noted that in the present embodiment, the number of the key-strings pre-set can be with more than one, at this In the case of Zhong, above-mentioned judge content of text and preset the step whether mated of key-strings be then: all of default Key-strings being searched the key-strings mated with content of text, if finding, then judging content of text and the pass preset Key characters string is coupling, and using the key-strings that finds as target critical character string;If not finding coupling Key-strings, then judge that content of text is unmatched with default key-strings.It should be noted that in this enforcement In example, during the above-mentioned key-strings that lookup is mated with content of text in all default key-strings, sentence Whether disconnected content of text can be such as the front associated description to step S104 with the rule of some key character String matching, herein Repeat no more.
In the case of finding the key-strings mated with content of text, the key obtained in step s 106 be with The key that the target critical character string that finds is corresponding, say, that user is arranging the close of key-strings and its correspondence During key, different key can be set for different key-strings, and use different under different occasions Key-strings.It is to say, the key-strings stored in the terminal includes multiple, the key of its correspondence also includes many Individual, and the related content stored further comprises the corresponding relation between key-strings and key, is determining key character In the case of string, the key corresponding with this key-strings can be obtained.Such as, user can set according to different application scenarios Put different key-strings, and different keys is set.
In the case of key gets, it is encrypted by the associative operation of this data key object, such as, user In Text Entry assembly, the data content of input is to need to send in the dialog interface of instant communication software (such as wechat) Information time because detect data content that user inputs for key-strings as initial character string, then by above-mentioned data Content is sent to the server that instant communication software is corresponding by key after being encrypted.In other embodiments, if user exists In file or folder administration page, the filename of some file or the Folder Name of some file are revised as Filename with key-strings as initial character string or Folder Name, then terminal is when operation user being detected, to this File or file are encrypted and store the file or folder after encryption.
It should be noted that when user carries out certain operation in terminal for data object, such as revise the literary composition of file Part name or amendment file Folder Name or in input frame assembly input data content and send or input Inputting data content in frame assembly and preserve or edit note content preservation etc., terminal can monitor user in terminal The associative operation carried out, and monitor the data object that user carries out operating, and obtain the content of text of this data object, at text When content and the key character String matching preset, it is encrypted by the associative operation of corresponding data key object, such as, Under the amendment operation of the title of data object, data object is encrypted and stores, what data object was stored In the case of, this data object is encrypted and stores, in the case of data object is transmitted or transmits, to this number It is encrypted according to object and the data object after encryption is transmitted or data transmission.
If it is to say, monitoring user the data object of terminal is carried out when arbitrarily operating, perform above-mentioned steps S102- S110, and determine according to the corresponding operating of user and added by the corresponding operating of data key object in step S108 Close operation.
Additionally, for solving the skill that in above-mentioned conventional art, the convenience of the operation that the encryption method of terminal document exists is not enough Art problem, in one embodiment, as shown in Figure 2, it is also proposed that a kind of data encryption device, including data object scan module 102, judge module 104, Key Acquisition Module 106, encrypting module 108, wherein:
Data object scan module 102, for monitoring the data object on end of scan, obtains the data object scanned Content of text;
Judge module 104, for judge described content of text whether with default key character String matching;
Key Acquisition Module 106, for when described content of text is with the key character String matching preset, acquisition is preset Key;
Encrypting module 108, for being encrypted by the corresponding operating of data object described in described double secret key.
Optionally, in one embodiment, above-mentioned data object is file;Described data object scan module 102 is also used Filename in the file scanned described in acquisition;Judge module 104 is additionally operable to the filename of the file scanned described in judgement Whether with described default key-strings as initial character string;Encrypting module 108 is additionally operable to by literary composition described in described double secret key The opening operation of part is encrypted.
Optionally, in one embodiment, above-mentioned data object is the data that user inputs in Text Entry assembly Content;Encrypting module 108 is carried out data transmission after being additionally operable to be encrypted by data content described in described double secret key or local Storage.
Optionally, in one embodiment, as in figure 2 it is shown, said apparatus also includes that key-strings arranges module 110, Instruction is set for receiving key-strings, receives the key-strings of input and the key corresponding with described key-strings And store.
Optionally, in one embodiment, above-mentioned key-strings has multiple;Judge module 104 is additionally operable to search and institute Stating the key-strings of content of text coupling, if finding, then judging described content of text and the key character String matching preset, And the key-strings found described in obtaining is as target critical character string;Key Acquisition Module 106 is additionally operable to obtain and presets The key corresponding with described target critical character string.
Implement the embodiment of the present invention, will have the advantages that
After have employed above-mentioned data ciphering method and device, for the data file in terminal, user has only to counting Arrange and key character String matching according in the content of text (such as data file name, the word content etc. comprised) that file is corresponding Related content, terminal, when associative operation being detected, can be somebody's turn to do according to the key of default key-strings and correspondence Data file is encrypted.It is to say, user need not carry out special operation in file management or the encryption handling page, In arbitrary operation scenario, as long as in the file needing encryption, add and the key character preset according to default requirement This document can be encrypted by the content that string is corresponding, adds the motility of cryptographic operation and the convenience of operation, improves Consumer's Experience.
In one embodiment, as it is shown on figure 3, Fig. 3 illustrate a kind of run above-mentioned data ciphering method based on Feng Nuo Terminal according to the computer system of graceful system.This computer system can be the terminals such as smart mobile phone, panel computer, palm PC Equipment.Concrete, it may include the outer input interface 1001 that connected by system bus, processor 1002, memorizer 1003 and Output interface 1004.Wherein, outer input interface 1001 optionally can at least include network interface 10012.Memorizer 1003 can Including external memory 10032 (such as hard disk, CD or floppy disk etc.) and built-in storage 10034.Output interface 1004 can at least wrap Include display screen 10042 equipment such as grade.
In the present embodiment, the operation of this method is stored in based on computer program, the program file of this computer program In the external memory 10032 of aforementioned computer system based on von Neumann system, operationally it is loaded into built-in storage In 10034, it is transferred to after being then compiled as machine code in processor 1002 perform, so that based on von Neumann system Computer system in form data object scan module 102 in logic, judge module 104, Key Acquisition Module 106, add Close module 108 and key-strings arrange module 110.And during above-mentioned data ciphering method performs, the parameter of input All received by outer input interface 1001, and be transferred in memorizer 1003 caching, be then input in processor 1002 enter Row processes, and the result data of process or be cached in memorizer 1003 subsequently processes, or is passed to output interface 1004 export.
Concrete, above-mentioned processor 1002 is used for performing to operate as follows: the data object on monitoring end of scan, acquisition is swept The content of text of the data object retouched;Judge described content of text whether with default key character String matching;When coupling, Obtain the key preset;It is encrypted by the corresponding operating of data object described in described double secret key.
In an alternate embodiment of the invention, data object is file;Above-mentioned processor 1002 is additionally operable to perform to operate as follows: obtain The filename of the described file scanned;Above-mentioned processor 1002 be additionally operable to judge described in the filename of file that scans whether With described default key-strings as initial character string;Above-mentioned processor 1002 is additionally operable to by file described in described double secret key Opening operation be encrypted.
In an optional embodiment, data object is the data content that user inputs in Text Entry assembly; Above-mentioned processor 1002 is additionally operable to perform: carry out data transmission after being encrypted by data content described in described double secret key or this Ground storage.
In an optional embodiment, said external input interface 1001 is additionally operable to perform to receive key-strings and arranges Instruction, key-strings that above-mentioned processor 1002 is additionally operable to perform to receive input and corresponding with described key-strings close Key, above-mentioned memorizer 1003 is additionally operable to perform storage key-strings and the key corresponding with described key-strings.
In an optional embodiment, key-strings has multiple;Above-mentioned processor 1002 be additionally operable to perform search with The key-strings of described content of text coupling, if finding, is then judged to coupling, and the key character found described in acquisition String is as target critical character string;Above-mentioned processor 1002 be additionally operable to perform obtain preset with described target critical character string pair The key answered.
The above disclosed present pre-ferred embodiments that is only, can not limit the right model of the present invention with this certainly Enclose, the equivalent variations therefore made according to the claims in the present invention, still belong to the scope that the present invention is contained.

Claims (10)

1. a data ciphering method, it is characterised in that including:
Data object on monitoring end of scan, obtains the content of text of the data object scanned;
Judge described content of text whether with default key character String matching;
When coupling, obtain the key preset;
It is encrypted by the corresponding operating of data object described in described double secret key.
Data ciphering method the most according to claim 1, it is characterised in that described data object is file;
The step of the content of text of the data object that described acquisition scans also includes: the file of the file scanned described in acquisition Name;
Described judge described content of text whether with the step of default key character String matching particularly as follows: scan described in Pan Duaning The filename of file whether with described default key-strings as initial character string;
The described step being encrypted by the corresponding operating of data object described in described double secret key is particularly as follows: pass through described key The opening operation of described file is encrypted.
Data ciphering method the most according to claim 1, it is characterised in that described data object is that user inputs at text The data content of input in frame assembly;
The described step being encrypted by the corresponding operating of data object described in described double secret key particularly as follows:
Carry out data transmission or locally stored after being encrypted by data content described in described double secret key.
4. according to the arbitrary described data ciphering method of claims 1 to 3, it is characterised in that described method also includes:
Receive key-strings and instruction is set, receive the key-strings of input and the key corresponding with described key-strings And store.
Data ciphering method the most according to claim 1, it is characterised in that described key-strings has multiple;
Described judge described content of text whether with the step of default key character String matching particularly as follows:
Search the key-strings mated with described content of text, if finding, be then judged to coupling, and find described in acquisition Key-strings as target critical character string;
Described acquisition preset key step particularly as follows:
Obtain the key corresponding with described target critical character string preset.
6. a data encryption device, it is characterised in that including:
Data object scan module, for monitoring the data object on end of scan, obtains the text of the data object scanned Content;
Judge module, for judge described content of text whether with default key character String matching;
Key Acquisition Module, for when described content of text is with the key character String matching preset, obtaining the key preset;
Encrypting module, for being encrypted by the corresponding operating of data object described in described double secret key.
Data encryption device the most according to claim 6, it is characterised in that described data object is file;
Described data object scan module is additionally operable to the filename of the file scanned described in acquisition;
Described judge module be additionally operable to judge described in the filename of file that scans whether with described default key-strings For initial character string;
Described encrypting module is additionally operable to be encrypted by the opening operation of file described in described double secret key.
Data encryption device the most according to claim 6, it is characterised in that described data object is that user inputs at text The data content of input in frame assembly;
Described encrypting module is carried out data transmission after being additionally operable to be encrypted by data content described in described double secret key or local Storage.
9. according to the arbitrary described data encryption device of claim 6 to 8, it is characterised in that described device also includes keyword Symbol string arranges module, is used for receiving key-strings and arranges instruction, receive input key-strings and with described keyword Accord with key corresponding to string and store.
Data encryption device the most according to claim 6, it is characterised in that described key-strings has multiple;
Described judge module is additionally operable to search the key-strings mated with described content of text, if finding, then judges described Content of text and the key character String matching preset, and the key-strings found described in acquisition is as target critical character String;
Described Key Acquisition Module is additionally operable to obtain the key corresponding with described target critical character string preset.
CN201610605179.2A 2016-07-28 2016-07-28 Data ciphering method and device Pending CN106156642A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610605179.2A CN106156642A (en) 2016-07-28 2016-07-28 Data ciphering method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610605179.2A CN106156642A (en) 2016-07-28 2016-07-28 Data ciphering method and device

Publications (1)

Publication Number Publication Date
CN106156642A true CN106156642A (en) 2016-11-23

Family

ID=58060846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610605179.2A Pending CN106156642A (en) 2016-07-28 2016-07-28 Data ciphering method and device

Country Status (1)

Country Link
CN (1) CN106156642A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106791087A (en) * 2016-12-20 2017-05-31 北京小米移动软件有限公司 The storage method of information, device and equipment
CN109558581A (en) * 2017-09-27 2019-04-02 北京国双科技有限公司 A kind of content monitoring method and device
CN110058870A (en) * 2019-03-16 2019-07-26 平安城市建设科技(深圳)有限公司 Automatic detection upgrade method, device, equipment and storage medium
CN112835864A (en) * 2021-02-03 2021-05-25 北京联创信安科技股份有限公司 File storage method, device, equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101299842A (en) * 2007-04-30 2008-11-05 广东国笔科技有限公司 Method for seeking mobile phone storage information
CN101957894A (en) * 2009-07-17 2011-01-26 精品科技股份有限公司 System and method for controlling and managing authority of conditional electronic file
CN102118503A (en) * 2011-01-25 2011-07-06 宇龙计算机通信科技(深圳)有限公司 Data protection method, device and terminal
CN102567421A (en) * 2010-12-27 2012-07-11 北大方正集团有限公司 Document retrieval method and device
CN103678651A (en) * 2013-12-20 2014-03-26 Tcl集团股份有限公司 Sensitive word searching method and device
CN103916233A (en) * 2014-03-28 2014-07-09 小米科技有限责任公司 Information encryption method and device
CN104317976A (en) * 2014-11-21 2015-01-28 四川智诚天逸科技有限公司 Method for storing information
WO2015096578A1 (en) * 2013-12-27 2015-07-02 北京金山办公软件有限公司 Document encryption prompt method and system
CN105554745A (en) * 2016-01-27 2016-05-04 广东欧珀移动通信有限公司 Information management method and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101299842A (en) * 2007-04-30 2008-11-05 广东国笔科技有限公司 Method for seeking mobile phone storage information
CN101957894A (en) * 2009-07-17 2011-01-26 精品科技股份有限公司 System and method for controlling and managing authority of conditional electronic file
CN102567421A (en) * 2010-12-27 2012-07-11 北大方正集团有限公司 Document retrieval method and device
CN102118503A (en) * 2011-01-25 2011-07-06 宇龙计算机通信科技(深圳)有限公司 Data protection method, device and terminal
CN103678651A (en) * 2013-12-20 2014-03-26 Tcl集团股份有限公司 Sensitive word searching method and device
WO2015096578A1 (en) * 2013-12-27 2015-07-02 北京金山办公软件有限公司 Document encryption prompt method and system
CN103916233A (en) * 2014-03-28 2014-07-09 小米科技有限责任公司 Information encryption method and device
CN104317976A (en) * 2014-11-21 2015-01-28 四川智诚天逸科技有限公司 Method for storing information
CN105554745A (en) * 2016-01-27 2016-05-04 广东欧珀移动通信有限公司 Information management method and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106791087A (en) * 2016-12-20 2017-05-31 北京小米移动软件有限公司 The storage method of information, device and equipment
CN109558581A (en) * 2017-09-27 2019-04-02 北京国双科技有限公司 A kind of content monitoring method and device
CN109558581B (en) * 2017-09-27 2022-09-27 北京国双科技有限公司 Content monitoring method and device
CN110058870A (en) * 2019-03-16 2019-07-26 平安城市建设科技(深圳)有限公司 Automatic detection upgrade method, device, equipment and storage medium
CN112835864A (en) * 2021-02-03 2021-05-25 北京联创信安科技股份有限公司 File storage method, device, equipment and storage medium
CN112835864B (en) * 2021-02-03 2024-02-20 北京联创信安科技股份有限公司 File storage method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN104346471A (en) Method, device and system for determining to-be-pushed application based on geological position information
KR102355973B1 (en) Apparatus and method for detecting smishing message
US10496696B2 (en) Search method and apparatus
CN106156642A (en) Data ciphering method and device
CN108696490A (en) The recognition methods of account permission and device
CN112106049A (en) System and method for generating private data isolation and reporting
CN106569860A (en) Application management method and terminal
CN105187632B (en) Method and device for determining mobile phone number
CN106354570A (en) Account information copying and pasting method and device
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
CN111368196A (en) Model parameter updating method, device, equipment and readable storage medium
JP2019510303A (en) Icon processing method and apparatus for application
CN106529232A (en) Startup method and device
CN113869063A (en) Data recommendation method and device, electronic equipment and storage medium
CN107301236A (en) Application searches method, mobile terminal, server and computer-readable recording medium
CN111817944A (en) Picture sharing method and device and electronic equipment
CN106254226A (en) A kind of information synchronization method and device
CN112104571B (en) Service distribution method, device, computer equipment and computer storage medium
CN108460116A (en) Searching method, device, computer equipment, storage medium and search system
CN113835820A (en) Graphic code display method and device
CN113010918A (en) Information processing method and device
CN114860295A (en) Resource file updating method, device, equipment and readable storage medium
CN113840035A (en) Information sharing method and device, electronic equipment and readable storage medium
CN114448722A (en) Cross-browser login method and device, computer equipment and storage medium
CN114125139A (en) Information processing method and electronic device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161123

RJ01 Rejection of invention patent application after publication