CN106446702B - Cache information processing method and client - Google Patents

Cache information processing method and client Download PDF

Info

Publication number
CN106446702B
CN106446702B CN201510490779.4A CN201510490779A CN106446702B CN 106446702 B CN106446702 B CN 106446702B CN 201510490779 A CN201510490779 A CN 201510490779A CN 106446702 B CN106446702 B CN 106446702B
Authority
CN
China
Prior art keywords
information
cache
encryption
folder
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510490779.4A
Other languages
Chinese (zh)
Other versions
CN106446702A (en
Inventor
杨阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Beijing Co Ltd
Original Assignee
Tencent Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Beijing Co Ltd filed Critical Tencent Technology Beijing Co Ltd
Priority to CN201510490779.4A priority Critical patent/CN106446702B/en
Publication of CN106446702A publication Critical patent/CN106446702A/en
Application granted granted Critical
Publication of CN106446702B publication Critical patent/CN106446702B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of cache information processing methods, which comprises encryption folder is arranged in cache storage area;Determine the first information of caching to be encrypted in cache information;The first information is cached in the encryption folder.The embodiment of the invention also discloses a kind of clients.

Description

Cache information processing method and client
Technical field
The present invention relates to information technology field more particularly to a kind of cache information processing methods and client.
Background technique
With the development of information technology and electronic technology, people utilize mobile phone, tablet computer, desktop computer, notebook electricity The electronic equipments such as brain or electronic reader carry out interaction, browsing and the downloading of various information.These information usually may be It is stored in caching;But some information are very important information.After if other illegal users take electronic equipment, just It can find that many important information, leakage and the information security that will lead to information in this way are low from the caching in electronic equipment The problem of.
Summary of the invention
In view of this, an embodiment of the present invention is intended to provide a kind of cache information processing method and clients, at least partly Solve the problems, such as that the safety of cache information is low.
In order to achieve the above objectives, the technical scheme of the present invention is realized as follows:
First aspect of the embodiment of the present invention provides a kind of cache information processing method, which comprises
Encryption folder is set in cache storage area;
Determine the first information of caching to be encrypted in cache information;
The first information is cached in the encryption folder.
Based on above scheme, the first information of caching to be encrypted in the determining cache information, comprising:
Detect the first operation instruction;
The first information of the caching to be encrypted is determined based on first operation instruction.
Based on above scheme, the first information of caching to be encrypted in the determining cache information, comprising:
Obtain the information parameter of the cache information;
Determine whether the cache information is the specified first information encrypted according to the information parameter.
Based on above scheme, the information parameter include it is following at least one:
The information type of the cache information;
The information labels of the cache information;
The information format of the cache information;
The application scenarios information of the cache information.
Based on above scheme, the method also includes:
Non-encrypted file is arranged in the cache storage area to press from both sides;
The second information outside the first information described in the cache information is stored in the non-encrypted file folder.
Based on above scheme, the method also includes:
In the first display area display caching file;The cache file folder includes encryption folder;
The identification information of the cache information is shown in the second display area;Wherein, first display area and described Second display area is located in same display interface;
It is described that the first information is cached in the encryption folder, comprising:
Detection acts on the second operation instruction of second display area;
Based on second operation instruction, the identification information of the first information is moved in the encryption folder.
Based on above scheme, the encryption folder includes display state and hidden state;
It is described to show encryption folder in the first display area, comprising:
When detecting the operation instruction of first display area, the encryption folder is switched to from hidden state aobvious Show state, shows the encryption folder.
Based on above scheme, the method also includes:
Receive input key;
Determine that the input key is to match with the encryption key of the encryption folder;
If the input key matches with the encryption key, the encryption folder is decrypted.
Based on above scheme, the method also includes:
After decrypting the encryption folder, timing is carried out to decryption time;
When the decryption time reaches specified time, the decryption failure of the encryption folder is determined;Wherein, when described When file decryption failure, the first information of the encryption folder can not be opened and read.
Second aspect of the embodiment of the present invention provides a kind of client, and the client includes:
Setting unit, for encryption folder to be arranged in cache storage area;
First determination unit, for determining the first information of caching to be encrypted in cache information;
Cache unit, for the first information to be cached in the encryption folder.
Based on above scheme, first determination unit, comprising:
First detection module, for detecting the first operation instruction;
First determining module, for determining the first information of the caching to be encrypted based on first operation instruction.
Based on above scheme, first determination unit, comprising:
Module is obtained, for obtaining the information parameter of the first information;
Second determining module, for determining whether the cache information is the first of specified encryption according to the information parameter Information.
Based on above scheme, the information parameter include it is following at least one:
The information type of the first information;
The information labels of the first information;
The information format of the first information;
The application scenarios information of the first information.
Based on above scheme, the setting unit is also used to that non-encrypted file is arranged in the cache storage area and presss from both sides;
The cache unit is also used to for the second information outside the first information described in the cache information being stored in described In non-encrypted file folder.
Based on above scheme, the client, comprising:
Display unit, in the first display area display caching file;The cache file folder includes the encryption File;And the identification information of the cache information is shown in the second display area;Wherein, first display area and described Second display area is located in same display interface;
The cache unit, comprising: the second detection module, for detecting the second behaviour for acting on second display area It indicates;
Memory module moves the identification information of the first information to be encrypted for being based on second operation instruction It moves in the encryption folder.
Based on above scheme, the encryption folder includes display state and hidden state;
The display unit, it is specifically for when detecting the operation instruction of first display area, the encryption is literary Part folder is switched to display state from hidden state, shows the encryption folder.
Based on above scheme, the client further include:
Input unit, for receiving input key;
Second determination unit, for determining that the input key is for the encryption key phase with the encryption folder Match;
Decryption unit decrypts the encryption folder if matching for the input key with the encryption key.
Based on above scheme, the client further include:
Timing unit, for carrying out timing to decryption time after decrypting the encryption folder;
Third determination unit, for determining the solution of the encryption folder when the decryption time reaches specified time Close failure;Wherein, when the file, which is decrypted, to fail, it can not open and read the first information of the encryption folder.This Inventive embodiments provide a kind of cache information processing method and client, and the first information is stored encrypted in caching, such Words when illegal user needs to obtain the first information, need just see after decrypting, which adds the first information to be leaked Difficulty with being stolen, improves information security.
Detailed description of the invention
Fig. 1 is the flow diagram of cache information processing method described in the embodiment of the present invention;
Fig. 2 is the flow diagram of the caching first information described in the embodiment of the present invention;
Fig. 3 is the storage effect signal of the first information described in the embodiment of the present invention;
Fig. 4 is the effect diagram of the caching first information described in the embodiment of the present invention;
Fig. 5 is the structural schematic diagram of client described in the embodiment of the present invention.
Specific embodiment
Technical solution of the present invention is further described in detail with reference to the accompanying drawings and specific embodiments of the specification.
Embodiment of the method one:
As shown in Figure 1, the present embodiment provides a kind of cache information processing methods, which comprises
Step S110: encryption folder is set in cache storage area;
Step S120: the first information of caching to be encrypted in cache information is determined;
Step S130: the first information is cached in the encryption folder.
Cache information processing method described in the present embodiment can be applied to the various electronic equipments for being able to carry out information cache In, such as in mobile phone, tablet computer, laptop, desktop computer or wearable device electronic equipment.
The information that the cache information will be buffered.Cache information described in the present embodiment will be temporarily stored in buffer memory Region.The cache storage area specifically may include the storage medium that Cache cache etc. is used to carry out information cache.It deposits Storing up cache information in the cache storage area is the information temporarily stored, usually cache storage area memory space not When enough, part cache information can be capped, thus memory loss;And the cache information for being typically stored at cache storage area is not Support modification of the user to the information content.The first information does not refer in particular to some information or a certain in the present embodiment The information of seed type.The first information can be the various types such as pictorial information, text information, audio-frequency information or video information Information.In short, the first information can be from the received information arbitrarily to be cached of other electronic equipments.
The cache storage area is provided with encryption folder in step S110, the mode of setting can dispatch from the factory for client Default setting code, or it is various in client to apply the encryption folder that is arranged automatically during installation or grasped based on user Make the encryption folder of instruction setting.
The encryption folder is to be encrypted to file itself, needs opened file folder, it is necessary to encrypt file Folder is decrypted, after encryption folder decryption, so that it may open any one file in the encryption folder.
In the step s 120, cache information can be divided into the first information and the second information;The first information is to be encrypted slow The cache information deposited;And the second information can be the cache information of non-caching to be encrypted.
It is directly by first information storage into above-mentioned encryption folder, rather than to caching to be encrypted in step s 130 The first information carries out single encryption caching process.
It is provided with encryption folder in first client in the present embodiment, by arriving the first information storage The caching of the encryption to the first information is just completed in encryption folder, does not have to thus need to encrypt caching to each File is separately provided key and is cached, while also simplifying user's needs by caching while when checking multiple cache informations, Cache information of each encryption caching is decrypted respectively, it is clear that this to be cached by encryption folder Method can greatly simplify the first client and user's operation, improve encryption efficiency and decryption efficiency.At the same time, Solve respectively encrypt caused by key it is more, user forgets the problem of key causes oneself that can not all check.
Multiple cache informations can be stored in certain encryption folder, these cache informations are unified in encryption folder After encryption, if the non-decrypting encryption folder, can not check.
The encryption of the first information described in certain the present embodiment can be divided into encryption twice or more than twice, by described the The storage of one information can be used as into the encryption folder to be encrypted for the first time, in order to improve the information security of the first information Property, the first information being stored in first encryption folder can also be encrypted individually again.If desired sample is looked into See the first information, it is necessary first to be decrypted to encryption folder, secondly individually decrypt to the first information.
If information processing method described in the present embodiment is applied in the first client, the step S120 can be from second The received first information in client, the first information can be above-mentioned any information.Second client can with terminal or The electronic equipments such as server.The step S120 can be also the information of received user input, e.g., not complete in user's draft At short message or the information contents such as timely message.
By carrying out encryption caching to the first information, in this case, take in illegal user using in the present embodiment It, can not be directly by checking caching direct reading to the first information, illegal use after the electronic equipment of the method Family has to just see the information content of the first information, which adds described by decrypting the first information The difficulty of the first information being stolen, improves the information security of the first information, reduces the first information and is let out The risk of dew.
Embodiment of the method two:
As shown in Figure 1, the present embodiment provides a kind of cache information processing methods, which comprises
Step S110: encryption folder is set in cache storage area;
Step S120: the first information of caching to be encrypted in cache information is determined;
Step S130: the first information is cached in the encryption folder.
The step S120 can include:
Detect the first operation instruction;
The first information of the caching to be encrypted is determined based on first operation instruction.
First operation instruction described in the present embodiment carries out the behaviour of encryption caching for the first client of instruction to which caching Make.First operation instruction in this implementation can voice operating instruction, indicating equipment operation instruction or appearance body operation instruction etc. Operation instruction.The indicating equipment operation instruction may include the operation instruction of the structure detections such as mouse, keyboard or remote control.The appearance Body operation instruction may include the suspension touch control of the touch of touch screen detection, the detection of suspension touch control screen;The blink of camera detection is shown Conation makees or the movement such as swing one's arm of wearable device detection.
These operation instructions are it is possible to notify that first client carries out encryption caching to the first information.
Specifically such as, user is seeing video A, when user not thinks to want to allow other people easily to know direct viewing video A, Then control can be cached by clicking the encryption that first client show by indicating equipments such as mouse, touch-controls, indicate the One client carries out encryption caching.
In this case, the video A is the first information.Certainly, the first client can also cache needs Information carries out non-encrypted caching.The usual non-encrypted caching can carry out the default setting of caching process for the first client.This If sample, facilitate user according to the currently received first information, voluntarily controls whether that determination carries out encryption caching;With realization Feature easy and that control is flexible.
Embodiment of the method three:
As shown in Figure 1, the present embodiment provides a kind of cache information processing methods, which comprises
Step S110: encryption folder is set in cache storage area;
Step S120: the first information of caching to be encrypted in cache information is determined;
Step S130: the first information is cached in the encryption folder.
As shown in Fig. 2, the step S120 can include:
Step S121: the information parameter of the cache information is obtained;
Step S122: according to the information parameter, determine whether the cache information is the specified information for encrypting caching.
The information parameter include it is following at least one: the information type of the first information;The first information Information labels;The application scenarios information of the information format of the first information and the first information.
The information type can be several major class such as text, picture, audio and video information according to information content itself.It is described Information type can be divided into according to information source: the information from designated equipment and the information from non-designated equipment.Here Designated equipment is from corporate office network.Rather than designated equipment may be network server etc..As user A household from Oneself computer is handled official business, may subsidiary company computer or corporate networks receive critically important office document, if not encrypting directly Caching, may result in information-leakage, in this case by information origin classification, specify from company computer or corporate networks Information just carries out encryption storage.This when, the information type, may be exactly the information such as the IP address of information transmitting terminal.
The information labels, for example the first information is film, and certain film has various labels, such as type label, Current movie is what kind of label, such as time film or love film.Whether these information labels are obviously capable of providing needs Carry out the foundation of encryption caching.
The information format is cached as user can specify webpage without encryption, and video carries out encryption caching.This When, if the entitled .xml of the file suffixes of the first information, indicates that the information format of the first information is webpage, then do not encrypt caching. If the entitled .ari of the file suffixes of the first information, indicates that the first information is video, then encrypt storage.
The application scenarios information specifically may include the parameters such as the service application as applied by the first information.Such as fortune Service application of the row in first client may include communication class service application, such as wechat or QQ;Shopping class is answered for another example With such as only product can terminal applies, Jingdone district terminal applies or Taobao's terminal applies;Class application is paid for another example;Such as wechat, Mobile phone-money The application such as packet, Wealth tong and Alipay.Apply the first information in different business application, the privacy for the information that may relate to Property with safety difference, the present embodiment can utilize this point to determine whether need encrypt caching, avoid other people from passing through Caching gets important information in corresponding service application.For example.Applied to the application in mobile phone, under normal circumstances, if illegal use Family enters after mobile phone desktop, and wechat, which is usually all not required to input password, just can enter, and will lead to user's wechat and other in this way The dialogue of user, is viewed by illegal user, so as to cause information leakage, may relate to privacy, property and commercial code etc. Information.According to the present embodiment the method, the application scenarios information corresponds to communication class service application, in this way in acquisition The first information will be encrypted, and illegal user is the relatively difficult wechat chat that can see user in the case where no password Record.
Application scenarios information described in certain the present embodiment, in addition to parameters such as service applications applied by the first information Except, it may also include space-time application scenarios when first client obtains the first information.For example, the first client is in meeting The information that view room is got may relate to meeting secret, if these information are leaked after being stored in caching, it is clear that nor What client wanted.
The information parameter of the first information described in the present embodiment.The specific such as first information is video, is carrying out video When buffering, so that it may extract the information parameter of the video;The information parameter may include the text of the title of video, video Part format, the label information of video, resource address of video etc..The stage of video buffer just obtains the information ginseng in this way Number.In this way when having received first video, with regard to carrying out encryption caching automatically, in this case, video will not be delayed Depositing to take place without causes extension cache responses time etc. to cause adverse effect.
It may particularly include in step S122: the information parameter of the first information and preset predefined parameter carried out Matching, if successful match is considered as the information that the first information be specified encryption caching, if it fails to match think without into The information of row encryption caching.The predefined parameter can be for according to the preset parameter of user's instruction.
A kind of cache information processing method is present embodiments provided in a word, is all directed to and is added each time without user The information of close caching specifies the first client to carry out encryption storage, first client can through the above steps S121 to step S122 automatically determines whether the received information of institute needs to carry out encryption caching, and finally carries out encryption caching process automatically, thus The intelligence of electronic equipment is enhanced, users' satisfaction degree is improved.
Embodiment of the method four:
As shown in Figure 1, the present embodiment provides a kind of cache information processing methods, which comprises
Step S110: the first information to be cached is obtained;
Step S120: the first information is stored encrypted in caching.
The method also includes:
Non-encrypted file is arranged in the cache storage area to press from both sides;
The second information outside the first information described in the cache information is stored in the non-encrypted file folder.
The file that the cache storage area is arranged in this application can be collectively referred to as cache file folder, the caching text Part folder not only includes the encryption cache file folder mentioned in previous embodiment, further includes the non-encrypted cache file in the present embodiment Folder.There are some cache informations, user is not intended to carry out encryption caching, such as sharable cache information.Such as in order to subsequent User voluntarily checks there are some cache informations for being not related to privacy of user, and user is not intended to be encrypted caching, leads to oneself It is also required to when checking by cumbersome caused by decryption processing.Therefore non-add is also provided in cache storage area in the present embodiment Close file.
Second information of the non-encryption to be cached in cache information is stored to described and is issued in encryption folder, is carried out non- Encryption storage.In this case, different types of cache informations all in the prior art all unique cachings are also solved, without area The problem of point sharable information and personal information, caused cache information managerial confusion, utilize caching described in the present embodiment Information processing method can be good at solving above-mentioned cache information managerial confusion, not distinguish personal information and can shared information The problem of;Realize effective and coherent caching and the management of cache information.
Embodiment of the method five:
As shown in Figure 1, the present embodiment provides a kind of cache information processing methods, which comprises
Step S110: encryption folder is set in cache storage area;
Step S120: the first information of caching to be encrypted in cache information is determined;
Step S130: the first information is cached in the encryption folder.
The method also includes:
In the first display area display caching file;The cache file folder includes encryption folder;Certainly specific When realization, the cache file folder is also possible that non-encrypted file presss from both sides;
The identification information of the cache information is shown in the second display area;Wherein, first display area and described Second display area is located in same display interface.Certainly the identification information of cache information here includes at least first letter The identification information of breath can also include the message identification for the second information mentioned in previous embodiment.
The step S130 can include:
Detection acts on the second operation instruction of second display area;
Based on second operation instruction, the identification information of the first information is moved in the encryption folder. Thereby realize the caching of the encryption to the first information.
The identification information of the first information can be heading message, the file map of the first information of the first information Mark the various information that mark action can be played to the first information such as information.
User carries out the processing that first information encryption caches for convenience in this application.By same display interface range two A region shows the encryption folder in a region, the first information is shown in another display area, in this way Facilitate user by the dragging such as the mouse or finger sliding first information, the first information is directly added to the encryption In file, this visual operation has the characteristics that operating habit that is simple, and meeting present most users, to have Have the characteristics that users satisfaction degree is high.
Second operation instruction, can be with various types of operations such as voice operating or appearance gymnastics work.
As shown in Figure 3 to Figure 4, it is entitled I video file under, multiple sub-folders are entitled encryption respectively The files such as file, my video and ba.In Fig. 3 when front opening it is entitled I video file, therefore can be with file The left side display area of folder shows the video of the entitled wolf of storage, when this is video a length of 2 hours 1 point 4 seconds.If user Think that this video is not desired to be seen by people, using drag operation as shown in Figure 4, which dragged in encryption folder, In this case, the video is just from the video for being cached to me, and replacement is to being cached in encryption folder.Thus reach to this The caching encryption of video.Obviously in Fig. 3, into Fig. 4, the left side is used to show the place of file, it is believed that is described first Display area;The right is for showing that the region of the content stored in each file is second display area.
It is worth noting that: when the identification information of the first information being moved in the encryption file, described Storage the first information may be arrived not yet in the corresponding icon of the identification information of one information.For example, the first client is from clothes Be engaged in device foradownloaded video B;Currently according to video buffer in the first client, just form the identification information of video B, but also from Server downloads to any information of video B, or has only downloaded 50% video B.At this moment, if detecting the second operation instruction, After the identification information of the first information is moved in the encryption file, being equivalent to will determine and has connect in the first information The part of receipts carries out encryption caching, also carries out encryption caching to part not received in the first information.
Embodiment of the method six:
As shown in Figure 1, the present embodiment provides a kind of cache information processing methods, which comprises
Step S110: encryption folder is set in cache storage area;
Step S120: the first information of caching to be encrypted in cache information is determined;
Step S130: the first information is cached in the encryption folder.
The encryption folder includes display state and hidden state;
It is described to show encryption folder in the first display area, comprising:
When detection acts on the operation instruction of first display area, the encryption folder is cut from hidden state Display state is changed to, shows the encryption folder.
In the present embodiment, the encryption folder includes two states, and the encryption folder is under usual state Hidden state after such words illegal user takes electronic equipment, can not be viewed directly by way of checking described Encryption folder, it was found that have encryption folder in the first client;It is decrypted by the way of violence decryption. It all may be configured as hidden state under the encryption folder default conditions in this application.As long as the encryption for carrying out the first information is slow Under the premise of depositing, and when detecting the operation instruction for acting on first display area, just make the encryption folder from hidden Hiding state is switched to display state, and shows the encryption folder.
It, can also be aobvious described first when the encryption folder is in hidden state during concrete implementation Show that region shows other information, when the encryption folder is switched to display state, the encryption folder Overlapping display exists On other information paper, information security can be further improved in this way.Meanwhile more display areas are saved for the first client End display other content.
Embodiment of the method seven:
As shown in Figure 1, the present embodiment provides a kind of cache information processing methods, which comprises
Step S110: encryption folder is set in cache storage area;
Step S120: the first information of caching to be encrypted in cache information is determined;
Step S130: the first information is cached in the encryption folder.
The method also includes:
Receive input key;
Determine that the input key is to match with the encryption key of the encryption folder;
If the input key matches with the encryption key, the encryption folder is decrypted.
The input key can be the input key of user's input or the input of other electronic equipments.The input key can be with It can also be picture, such as the picture information of camera acquisition for text, such as character string;The input is close in the present embodiment Key is preferably the information such as picture.
First client can match the input key with encryption key after receiving the input key, if Successful match then carries out the decryption of encryption folder, encryption folder is not decrypted if matching is unsuccessful.Due to encryption Mode it is different, encryption key and decruption key may be it is identical, be also possible to different, such as symmetric cryptography, then it is described Encryption key is identical with decruption key.It is, for example, again asymmetric encryption, then encryption key and decruption key be not identical.But whether Which kind of cipher mode has corresponding relationship between encryption key and decruption key, input key described in the present embodiment and encryption Whether key matches, i.e., whether meets above-mentioned corresponding relationship.
In the present embodiment by the decryption to file, facilitates user and voluntarily check and believe by the first of encryption caching Breath, while by the decryption of encryption folder, it is decrypted simultaneously relative to multiple first information, decryption behaviour can be simplified Make, further improves users' satisfaction degree.
Embodiment of the method eight:
As shown in Figure 1, the present embodiment provides a kind of cache information processing methods, which comprises
Step S110: encryption folder is set in cache storage area;
Step S120: the first information of caching to be encrypted in cache information is determined;
Step S130: the first information is cached in the encryption folder.
The method also includes:
Receive input key;
Determine that the input key is to match with the encryption key of the encryption folder;
If the input key matches with the encryption key, the encryption folder is decrypted.
The method also includes:
After decrypting the encryption folder, timing is carried out to decryption time;
When the decryption time reaches specified time, the decryption failure of the encryption folder is determined;When the file When folder decryption failure, the first information of the encryption folder can not be opened and read.
The decryption time of the encryption file has effective acting time in the present embodiment, such as works as encryption folder quilt After decryption, timing will be carried out to decryption time.By determining the processing of decryption failure, can be avoided user decrypted file Later, described add can still be checked using open encryption folder by having forgotten illegal user caused by closing encryption folder The phenomenon that first information in close file.
Handled in the present embodiment by the timing of the decryption time etc., it improves carried out the slow of encryption again Stored safety.
Apparatus embodiments one:
As shown in figure 5, the present embodiment provides a kind of client, the client includes:
Setting unit 110, for obtaining the first information to be cached;
First determination unit 120, for determining the first information of caching to be encrypted in cache information;
Cache unit 130, for the first information to be cached in the encryption folder.
The specific structure of setting unit 110 described in the present embodiment may include processor or processing circuit;The processor Or processing circuit, it may be implemented in cache storage area by execution appointment codes and encryption folder be provided.
There are many structures of first determination unit 120, such as by indicating to determine the first information based on user, Then first determination unit 120 includes man-machine interactive interface;First determination unit 120 may also include processor or processing Circuit, for being the determination for realizing the first information by executing built-in instruction.The man-machine interactive interface may include key Disk, mouse, touch screen, suspension touch control screen or interactive voice interface etc..
Processor described in the present embodiment may include application processor, central processing unit, microprocessor, Digital Signal Processing Device or programmable array etc.;The processing circuit may include specific integrated circuit etc..
The cache unit 130 may include the storage medium for being cached.The cache unit can store information.
First client described in the present embodiment also will do it encryption to cache information, in this case, avoid him People obtains the first information stored in the first client by query caching, to improve the information security of the first information.
Client described in the present embodiment is implemented for preceding method cache information processing as described in the examples in a word A possibility that method can be improved information security, reduce information leakage.First client described in the present embodiment specifically corresponds to Structure, it may include the structures such as mobile phone, tablet computer, laptop family, desktop computer or wearable device.
Apparatus embodiments two:
As shown in figure 5, the present embodiment provides a kind of client, the client includes:
Setting unit 110, for obtaining the first information to be cached;
First determination unit 120, for determining the first information of caching to be encrypted in cache information;
Cache unit 130, for the first information to be cached in the encryption folder.
First determination unit 120 can include:
First detection module, for detecting the first operation instruction;
First determining module, for determining the first information of the caching to be encrypted based on first operation instruction.
First operation instruction described in the present embodiment is the operational order that the instruction first information carries out encryption storage, can be with It is the user instruction of user's input, is also possible to the transmission instruction of other electronic equipments.The obvious client According to cache information pointed by first operation instruction, the first information is determined.First operational order may be used also Think the operational order for specially indicating the first information of caching to be encrypted.
The first detection module may include various types of man-machine interactive interfaces, as keyboard, mouse, voice input connect The structures such as mouth, touch screen or suspension touch control screen, for receiving the first operation instruction of user's input.Certainly the described first detection mould Block also may include communication interface, for receiving first operation instruction from the second client.The structure of the communication interface It can be found in aforementioned device embodiment, be not just repeated herein.
First determining module includes processor or processing circuit, first operation instruction is able to respond, to first Information carries out encryption storage.The structure of the processor and processing circuit can be found in above equipment embodiment and just not repeat herein .
First client described in the present embodiment in a word allows user voluntarily to control first client as needed It controls whether the first information carries out encryption caching, increases the control to cache management of user, thus User is facilitated voluntarily to determine that the first information is to need the personal information of encryption caching can shared information or ostensible;Have Structure is simple and realizes easy feature.
Apparatus embodiments three:
As shown in figure 5, the present embodiment provides a kind of client, the client includes:
Setting unit 110, for obtaining the first information to be cached;
First determination unit 120, for determining the first information of caching to be encrypted in cache information;
Cache unit 130, for the first information to be cached in the encryption folder.
The cache unit 120 can include:
Module is obtained, for obtaining the information parameter of the cache information;
Second determining module, for determining whether the cache information is specified encryption caching according to the information parameter The first information.
The information parameter for obtaining module and being used to obtain the cache information described in the present embodiment obtains first letter The information parameter of breath can be received by received mode from other clients, can also be according to modes such as information extraction strategies Voluntarily extract.When the acquisition module is obtained by received mode, the acquisition module may include communication interface etc. Structure.Certain acquisition module may also comprise processor or processing circuit, obtain institute by executing the information extraction strategy State information parameter.The information extraction strategy may include the specified portions for extracting the first information.
The information parameter include it is following at least one: the information type of the first information;The first information Information labels;The application scenarios information of the information format of the first information and the first information.
The detailed composition of these informations parameter and citing, reference can be made to corresponding embodiment of the method, is not just repeated herein.Always The present embodiment described in the first client can intelligently determine the need for carrying out the first information according to the information parameter Encryption caching, the software and hardware resources of the first client preferably utilized, the intelligence and user for improving client use full Meaning degree.
Apparatus embodiments four:
As shown in figure 5, the present embodiment provides a kind of client, the client includes:
Setting unit 110, for obtaining the first information to be cached;
First determination unit 120, for determining the first information of caching to be encrypted in cache information;
Cache unit 130, for the first information to be cached in the encryption folder.
The setting unit 110 is also used to that non-encrypted file is arranged in the cache storage area and presss from both sides;
The cache unit 130 is also used to for the second information outside the first information described in the cache information being stored in In the non-encrypted file folder.
The cache file folder that the setting unit 110 can be used for being arranged includes that encryption folder and non-encrypted file press from both sides.
The second information that client can not need to carry out encryption caching in this way is stored in non-encrypted file folder, just real Show to the cache information that there may be different demands for security, has distinguished storage.For example, personal information is considered as the first information, Can shared information be considered as second information, while the managerial confusion that will be avoided the problem that in cache information.
Certain the present embodiment encryption folder can be used for storing personal information, and the non-encrypted file folder can be used for storing can Shared information.In general, the security level that the personal information requires be higher than it is described can shared information safety requirements grade.
In a word in the present embodiment, first client encrypts the caching first information using encryption folder, is added with non- Close file caches second information.Have the characteristics that realize easy, structure is simple and cache information manage it is orderly.
Apparatus embodiments five:
As shown in figure 5, the present embodiment provides a kind of client, the client includes:
Setting unit 110, for obtaining the first information to be cached;
First determination unit 120, for determining the first information of caching to be encrypted in cache information;
Cache unit 130, for the first information to be cached in the encryption folder.
Client described in the present embodiment further include:
Display unit, in the first display area display caching file;The cache file folder includes encryption file Folder;And the identification information of the cache information is shown in the second display area;Wherein, first display area and described second Display area is located in same display interface.
The cache unit 130, comprising:
Second detection module, for detecting the second operation instruction for acting on second display area;
Encrypting module moves the identification information of the first information to be encrypted for being based on second operation instruction It moves in the encryption folder.Thereby realize the caching of the encryption to the first information.
The display unit may include various types of display screens, such as liquid crystal display, electric ink display screen, You Jifa The structures such as optical diode OLED display screen, projection display screen or transparent display screen.
For the display unit in same display interface, subregion shows that the cache file presss from both sides stored mark of easing up Information;User can be facilitated visually to be operated in this way, improve users' satisfaction degree.
As advanced optimizing for the present embodiment, the encryption folder includes display state and hidden state;
The display unit, it is specifically for when detecting the operation instruction of first display area, the encryption is literary Part folder is switched to display state from hidden state, shows the encryption folder.
The folder that encrypts described in the present embodiment is corresponded to there are two types of the state shown, and the usual display described by default Unit can be used for not showing the encryption folder under default hidden state, to further increase information security.With this Simultaneously, additionally it is possible to save more spaces for showing other information.
In addition, display unit, is also used to just show institute when detection acts on the operation instruction of corresponding first display area Encryption folder is stated, can facilitate user that the information of caching to be encrypted is stored such energy into the encryption folder in this way It is enough user-friendly.
Apparatus embodiments six:
As shown in figure 5, the present embodiment provides a kind of client, the client includes:
Setting unit 110, for obtaining the first information to be cached;
First determination unit 120, for determining the first information of caching to be encrypted in cache information;
Cache unit 130, for the first information to be cached in the encryption folder.
The client further include:
Input unit, for receiving input key;
Second determination unit, for determining that the input key is for the encryption key phase with the encryption folder Match;
Decryption unit decrypts the encryption folder if matching for the input key with the encryption key.
Input unit described in the present embodiment may include keyboard, mouse, touch screen, suspension touch control screen or voice input structure Etc. man-machine interactive interfaces, can be used for receiving the input key.
Second determination unit may include being able to carry out the input key and the matched place of encryption key progress Manage device or processing circuit.The decryption unit may include the processor or processing circuit for being able to carry out decryption.Described second determines Unit and the decryption unit can respectively correspond different processor or processing circuit, also can integrate corresponding identical processor Or processing circuit.These integrate corresponding processor or the mode of time division multiplexing or concurrent thread can be used in processing circuit, come real The function of existing second determination unit and the decryption unit.
And the encryption unit is that entire encryption folder is decrypted in the present embodiment, in this case, passes through one Secondary decryption, user can check the information of any one or more encryption cachings in encryption folder, thus reach simplified solution Close feature improves users' satisfaction degree.
As the further improvement of the present embodiment, the client further include:
Timing unit, for carrying out timing to decryption time after decrypting the encryption folder;
Third determination unit, for determining the solution of the encryption folder when the decryption time reaches specified time Close failure;Wherein, when the file, which is decrypted, to fail, it can not open and read the first information of the encryption folder.
Timing unit described in the present embodiment may include the structures such as timer, for carrying out the decryption time timing.
Second determination unit may include processor or processing circuit, can determine that the decryption of the encryption folder is lost Effect, the time after decryption failure, the information that user cannot be checked again in encryption folder (may need to exclude certainly Through open information).
The client passes through the introducing of timing unit and the second determination unit in the present embodiment, can prevent user from forgetting Note exits the encryption folder, caused information leakage and the risk stolen, and further improves the safety of information.
Below with reference to above-mentioned any embodiment, a specific example is provided.
The audio and video player application of terminal at present, does not nearly all carry out encryption setting to file.However for individual's Video file has the demand of setting password.For liking for video cache to the user locally watched, All Files all exist In one cache file folder, cache management is more chaotic, can not distinguish to private and sharable file.Terminal herein is It can correspond to the client or the first client in previous embodiment.
In this example to solve the above-mentioned problems, encrypted list file is set, and encrypted list file here is For encryption folder described in above-described embodiment.Personal video's file is dragged in this document folder.Encrypted column is checked every time Password need to be inputted when table can just check video file therein, and password effective time is arranged.It such as inputs within password 30s, then Secondary click encrypted list file is not required to input password;30s after input password, again tapping on this document folder then needs to input again Password ensure that the safety and validity of password well in this way.
As shown in Figure 3 and Figure 4, interaction is cached for encryption applied to the method in terminal, in the upper right sliding displaying of display interaction screen Folder List, open here any file check encrypted list file, switch again alternative document folder check listed files The step of, it is only necessary to a step.And the display of plane is carried out to Folder List in the prior art, second text is checked in switching When part presss from both sides, it is also necessary to exit first file and enter second two step of file operation.Here the design of drawer type, Reduce the operation of two steps.
After showing Folder List, the video file that encryption is set as needed only need to be grown, is dragged in encrypted list .
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it Its mode is realized.Apparatus embodiments described above are merely indicative, for example, the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, such as: multiple units or components can combine, or It is desirably integrated into another system, or some features can be ignored or not executed.In addition, shown or discussed each composition portion Mutual coupling or direct-coupling or communication connection is divided to can be through some interfaces, the INDIRECT COUPLING of equipment or unit Or communication connection, it can be electrical, mechanical or other forms.
Above-mentioned unit as illustrated by the separation member, which can be or may not be, to be physically separated, aobvious as unit The component shown can be or may not be physical unit, it can and it is in one place, it may be distributed over multiple network lists In member;Some or all of units can be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
In addition, each functional unit in various embodiments of the present invention can be fully integrated into a processing module, it can also To be each unit individually as a unit, can also be integrated in one unit with two or more units;It is above-mentioned Integrated unit both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above method embodiment can pass through The relevant hardware of program instruction is completed, and program above-mentioned can be stored in a computer readable storage medium, the program When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned include: movable storage device, it is read-only Memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or The various media that can store program code such as person's CD.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.

Claims (19)

1. a kind of cache information processing method, which is characterized in that the described method includes:
Encryption folder is set in cache storage area, wherein the cache storage area includes: depositing for information cache Storage area domain;
Determine the first information of caching to be encrypted in cache information;
The first information is cached in the encryption folder.
2. the method according to claim 1, wherein
The first information of caching to be encrypted in the determining cache information, comprising:
Detect the first operation instruction;
The first information of the caching to be encrypted is determined based on first operation instruction.
3. the method according to claim 1, wherein
The first information of caching to be encrypted in the determining cache information, comprising:
Obtain the information parameter of the cache information;
Determine whether the cache information is the specified first information encrypted according to the information parameter.
4. according to the method described in claim 3, it is characterized in that,
The information parameter include it is following at least one:
The information type of the cache information;
The information labels of the cache information;
The information format of the cache information;
The application scenarios information of the cache information.
5. method according to any one of claims 1 to 4, which is characterized in that
The method also includes:
Non-encrypted file is arranged in the cache storage area to press from both sides;
The second information outside the first information described in the cache information is stored in the non-encrypted file folder.
6. method according to any one of claims 1 to 4, which is characterized in that
The method also includes:
In the first display area display caching file;The cache file folder includes encryption folder;
The identification information of the cache information is shown in the second display area;Wherein, first display area and described second Display area is located in same display interface;
It is described that the first information is cached in the encryption folder, comprising:
Detection acts on the second operation instruction of second display area;
Based on second operation instruction, the identification information of the first information is moved in the encryption folder.
7. the method according to claim 1, wherein
The encryption folder includes display state and hidden state;
It is described to show encryption folder in the first display area, comprising:
When detecting the operation instruction of first display area, the encryption folder is switched to display shape from hidden state State shows the encryption folder.
8. the method according to claim 1, wherein
The method also includes:
Receive input key;
Determine that the input key is to match with the encryption key of the encryption folder;
If the input key matches with the encryption key, the encryption folder is decrypted.
9. according to the method described in claim 8, it is characterized in that,
The method also includes:
After decrypting the encryption folder, timing is carried out to decryption time;
When the decryption time reaches specified time, the decryption failure of the encryption folder is determined;Wherein, when the file When folder decryption failure, the first information of the encryption folder can not be opened and read.
10. a kind of client, which is characterized in that the client includes:
Setting unit, for encryption folder to be arranged in cache storage area, wherein the cache storage area includes: use In the storage region of information cache;
First determination unit, for determining the first information of caching to be encrypted in cache information;
Cache unit, for the first information to be cached in the encryption folder.
11. client according to claim 10, which is characterized in that
First determination unit, comprising:
First detection module, for detecting the first operation instruction;
First determining module, for determining the first information of the caching to be encrypted based on first operation instruction.
12. client according to claim 11, which is characterized in that
First determination unit, comprising:
Module is obtained, for obtaining the information parameter of the first information;
Second determining module, for determining whether the cache information is specified the first letter encrypted according to the information parameter Breath.
13. client according to claim 12, which is characterized in that
The information parameter include it is following at least one:
The information type of the first information;
The information labels of the first information;
The information format of the first information;
The application scenarios information of the first information.
14. client according to any one of claims 10 to 13, which is characterized in that
The setting unit is also used to that non-encrypted file is arranged in the cache storage area and presss from both sides;
The cache unit, be also used to for the second information outside the first information described in the cache information being stored in it is described it is non-plus In close file.
15. client according to claim 14, which is characterized in that
The client, comprising:
Display unit, in the first display area display caching file;The cache file folder includes the encryption file Folder;And the identification information of the cache information is shown in the second display area;Wherein, first display area and described second Display area is located in same display interface;
The cache unit, comprising: the second detection module refers to for detecting to act on the second of second display area and operate Show;
The identification information of the first information to be encrypted is moved to by memory module for being based on second operation instruction In the encryption folder.
16. client according to claim 10, which is characterized in that
The encryption folder includes display state and hidden state;
The display unit, specifically for when detecting the operation instruction of first display area, by the encryption folder It is switched to display state from hidden state, shows the encryption folder.
17. client according to claim 10, which is characterized in that
The client further include:
Input unit, for receiving input key;
Second determination unit, for determining that the input key is to match with the encryption key of the encryption folder;
Decryption unit decrypts the encryption folder if matching for the input key with the encryption key.
18. client according to claim 17, which is characterized in that
The client further include:
Timing unit, for carrying out timing to decryption time after decrypting the encryption folder;
Third determination unit, for when the decryption time reaches specified time, determining that the decryption of the encryption folder is lost Effect;Wherein, when the file, which is decrypted, to fail, it can not open and read the first information of the encryption folder.
19. client according to claim 10, which is characterized in that the cache storage area includes Cache.
CN201510490779.4A 2015-08-11 2015-08-11 Cache information processing method and client Active CN106446702B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510490779.4A CN106446702B (en) 2015-08-11 2015-08-11 Cache information processing method and client

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510490779.4A CN106446702B (en) 2015-08-11 2015-08-11 Cache information processing method and client

Publications (2)

Publication Number Publication Date
CN106446702A CN106446702A (en) 2017-02-22
CN106446702B true CN106446702B (en) 2019-11-12

Family

ID=58093460

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510490779.4A Active CN106446702B (en) 2015-08-11 2015-08-11 Cache information processing method and client

Country Status (1)

Country Link
CN (1) CN106446702B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107770182B (en) * 2017-10-30 2020-09-08 中国联合网络通信集团有限公司 Data storage method of home gateway and home gateway
CN113819935B (en) * 2021-11-24 2022-03-04 杭州先锋电子技术股份有限公司 Display method of low-power consumption metering device display device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916402A (en) * 2014-04-18 2014-07-09 北京奇虎科技有限公司 Method and device for protecting browser download file
CN104580647A (en) * 2014-12-31 2015-04-29 惠州Tcl移动通信有限公司 Caching method for call record and communication device
CN104699563A (en) * 2013-12-04 2015-06-10 大连鸿祺科技发展有限公司 Method for automatically copying company input encrypted memory area data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104699563A (en) * 2013-12-04 2015-06-10 大连鸿祺科技发展有限公司 Method for automatically copying company input encrypted memory area data
CN103916402A (en) * 2014-04-18 2014-07-09 北京奇虎科技有限公司 Method and device for protecting browser download file
CN104580647A (en) * 2014-12-31 2015-04-29 惠州Tcl移动通信有限公司 Caching method for call record and communication device

Also Published As

Publication number Publication date
CN106446702A (en) 2017-02-22

Similar Documents

Publication Publication Date Title
CN106415501B (en) Mating application program for activity cooperation
CN104601325B (en) Data ciphering method, data decryption method, device, equipment and system
JP6061170B1 (en) Computer program, secret management method and system
CN101529366B (en) Identification and visualization of trusted user interface objects
CN104102483B (en) Safely using public service to realize the method and system of private or enterprise objective
EP2801040B1 (en) Method and system for dynamically assignable user interface
CN107666479A (en) Information encrypting and decrypting method, apparatus, computer equipment and storage medium
WO2016045469A1 (en) Information encryption method and mobile terminal
US9659189B2 (en) Systems and methods of safeguarding user information while interacting with online service providers
KR20050104382A (en) System for ad hoc sharing of content items between portable devices and interaction methods therefor
AU2017404207A1 (en) Information processing device and information processing method
CN104885403A (en) Method for producing dynamic data structures for authentication and/or password identification
CN104270516B (en) Decryption method and mobile terminal
CN104123059A (en) Cloud computing management system based on web desktop system
CN103745162A (en) Secure network file storage system
CN103324898A (en) Method for encrypting/decrypting display content in touch screen, and communication terminal
CN109635581A (en) A kind of data processing method, equipment, system and storage medium
CN103577761A (en) Method and device for processing privacy data in mobile equipment
CN103268456A (en) Method and device for file safety control
CN110140336A (en) Consecutive password technology
CN102891749A (en) Method and communication terminal for data encryption
CN107395589A (en) Finger print information acquisition methods and terminal
CN110188524A (en) Information ciphering method, information decryption method and terminal
CN106446702B (en) Cache information processing method and client
JP2022530850A (en) Improved messaging system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant