CN106529319A - File protection method and device, and terminal - Google Patents
File protection method and device, and terminal Download PDFInfo
- Publication number
- CN106529319A CN106529319A CN201611085034.0A CN201611085034A CN106529319A CN 106529319 A CN106529319 A CN 106529319A CN 201611085034 A CN201611085034 A CN 201611085034A CN 106529319 A CN106529319 A CN 106529319A
- Authority
- CN
- China
- Prior art keywords
- file
- information
- decryption information
- comparative result
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Document Processing Apparatus (AREA)
Abstract
The embodiment of the invention provides a file protection method and device, and a terminal. The method comprises the following steps of: when a file is detected to operate, receiving decryption information input by a user; comparing the decryption information with encryption information in the file to obtain a comparison result; according to the comparison result, judging whether the decryption information is abnormal or not; and if the decryption information is abnormal, transferring the file to a preset storage position. By use of the scheme, after the user inputs the decryption information, whether the decryption information is abnormal or not is judged through the comparison result of the decryption information and the encryption information in the file, and the file is transferred when the decryption information is abnormal. When other people carry out illegal cracking on an encrypted file, the file can be transferred, and a phenomenon that the private file of the user is illegally obtained by other people so as to cause the leakage of the private information of the user is avoided so as to improve the information security of the terminal.
Description
Technical field
The present invention relates to field of information security technology, more particularly to a kind of document protection method, device and terminal.
Background technology
With the development of terminal technology, degree of dependence more and more higher of the user to terminals such as smart mobile phones, terminal
Memory space is also increasing.User can store various information in the terminal.For example, user can store sound in the terminal
The multimedia messages such as pleasure, video, can be with privacy informations such as memory communicating record, notes.
On the other hand, due to the portability of terminal, terminal is generally carried with by user.And user's portable terminal
When, the situation that the storage device (such as storage card) in terminal generation loss or terminal is lost happens occasionally.Once terminal or
Storage device in terminal is lost, and the information of user's storage is easily known by other people, causes user privacy information to reveal.
So as to current terminal cannot be effectively protected to the information of user's storage, cause the information security of terminal
Property is low.
The content of the invention
The embodiment of the present invention provides a kind of document protection method, device and terminal, can improve the Information Security of terminal.
The embodiment of the present invention provides a kind of document protection method, including:
When detecting file and being run, the decryption information of receiving user's input;
The decryption information is compared with the encryption information in this document, to obtain comparative result;
Judge whether the decryption information is abnormal according to the comparative result;
If so, this document is transferred to into preset memory locations then.
Accordingly, the embodiment of the present invention also provides a kind of file protection device, including:
Receiver module, for when detecting file and being run, the decryption information of receiving user's input;
Comparison module, for the decryption information is compared with the encryption information in this document, to obtain comparative result;
First judge module, for judging whether the decryption information is abnormal according to the comparative result;
Shift module, for when the judge module is judged as YES, this document being transferred to preset memory locations.
Accordingly, the embodiment of the present invention also provides a kind of terminal, including:
Touch-screen, for the touch operation of receive user;
Be stored with the memory of executable program code;
The processor coupled with the memory;
The executable program code that the processor is stored in calling the memory, performs above-mentioned document protection method.
The embodiment of the present invention when detecting file and being run, the decryption information of receiving user's input;By the decryption information
It is compared with the encryption information in this document, to obtain comparative result;Whether the decryption information is judged according to the comparative result
It is abnormal;If so, this document is transferred to into preset memory locations then.The program after user input decryption information, by the decryption
Information judges with the comparative result of encryption information in file whether the decryption information is abnormal, when decryption information is abnormal, to this
File is shifted, can be at other people to encrypting the staged files when file is illegally cracked, it is to avoid the private file quilt of user
Other people are illegally obtained so as to cause user privacy information to reveal, such that it is able to improve the Information Security of terminal.
Description of the drawings
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below will be to making needed for embodiment description
Accompanying drawing is briefly described.It should be evident that drawings in the following description are only some embodiments of the present invention, for
For those skilled in the art, on the premise of not paying creative work, can be attached to obtain others according to these accompanying drawings
Figure.
Fig. 1 is the schematic flow sheet of document protection method provided in an embodiment of the present invention.
Fig. 2 is another schematic flow sheet of document protection method provided in an embodiment of the present invention.
Fig. 3 is the another schematic flow sheet of document protection method provided in an embodiment of the present invention.
Fig. 4 is the structural representation of file protection device provided in an embodiment of the present invention.
Fig. 5 is another structural representation of file protection device provided in an embodiment of the present invention.
Fig. 6 is the another structural representation of file protection device provided in an embodiment of the present invention.
Fig. 7 is the structural representation of terminal provided in an embodiment of the present invention.
Fig. 8 is another structural representation of terminal provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described.Obviously, described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on
Embodiment in the present invention, the every other enforcement obtained under the premise of creative work is not made by those skilled in the art
Example, belongs to the scope of protection of the invention.
Term " first ", " second ", " the 3rd " in description and claims of this specification and above-mentioned accompanying drawing etc.
(if present) is for distinguishing similar object, without being used to describe specific order or precedence.It should be appreciated that this
The object of sample description can be exchanged in the appropriate case.Additionally, term " comprising " and " having " and their any deformation, meaning
Figure is to cover non-exclusive including.For example, the process of series of steps, method are contained or a series of modules or list is contained
The device of unit, terminal, system are not necessarily limited to those steps or module or the unit clearly listed, and can also include unclear
The step of list or module or unit, it is also possible to include its intrinsic for these processes, method, device, terminal or system
Its step or module or unit.
The embodiment of the present invention provides a kind of document protection method, device and terminal, is described in detail respectively below.
The embodiment of the present invention provides a kind of document protection method, and this document guard method is can apply in terminal, the end
End can be the equipment such as smart mobile phone, panel computer.
As shown in figure 1, this document guard method, may comprise steps of:
S110, when detecting file and being run, the decryption information of receiving user's input.
In practical application, when user by application program to open file when, terminal can detect the text that user selectes
Part is run.This document can be any type of file.For example, this document can be document files, and this document can also be
Photo files.This document includes the encryption information being encrypted to this document.Now, terminal can ask user input to be decrypted
Information.The decryption information is for being decrypted to this document.When decryption verification passes through, this document normally can be run;When
Decryption verification is obstructed out-of-date, and this document normally cannot be run, or cannot normally show file content after operation.The decryption information
Type it is identical with the type of the encryption information.The decryption information includes but is not limited to encrypted message, finger print information, iris letter
Breath, user's face feature etc..Terminal can pass through the encrypted message of physical button or touch-screen receiving user's input, can pass through
The finger print information of fingerprint sensor receiving user's input, can also gather the iris information or user's face of user by camera
Feature etc..
S120, the decryption information is compared with the encryption information in this document, to obtain comparative result.
In practical application, after terminal receives the decryption information of user input, the encryption information in this document can be transferred,
The decryption information is compared with the encryption information, to obtain comparative result.The comparative result can be the decryption information with
Whether the message length of the encryption information identical, or the similarity of the decryption information and the encryption information, namely the solution
The matching degree of confidential information and the encryption information.
According to the comparative result, S130, judges whether the decryption information is abnormal.
In practical application, after terminal obtains the comparative result of decryption information and encryption information, judged according to the comparative result
Whether the decryption information is abnormal.Generally, the owner (i.e. the owner of the terminal) of terminal possesses control to the terminal.In terminal
The file that the file of storage is stored by owner.Encryption information in file is the encryption information that owner is arranged.Owner is right
In file, the content of encryption information is that clearly, and other people (in addition to owners other people) is unclear to the content of the encryption information
Chu.Therefore, there is very big difference in the decryption information of owner's input and other people decryption informations of input.When other people are defeated
When entering decryption information, now it is considered that the decryption information is abnormal.
In certain embodiments, the encryption information includes Crypted password, and the decryption information includes clear crytpographic key.Such as Fig. 2 institutes
Show, the decryption information is compared with the encryption information in this document, may comprise steps of with obtaining comparative result:
S121, length of the length of clear crytpographic key with Crypted password is compared, to obtain comparative result.
Judge whether the decryption information may comprise steps of extremely according to the comparative result:
S131, when the length that the comparative result is the clear crytpographic key is different from the length of the Crypted password, is judged as this
Decryption information exception.
Wherein, Password Length can be the digit of password.For example, Crypted password can be 10 bit digitals, or 10
Bit digital and alphabetical combination, now Password Length is all 10 digits.After terminal receives the clear crytpographic key of user input, should
Clear crytpographic key is compared with the Crypted password in this document.In practical application, the Crypted password in file is that owner sets
Put.When owner is input into clear crytpographic key, the clear crytpographic key is correct under normal circumstances, namely with the Crypted password is
Identical.Even if the clear crytpographic key of owner's input is incorrect, the length of the clear crytpographic key and the length of the Crypted password
It is identical.And when other people are input into clear crytpographic key, the clear crytpographic key is incorrect, and the clear crytpographic key under normal circumstances
Length be also different from the length of the Crypted password.Therefore, when in the length and file of the clear crytpographic key that terminal is received
When the length of Crypted password is different, other people are now may be considered in illegal decryption, therefore be may determine that as the solution secret letter
Breath is abnormal.For example, the length of the Crypted password in file is 10 digits, and the length of the clear crytpographic key of user input is 8 digits
When, it can be determined that for decryption information exception.
Further, when the length of the clear crytpographic key that terminal is received is identical with the length of Crypted password in file, eventually
Whether the clear crytpographic key is further compared at end identical with the Crypted password.When clear crytpographic key is different from Crypted password, terminal can
To ask user to re-enter clear crytpographic key.When the clear crytpographic key that user is continuously input into several times is all different from Crypted password, this
When it is also assumed that being other people in illegal decryption, it can be determined that for decryption information exception.For example, when user it is continuous 3 times it is defeated
When the clear crytpographic key that enters is all incorrect, it can be determined that for decryption information exception.
In certain embodiments, the decryption information includes the first biological characteristic, and the encryption information includes the second biological characteristic.
As shown in figure 3, the decryption information is compared with the encryption information in this document, with obtain comparative result can include it is following
Step:
S122, first biological characteristic is matched with second biological characteristic, to obtain matching degree.
Judge whether the decryption information may comprise steps of extremely according to the comparative result:
S132, when the matching degree is less than predetermined threshold value, is judged as the decryption information exception.
Wherein, the first biological characteristic can include finger print information, iris information, user's face feature.Second biological characteristic
Finger print information, iris information, user's face feature can be included.The information type phase of the first biological characteristic and the second biological characteristic
Together.Predetermined threshold value can prestore a percentage in the terminal.For example, predetermined threshold value can be 60%.Terminal connects
After receiving the first biological characteristic of user input, the second biological characteristic in first biological characteristic and this document is carried out
Match somebody with somebody.In practical application, the second biological characteristic is that owner is arranged, namely second biological characteristic is the biology of owner
Feature.When owner is input into the first biological characteristic, first biological characteristic and second biological characteristic are identicals, namely
First biological characteristic is very high with the matching degree of second biological characteristic.And when other people are input into the first biological characteristic, this first
Biological characteristic is very low with the matching degree of second biological characteristic.Therefore, when the matching result that terminal is obtained is the first biological characteristic
When predetermined threshold value is less than with the matching degree of the second biological characteristic, now may be considered other people illegally cracking encryption information, because
This is may determine that as the decryption information exception.For example, the finger print information for including with file when the finger print information of user input
When matching degree is less than 60%, it can be determined that for decryption information exception.
If so, this document is then transferred to preset memory locations by S140.
Wherein, preset memory locations can be the storage location that user pre-sets.For example, preset memory locations can be
Storage region on the webserver.When judging in S130 that decryption information is abnormal, this document is transmitted by terminal by network
To preset memory locations, and delete this document being stored in terminal memory.For example, this document can be transferred to use by terminal
In the Dropbox that family is specified, and delete this document being stored in terminal memory.If desired pass through terminal during network transmission file
Not connected network, now terminal can be connected automatically to network, complete file transmission after disconnect network connection again.
Referring to figs. 2 and 3, in certain embodiments, the decryption information is compared with the encryption information in this document,
Before the step of to obtain comparative result, this document guard method can also be comprised the following steps:
S150, judges whether this document is default file;
If so, then the decryption information is compared with the encryption information in this document, to obtain comparative result.
In practical application, default file can be certain that the file that user pre-sets, or user pre-set
The file of type.For example, the default file can be the communication that the preassigned photo of user, or user are arranged
The file of the types such as record, note, can also be the file of the photo type that user is arranged.When terminal detects file and is run,
Judge whether this document is default file.For example, file of the default file for photo type, when user opens certain photo,
Terminal may determine that the photo that user opens is default file.When it is default file to be judged as this document, terminal will be used
The decryption information of family input is compared with the encryption information in this document, to obtain comparative result.
In certain embodiments, this document is transferred to after preset memory locations, this document guard method can also include
Following steps:
S160, obtains default communications identification;
S170, to the default communications identification, corresponding user sends announcement information.
Wherein, default communications identification can be that user pre-sets and is stored in the communications identification in terminal memory.In advance
If communications identification can include telephone number, email address and bitcom account etc..This document is transferred to default by terminal
After storage location, acquisition is stored in default communications identification in terminal memory, and to the default communications identification, corresponding user sends out
Send announcement information.The announcement information is used to make the user know this document failover events.The content of the announcement information can include
This document transfer after storage location, transfer this document time and transfer this document the reason for etc..
When being embodied as, the present invention is not limited by the execution sequence of each described step, is not producing conflict
In the case of, some steps can also be sequentially carried out or while be carried out using other.
From the foregoing, it will be observed that document protection method provided in an embodiment of the present invention, when detecting file and being run, receive user
The decryption information of input;The decryption information is compared with the encryption information in this document, to obtain comparative result;According to this
Comparative result judges whether the decryption information is abnormal;If so, this document is transferred to into preset memory locations then.The program is in user
It is after input decryption information, whether different to judge the decryption information with the comparative result of encryption information in file by the decryption information
Often, when decryption information is abnormal, this document is shifted, can be at other people to encrypting transfer text when file is illegally cracked
Part, it is to avoid the private file of user is illegally obtained so as to cause user privacy information to reveal by other people, such that it is able to improve terminal
Information Security.
The embodiment of the present invention also provides a kind of file protection device, the device can with it is integrated in the terminal, the terminal can be with
It is the equipment such as smart mobile phone, panel computer.
As shown in figure 4, file protection device 200 can include:Receiver module 201, comparison module 202, first judge mould
Block 203, shift module 204.
The receiver module 201, for when detecting file and being run, the decryption information of receiving user's input.
In practical application, when user by application program to open file when, terminal can detect the text that user selectes
Part is run.This document can be any type of file.For example, this document can be document files, and this document can also be
Photo files.This document includes the encryption information being encrypted to this document.Now, terminal can ask user input to be decrypted
Information, the decryption information of 201 receiving user's input of receiver module.The decryption information is for being decrypted to this document.Work as decryption
When being verified, this document normally can be run;When decryption verification is obstructed out-of-date, this document normally cannot be run, or fortune
File content cannot be normally shown after row.The type of the decryption information is identical with the type of the encryption information.The decryption information bag
Include but be not limited to encrypted message, finger print information, iris information, user's face feature etc..Receiver module 201 can be pressed by physics
The encrypted message of key or touch-screen receiving user's input, can pass through the finger print information of fingerprint sensor receiving user's input, also
Iris information or user's face feature of user etc. can be gathered by camera.
The comparison module 202, for the decryption information is compared with the encryption information in this document, to be compared
As a result.
In practical application, after receiver module 201 receives the decryption information of user input, terminal can be transferred in this document
Encryption information, the decryption information is compared by comparison module 202 with the encryption information, to obtain comparative result.This compares
As a result can be the decryption information whether identical with the message length of the encryption information, or the decryption information and the encryption
The similarity of information, namely the matching degree of the decryption information and the encryption information.
First judge module 203, for judging whether the decryption information is abnormal according to the comparative result.
In practical application, after comparison module 202 obtains the comparative result of decryption information and encryption information, the first judge module
According to the comparative result, 203 judge whether the decryption information is abnormal.Generally, the encryption information in file is the encryption that owner is arranged
Information.Owner is that clearly, and other people contents to the encryption information are unclear to the content of encryption information in file
's.Therefore, there is very big difference in the decryption information of owner's input and other people decryption informations of input.When other people are input into
During decryption information, now it is considered that the decryption information is abnormal.
In certain embodiments, the encryption information includes Crypted password, and the decryption information includes clear crytpographic key.This compares mould
Block 202 is used for:
Length of the length of clear crytpographic key with Crypted password is compared, to obtain comparative result.
First judge module 203 is used for:
When the length that the comparative result is the clear crytpographic key is different from the length of the Crypted password, it is judged as the solution secret letter
Breath is abnormal.
Wherein, Password Length can be the digit of password.For example, Crypted password can be 10 bit digitals, or 10
Bit digital and alphabetical combination, now Password Length is all 10 digits.Receiver module 201 receives the clear crytpographic key of user input
Afterwards, the clear crytpographic key is compared by comparison module 202 with the Crypted password in this document.When the length and text of the clear crytpographic key
When the length of Crypted password is different in part, other people are now may be considered in illegal decryption, now the first judge module 203
May determine that as the decryption information exception.For example, the length of the Crypted password in file is 10 digits, and the decryption of user input
When the length of password is 8 digit, it can be determined that for decryption information exception.
Further, when the clear crytpographic key that receiver module 201 is received length and Crypted password in file length phase
Meanwhile, whether comparison module 202 further compares the clear crytpographic key identical with the Crypted password.When clear crytpographic key and Crypted password
When different, terminal can ask user to re-enter clear crytpographic key.The clear crytpographic key being continuously input into several times as user all with encryption
When password is different, now it is also assumed that be other people in illegal decryption, the first judge module 203 is may determine that to solve secret letter
Breath is abnormal.For example, when the clear crytpographic key of continuous 3 inputs of user is all incorrect, it can be determined that for decryption information exception.
In certain embodiments, the decryption information includes the first biological characteristic, and the encryption information includes the second biological characteristic.
The comparison module 202 is used for:
First biological characteristic is matched with second biological characteristic, to obtain matching degree.
First judge module 203 is used for:
When the matching degree is less than predetermined threshold value, it is judged as the decryption information exception.
Wherein, the first biological characteristic can include finger print information, iris information, user's face feature.Second biological characteristic
Finger print information, iris information, user's face feature can be included.The information type phase of the first biological characteristic and the second biological characteristic
Together.Predetermined threshold value can prestore a percentage in the terminal.For example, predetermined threshold value can be 60%.Receive mould
After block 201 receives the first biological characteristic of user input, comparison module 202 is by the in first biological characteristic and this document
Two biological characteristics are matched.When the matching result that comparison module 202 is obtained is the first biological characteristic and the second biological characteristic
When matching degree is less than predetermined threshold value, other people are now may be considered illegally cracking encryption information, the first judge module 203 can be with
It is judged as the decryption information exception.For example, the matching degree of the finger print information for including with file when the finger print information of user input
During less than 60%, it can be determined that for decryption information exception.
The shift module 204, for when the judge module 203 is judged as YES, this document being transferred to default storage position
Put.
Wherein, preset memory locations can be the storage location that user pre-sets.For example, preset memory locations can be
Storage region on the webserver.When the first judge module 203 judges that decryption information is abnormal, shift module 204 passes through
This document is transferred to preset memory locations by network, and deletes this document being stored in terminal memory.For example, shift module
204 can be transferred to this document in the Dropbox that user specifies, and delete this document being stored in terminal memory.If desired
Network is not connected with by terminal during network transmission file, now terminal can be connected automatically to network, is completed after file is transmitted again
Disconnect network connection.
In certain embodiments, as shown in figure 5, file protection device 200 can also include:Second judge module 205.
Second judge module 205, for judging whether this document is default file;
The comparison module 202, for when second judge module 205 is judged as YES, by the decryption information and this document
In encryption information be compared, to obtain comparative result.
In practical application, default file can be certain that the file that user pre-sets, or user pre-set
The file of type.For example, the default file can be the communication that the preassigned photo of user, or user are arranged
The file of the types such as record, note, can also be the file of the photo type that user is arranged.When terminal detects file and is run,
Second judge module 205 judges whether this document is default file.For example, default file is the file of photo type, works as user
When opening certain photo, the second judge module 205 may determine that the photo that user opens is default file.When the second judgement
Module 205 is judged as this document when being default file, comparison module 202 by the decryption information of user input and this document plus
Confidential information is compared, to obtain comparative result.
In certain embodiments, as shown in fig. 6, this document protection device 200 also includes:Acquisition module 206, sending module
207。
The acquisition module 206, for obtaining default communications identification;
The sending module 207, for sending announcement information to the corresponding user of the default communications identification.
Wherein, default communications identification can be that user pre-sets and is stored in the communications identification in terminal memory.In advance
If communications identification can include telephone number, email address and bitcom account etc..This document is shifted by shift module 204
To after preset memory locations, acquisition module 206 obtains the default communications identification being stored in terminal memory, sending module 207
To the default communications identification, corresponding user sends announcement information.The announcement information is used to make the user know this document transfer thing
Part.The content of the announcement information can include that the storage location after this document transfer, the time of transfer this document and transfer should
The reason for file etc..
When being embodied as, above modules can be realized as independent entity, it is also possible to be combined, and made
Realize for same or several entities.
From the foregoing, it will be observed that file protection device provided in an embodiment of the present invention, when terminal detects file and is run, passes through
The decryption information of 201 receiving user's input of receiver module;Comparison module 202 is by the encryption information in the decryption information and this document
It is compared, to obtain comparative result;According to the comparative result, first judge module 203 judges whether the decryption information is abnormal;
This document is transferred to preset memory locations when the judged result of first judge module 203 is to be by shift module 204.Should
Scheme judges the decryption by the comparative result of encryption information in the decryption information and file after user input decryption information
Whether information is abnormal, when decryption information is abnormal, this document is shifted, and can illegally be broken to encrypting file at other people
The staged files during solution, it is to avoid the private file of user is illegally obtained so as to cause user privacy information to reveal by other people, so as to can
To improve the Information Security of terminal.
The embodiment of the present invention also provides a kind of terminal, and the terminal can be the equipment such as smart mobile phone, panel computer.
As shown in fig. 7, terminal 300 can include:Receiver module 301, comparison module 302, the first judge module 303, turn
Shifting formwork block 304.
The receiver module 301, for when detecting file and being run, the decryption information of receiving user's input;
The comparison module 302, for the decryption information is compared with the encryption information in this document, to be compared
As a result;
First judge module 303, for judging whether the decryption information is abnormal according to the comparative result;
The shift module 304, for when the judge module is judged as YES, this document being transferred to preset memory locations.
In certain embodiments, the decryption information includes clear crytpographic key, and the encryption information includes Crypted password, and this compares mould
Block 302 is used for:
Length of the length of the clear crytpographic key with the Crypted password is compared, to obtain comparative result;
First judge module 303 is used for:
When the length that the comparative result is the clear crytpographic key is different from the length of the Crypted password, it is judged as the solution secret letter
Breath is abnormal.
In certain embodiments, the decryption information includes the first biological characteristic, and the encryption information includes the second biological characteristic,
The comparison module 302 is used for:
First biological characteristic is matched with second biological characteristic, to obtain matching degree;
First judge module 303 is used for:
When the matching degree is less than predetermined threshold value, it is judged as the decryption information exception.
In certain embodiments, terminal 300 also includes:Second judge module.
Second judge module, for judging whether this document is default file;
The comparison module 302, for when second judge module is judged as YES, by the decryption information and this document
Encryption information is compared, to obtain comparative result.
In certain embodiments, terminal 300 also includes:Acquisition module, sending module.
The acquisition module, for obtaining default communications identification;
The sending module, for sending announcement information to the corresponding user of the default communications identification.
The embodiment of the present invention also provides another kind of terminal, as shown in figure 8, the terminal 400 can include radio frequency (RF, Radio
Frequency) circuit 401, include the memory 402, input block of one or more computer-readable recording mediums
403rd, display unit 404, sensor 405, voicefrequency circuit 406, Wireless Fidelity (WiFi, Wireless Fidelity) module
407th, processor 408, and the part such as power supply 409 of one or more than one processing core are included.People in the art
Member it is appreciated that in Fig. 8 the terminal structure that illustrates not structure paired terminal restriction, can include more more or less of than illustrating
Part, or some parts are combined, or different part arrangements.
Radio circuit 401 can be communicated with the network equipment or other electronic equipments by radio communication, complete to set with network
Information transmit-receive between standby or other electronic equipments.
Memory 402 can be used to store application program and data.Include and can hold in the application program of the storage of memory 402
Line program code.Application program can constitute various functions module.Processor 408 is stored in answering for memory 402 by operation
With program, so as to perform various function application and data processing.
Input block 403 can be used for numeral, character information or the user's characteristic information (such as fingerprint) of receives input, and
Produce the keyboard relevant with user's setting and function control, mouse, action bars, optics or trace ball signal input.Wherein,
Input block 403 can include fingerprint recognition module.In certain embodiments, input block 403 can also include Touch sensitive surface.
Touch sensitive surface, also referred to as touch-screen or Trackpad, can collect user thereon or neighbouring touch operation (such as user's use
Any suitable object such as finger, stylus or operation of the annex on Touch sensitive surface or near Touch sensitive surface), and according to advance
The formula of setting drives corresponding attachment means.
Display unit 404 can be used for show by user input information or be supplied to user information and terminal it is various
Graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its any combination.
Terminal may also include at least one sensor 405, such as optical sensor, motion sensor and other sensors.
Voicefrequency circuit 406 can pass through loudspeaker, microphone and provide the COBBAIF between user and terminal.Voicefrequency circuit
The voice data for receiving can be converted into electric signal by 406, be transferred to loudspeaker, be converted to voice signal output by loudspeaker.
On the other hand, the voice signal of collection is converted to electric signal by microphone, and audio frequency number is converted to after being received by voicefrequency circuit 406
According to, then voice data output is processed to processor 408.
Wireless Fidelity (WiFi) belongs to short range wireless transmission technology, and terminal can be with which by wireless fidelity module 407
His terminal or server are communicated.
Processor 408 is the control centre of terminal, using various interfaces and the various pieces of the whole terminal of connection, is led to
Cross operation or perform the application program being stored in memory 402, and call the data being stored in memory 402, perform
The various functions and processing data of terminal, so as to carry out integral monitoring to terminal.
Terminal also includes the power supply 409 (such as battery) powered to all parts.In certain embodiments, power supply can lead to
Cross power-supply management system logically contiguous with processor 408, so as to by power-supply management system realize management charge, electric discharge, and
The functions such as power managed.
Although not shown in Fig. 8, terminal can also include camera, bluetooth module etc., will not be described here.
In the present embodiment, the processor 408 in terminal can be according to following instruction, by one or more application
The corresponding executable program code of process of program is loaded in memory 402, and is stored in storage to run by processor 408
Application program in device 402, so as to realize various functions:
When detecting file and being run, the decryption information of receiving user's input;
The decryption information is compared with the encryption information in this document, to obtain comparative result;
Judge whether the decryption information is abnormal according to the comparative result;
If so, this document is transferred to into preset memory locations then.
In certain embodiments, the encryption information includes Crypted password, and the decryption information includes clear crytpographic key, processor
The decryption information is compared by 408 with the encryption information in this document, to obtain during comparative result, for by the clear crytpographic key
Length be compared with the length of the Crypted password, to obtain comparative result.The decryption information is judged according to the comparative result
When whether abnormal, for when the length that the comparative result is the clear crytpographic key is different from the length of the Crypted password, being judged as
The decryption information exception.
In certain embodiments, the decryption information includes the first biological characteristic, and the encryption information includes the second biological characteristic,
The decryption information is compared by processor 408 with the encryption information in this document, to obtain during comparative result, for by this
One biological characteristic is matched with second biological characteristic, to obtain matching degree.The decryption information is judged according to the comparative result
When whether abnormal, for when the matching degree is less than predetermined threshold value, being judged as the decryption information exception.
In certain embodiments, the decryption information is compared with the encryption information in this document, to obtain comparing knot
Before fruit, processor 408 is additionally operable to judge whether this document is default file, if so, then by the decryption information and this document
Encryption information is compared, to obtain comparative result.
In certain embodiments, this document is transferred to after preset memory locations, processor 408 is additionally operable to obtain default logical
News mark, to the default communications identification, corresponding user sends announcement information.
In above-described embodiment, the description to each embodiment all emphasizes particularly on different fields, and is not described in some embodiments
Part, may refer to before detailed description to document protection method, will not be described here.
From the foregoing, it will be observed that embodiments provide a kind of terminal, when detecting file and being run, receiving user's input
Decryption information;The decryption information is compared with the encryption information in this document, to obtain comparative result;Compared according to this
As a result judge whether the decryption information is abnormal;If so, this document is transferred to into preset memory locations then.The program is in user input
It is after decryption information, whether abnormal to judge the decryption information with the comparative result of encryption information in file by the decryption information,
When decryption information is abnormal, this document is shifted, can at other people to encrypting the staged files when file is illegally cracked,
The private file of user is avoided illegally to be obtained so as to cause user privacy information to reveal by other people, such that it is able to improve the letter of terminal
Breath security.
It should be noted that one of ordinary skill in the art will appreciate that whole in the various methods of above-described embodiment or
Part steps can be by program to instruct the hardware of correlation to complete, and the program can be stored in computer-readable storage medium
In matter, storage medium can include:Read-only storage (ROM, Read Only Memory), random access memory (RAM,
Random Access Memory), disk or CD etc..
A kind of document protection method, device and the terminal for being provided to the embodiment of the present invention above is described in detail,
Specific case used herein is set forth to the principle and embodiment of the present invention, and the explanation of above example is simply used
The method of the present invention and its core concept are understood in help;Simultaneously for those skilled in the art, according to the think of of the present invention
Think, will change in specific embodiments and applications, in sum, it is right that this specification content should not be construed as
The restriction of the present invention.
Claims (11)
1. a kind of document protection method, it is characterised in that include:
When detecting file and being run, the decryption information of receiving user's input;
The decryption information is compared with the encryption information in the file, to obtain comparative result;
Judge whether the decryption information is abnormal according to the comparative result;
If so, the file is transferred to into preset memory locations then.
2. document protection method according to claim 1, it is characterised in that the decryption information includes clear crytpographic key, institute
Stating encryption information includes Crypted password, described that the decryption information is compared with the encryption information in the file, with
The step of to comparative result, includes:
Length of the length of the clear crytpographic key with the Crypted password is compared, to obtain comparative result;
It is described to judge whether abnormal step includes the decryption information according to the comparative result:
When the length that the comparative result is the clear crytpographic key is different from the length of the Crypted password, it is judged as the solution
Confidential information exception.
3. document protection method according to claim 1, it is characterised in that the decryption information includes that first is biological special
Levy, the encryption information includes the second biological characteristic, described that the decryption information is carried out with the encryption information in the file
Relatively, to obtain comparative result the step of, includes:
First biological characteristic is matched with second biological characteristic, to obtain matching degree;
It is described to judge whether abnormal step includes the decryption information according to the comparative result:
When the matching degree is less than predetermined threshold value, it is judged as the decryption information exception.
4. document protection method according to claim 1, it is characterised in that described by the decryption information and the file
In encryption information be compared, the step of to obtain comparative result before, the document protection method also includes:
Judge whether the file is default file;
If so, then perform and the decryption information is compared with the encryption information in the file, to obtain comparative result
Step.
5. document protection method according to claim 1, it is characterised in that described that the file is transferred to into default storage
After the step of position, the document protection method also includes:
Obtain default communications identification;
To the default communications identification, corresponding user sends announcement information.
6. a kind of file protection device, it is characterised in that include:
Receiver module, for when detecting file and being run, the decryption information of receiving user's input;
Comparison module, for the decryption information is compared with the encryption information in the file, to obtain comparative result;
First judge module, for judging whether the decryption information is abnormal according to the comparative result;
Shift module, for when the judge module is judged as YES, the file being transferred to preset memory locations.
7. file protection device according to claim 6, it is characterised in that the decryption information includes clear crytpographic key, institute
Stating encryption information includes Crypted password, and the comparison module is used for:
Length of the length of the clear crytpographic key with the Crypted password is compared, to obtain comparative result;
First judge module is used for:
When the length that the comparative result is the clear crytpographic key is different from the length of the Crypted password, it is judged as the solution
Confidential information exception.
8. file protection device according to claim 6, it is characterised in that the decryption information includes that first is biological special
Levy, the encryption information includes the second biological characteristic, the comparison module is used for:
First biological characteristic is matched with second biological characteristic, to obtain matching degree;
First judge module is used for:
When the matching degree is less than predetermined threshold value, it is judged as the decryption information exception.
9. file protection device according to claim 6, it is characterised in that the file protection device also includes:
Second judge module, for judging whether the file is default file;
The comparison module, for when second judge module is judged as YES, by the decryption information and the file
Encryption information be compared, to obtain comparative result.
10. file protection device according to claim 6, it is characterised in that the file protection device also includes:
Acquisition module, for obtaining default communications identification;
Sending module, for sending announcement information to the corresponding user of the default communications identification.
11. a kind of terminals, it is characterised in that include:
Touch-screen, for the touch operation of receive user;
Be stored with the memory of executable program code;
The processor coupled with the memory;
The executable program code that the processor is stored in calling the memory, performs as appointed in claim 1 to 5
Document protection method described in one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611085034.0A CN106529319A (en) | 2016-11-30 | 2016-11-30 | File protection method and device, and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611085034.0A CN106529319A (en) | 2016-11-30 | 2016-11-30 | File protection method and device, and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106529319A true CN106529319A (en) | 2017-03-22 |
Family
ID=58353794
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611085034.0A Pending CN106529319A (en) | 2016-11-30 | 2016-11-30 | File protection method and device, and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106529319A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018176176A1 (en) * | 2017-04-01 | 2018-10-04 | 福建福昕软件开发股份有限公司 | Method for automatically giving alarm after encrypted document is leaked |
CN111767529A (en) * | 2020-05-18 | 2020-10-13 | 广州视源电子科技股份有限公司 | File encryption method, file decryption method, storage medium and electronic device |
CN115118751A (en) * | 2022-07-15 | 2022-09-27 | 广东浪潮智慧计算技术有限公司 | Block chain-based supervision system, method, equipment and medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101252703A (en) * | 2008-03-28 | 2008-08-27 | 宇龙计算机通信科技(深圳)有限公司 | Terminal data protecting method, system as well as mobile communication terminal |
CN101610500A (en) * | 2009-07-23 | 2009-12-23 | 中兴通讯股份有限公司 | Mobile phone data retrieving method, mobile phone and mobile phone data retrieving system |
CN103024158A (en) * | 2012-11-28 | 2013-04-03 | 广东欧珀移动通信有限公司 | Mobile phone with fingerprint identification function |
CN103455737A (en) * | 2012-05-28 | 2013-12-18 | 百度在线网络技术(北京)有限公司 | User information protection method and device |
CN104239805A (en) * | 2014-08-29 | 2014-12-24 | 广东欧珀移动通信有限公司 | Mobile phone antitheft method and device |
CN105809013A (en) * | 2014-12-31 | 2016-07-27 | 富泰华工业(深圳)有限公司 | Information security protection device and method |
CN106022160A (en) * | 2016-05-13 | 2016-10-12 | 北京小米移动软件有限公司 | Method and apparatuses for deleting user data |
-
2016
- 2016-11-30 CN CN201611085034.0A patent/CN106529319A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101252703A (en) * | 2008-03-28 | 2008-08-27 | 宇龙计算机通信科技(深圳)有限公司 | Terminal data protecting method, system as well as mobile communication terminal |
CN101610500A (en) * | 2009-07-23 | 2009-12-23 | 中兴通讯股份有限公司 | Mobile phone data retrieving method, mobile phone and mobile phone data retrieving system |
CN103455737A (en) * | 2012-05-28 | 2013-12-18 | 百度在线网络技术(北京)有限公司 | User information protection method and device |
CN103024158A (en) * | 2012-11-28 | 2013-04-03 | 广东欧珀移动通信有限公司 | Mobile phone with fingerprint identification function |
CN104239805A (en) * | 2014-08-29 | 2014-12-24 | 广东欧珀移动通信有限公司 | Mobile phone antitheft method and device |
CN105809013A (en) * | 2014-12-31 | 2016-07-27 | 富泰华工业(深圳)有限公司 | Information security protection device and method |
CN106022160A (en) * | 2016-05-13 | 2016-10-12 | 北京小米移动软件有限公司 | Method and apparatuses for deleting user data |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018176176A1 (en) * | 2017-04-01 | 2018-10-04 | 福建福昕软件开发股份有限公司 | Method for automatically giving alarm after encrypted document is leaked |
CN111767529A (en) * | 2020-05-18 | 2020-10-13 | 广州视源电子科技股份有限公司 | File encryption method, file decryption method, storage medium and electronic device |
CN115118751A (en) * | 2022-07-15 | 2022-09-27 | 广东浪潮智慧计算技术有限公司 | Block chain-based supervision system, method, equipment and medium |
CN115118751B (en) * | 2022-07-15 | 2024-04-19 | 广东浪潮智慧计算技术有限公司 | Blockchain-based supervision system, method, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6649411B2 (en) | Method and apparatus for enabling a touch screen display of a mobile device | |
US11394555B2 (en) | Mobile terminal privacy protection method and protection apparatus, and mobile terminal | |
US20150089666A1 (en) | Apparatus and method for protecting privacy in terminal | |
CN105513179A (en) | Unlocking method and device, as well as intelligent lock | |
CN104992092A (en) | Method, device and system for fingerprint information verification | |
CN106095220B (en) | Notification message reminding method and device | |
JP2007179343A (en) | Information processor with security function and program | |
CN108369618A (en) | A kind of fingerprint identification method and terminal device | |
JP2019510303A (en) | Icon processing method and apparatus for application | |
CN106778295A (en) | File storage, display methods, device and terminal | |
CN104298902B (en) | A kind of display methods of application program, device and equipment | |
CN106951757A (en) | A kind of method and apparatus for operating application program | |
CN107045604A (en) | Information processing method and device | |
CN106529319A (en) | File protection method and device, and terminal | |
CN102402651B (en) | Information protection device and method and portable terminal | |
CN105681365B (en) | Method and apparatus for file transmission | |
TW201826158A (en) | Method, Device and Terminal for Displaying Data | |
CN106845199A (en) | Object authentication method and device | |
CN105912922A (en) | Information management method and device, and terminal | |
WO2019090702A1 (en) | Terminal security protection method and device | |
CN105069344A (en) | Mobile terminal locking method and apparatus | |
TW201833759A (en) | Contact information display method and device, and information display method and device | |
CN105430090A (en) | Information push method and device | |
JP2004229240A (en) | Portable telephone | |
CN106357413A (en) | Method for encrypting numbers with fingerprint and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170322 |
|
RJ01 | Rejection of invention patent application after publication |