CN106529319A - File protection method and device, and terminal - Google Patents

File protection method and device, and terminal Download PDF

Info

Publication number
CN106529319A
CN106529319A CN201611085034.0A CN201611085034A CN106529319A CN 106529319 A CN106529319 A CN 106529319A CN 201611085034 A CN201611085034 A CN 201611085034A CN 106529319 A CN106529319 A CN 106529319A
Authority
CN
China
Prior art keywords
file
information
decryption information
comparative result
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611085034.0A
Other languages
Chinese (zh)
Inventor
任利宽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201611085034.0A priority Critical patent/CN106529319A/en
Publication of CN106529319A publication Critical patent/CN106529319A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The embodiment of the invention provides a file protection method and device, and a terminal. The method comprises the following steps of: when a file is detected to operate, receiving decryption information input by a user; comparing the decryption information with encryption information in the file to obtain a comparison result; according to the comparison result, judging whether the decryption information is abnormal or not; and if the decryption information is abnormal, transferring the file to a preset storage position. By use of the scheme, after the user inputs the decryption information, whether the decryption information is abnormal or not is judged through the comparison result of the decryption information and the encryption information in the file, and the file is transferred when the decryption information is abnormal. When other people carry out illegal cracking on an encrypted file, the file can be transferred, and a phenomenon that the private file of the user is illegally obtained by other people so as to cause the leakage of the private information of the user is avoided so as to improve the information security of the terminal.

Description

Document protection method, device and terminal
Technical field
The present invention relates to field of information security technology, more particularly to a kind of document protection method, device and terminal.
Background technology
With the development of terminal technology, degree of dependence more and more higher of the user to terminals such as smart mobile phones, terminal Memory space is also increasing.User can store various information in the terminal.For example, user can store sound in the terminal The multimedia messages such as pleasure, video, can be with privacy informations such as memory communicating record, notes.
On the other hand, due to the portability of terminal, terminal is generally carried with by user.And user's portable terminal When, the situation that the storage device (such as storage card) in terminal generation loss or terminal is lost happens occasionally.Once terminal or Storage device in terminal is lost, and the information of user's storage is easily known by other people, causes user privacy information to reveal.
So as to current terminal cannot be effectively protected to the information of user's storage, cause the information security of terminal Property is low.
The content of the invention
The embodiment of the present invention provides a kind of document protection method, device and terminal, can improve the Information Security of terminal.
The embodiment of the present invention provides a kind of document protection method, including:
When detecting file and being run, the decryption information of receiving user's input;
The decryption information is compared with the encryption information in this document, to obtain comparative result;
Judge whether the decryption information is abnormal according to the comparative result;
If so, this document is transferred to into preset memory locations then.
Accordingly, the embodiment of the present invention also provides a kind of file protection device, including:
Receiver module, for when detecting file and being run, the decryption information of receiving user's input;
Comparison module, for the decryption information is compared with the encryption information in this document, to obtain comparative result;
First judge module, for judging whether the decryption information is abnormal according to the comparative result;
Shift module, for when the judge module is judged as YES, this document being transferred to preset memory locations.
Accordingly, the embodiment of the present invention also provides a kind of terminal, including:
Touch-screen, for the touch operation of receive user;
Be stored with the memory of executable program code;
The processor coupled with the memory;
The executable program code that the processor is stored in calling the memory, performs above-mentioned document protection method.
The embodiment of the present invention when detecting file and being run, the decryption information of receiving user's input;By the decryption information It is compared with the encryption information in this document, to obtain comparative result;Whether the decryption information is judged according to the comparative result It is abnormal;If so, this document is transferred to into preset memory locations then.The program after user input decryption information, by the decryption Information judges with the comparative result of encryption information in file whether the decryption information is abnormal, when decryption information is abnormal, to this File is shifted, can be at other people to encrypting the staged files when file is illegally cracked, it is to avoid the private file quilt of user Other people are illegally obtained so as to cause user privacy information to reveal, such that it is able to improve the Information Security of terminal.
Description of the drawings
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below will be to making needed for embodiment description Accompanying drawing is briefly described.It should be evident that drawings in the following description are only some embodiments of the present invention, for For those skilled in the art, on the premise of not paying creative work, can be attached to obtain others according to these accompanying drawings Figure.
Fig. 1 is the schematic flow sheet of document protection method provided in an embodiment of the present invention.
Fig. 2 is another schematic flow sheet of document protection method provided in an embodiment of the present invention.
Fig. 3 is the another schematic flow sheet of document protection method provided in an embodiment of the present invention.
Fig. 4 is the structural representation of file protection device provided in an embodiment of the present invention.
Fig. 5 is another structural representation of file protection device provided in an embodiment of the present invention.
Fig. 6 is the another structural representation of file protection device provided in an embodiment of the present invention.
Fig. 7 is the structural representation of terminal provided in an embodiment of the present invention.
Fig. 8 is another structural representation of terminal provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described.Obviously, described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on Embodiment in the present invention, the every other enforcement obtained under the premise of creative work is not made by those skilled in the art Example, belongs to the scope of protection of the invention.
Term " first ", " second ", " the 3rd " in description and claims of this specification and above-mentioned accompanying drawing etc. (if present) is for distinguishing similar object, without being used to describe specific order or precedence.It should be appreciated that this The object of sample description can be exchanged in the appropriate case.Additionally, term " comprising " and " having " and their any deformation, meaning Figure is to cover non-exclusive including.For example, the process of series of steps, method are contained or a series of modules or list is contained The device of unit, terminal, system are not necessarily limited to those steps or module or the unit clearly listed, and can also include unclear The step of list or module or unit, it is also possible to include its intrinsic for these processes, method, device, terminal or system Its step or module or unit.
The embodiment of the present invention provides a kind of document protection method, device and terminal, is described in detail respectively below.
The embodiment of the present invention provides a kind of document protection method, and this document guard method is can apply in terminal, the end End can be the equipment such as smart mobile phone, panel computer.
As shown in figure 1, this document guard method, may comprise steps of:
S110, when detecting file and being run, the decryption information of receiving user's input.
In practical application, when user by application program to open file when, terminal can detect the text that user selectes Part is run.This document can be any type of file.For example, this document can be document files, and this document can also be Photo files.This document includes the encryption information being encrypted to this document.Now, terminal can ask user input to be decrypted Information.The decryption information is for being decrypted to this document.When decryption verification passes through, this document normally can be run;When Decryption verification is obstructed out-of-date, and this document normally cannot be run, or cannot normally show file content after operation.The decryption information Type it is identical with the type of the encryption information.The decryption information includes but is not limited to encrypted message, finger print information, iris letter Breath, user's face feature etc..Terminal can pass through the encrypted message of physical button or touch-screen receiving user's input, can pass through The finger print information of fingerprint sensor receiving user's input, can also gather the iris information or user's face of user by camera Feature etc..
S120, the decryption information is compared with the encryption information in this document, to obtain comparative result.
In practical application, after terminal receives the decryption information of user input, the encryption information in this document can be transferred, The decryption information is compared with the encryption information, to obtain comparative result.The comparative result can be the decryption information with Whether the message length of the encryption information identical, or the similarity of the decryption information and the encryption information, namely the solution The matching degree of confidential information and the encryption information.
According to the comparative result, S130, judges whether the decryption information is abnormal.
In practical application, after terminal obtains the comparative result of decryption information and encryption information, judged according to the comparative result Whether the decryption information is abnormal.Generally, the owner (i.e. the owner of the terminal) of terminal possesses control to the terminal.In terminal The file that the file of storage is stored by owner.Encryption information in file is the encryption information that owner is arranged.Owner is right In file, the content of encryption information is that clearly, and other people (in addition to owners other people) is unclear to the content of the encryption information Chu.Therefore, there is very big difference in the decryption information of owner's input and other people decryption informations of input.When other people are defeated When entering decryption information, now it is considered that the decryption information is abnormal.
In certain embodiments, the encryption information includes Crypted password, and the decryption information includes clear crytpographic key.Such as Fig. 2 institutes Show, the decryption information is compared with the encryption information in this document, may comprise steps of with obtaining comparative result:
S121, length of the length of clear crytpographic key with Crypted password is compared, to obtain comparative result.
Judge whether the decryption information may comprise steps of extremely according to the comparative result:
S131, when the length that the comparative result is the clear crytpographic key is different from the length of the Crypted password, is judged as this Decryption information exception.
Wherein, Password Length can be the digit of password.For example, Crypted password can be 10 bit digitals, or 10 Bit digital and alphabetical combination, now Password Length is all 10 digits.After terminal receives the clear crytpographic key of user input, should Clear crytpographic key is compared with the Crypted password in this document.In practical application, the Crypted password in file is that owner sets Put.When owner is input into clear crytpographic key, the clear crytpographic key is correct under normal circumstances, namely with the Crypted password is Identical.Even if the clear crytpographic key of owner's input is incorrect, the length of the clear crytpographic key and the length of the Crypted password It is identical.And when other people are input into clear crytpographic key, the clear crytpographic key is incorrect, and the clear crytpographic key under normal circumstances Length be also different from the length of the Crypted password.Therefore, when in the length and file of the clear crytpographic key that terminal is received When the length of Crypted password is different, other people are now may be considered in illegal decryption, therefore be may determine that as the solution secret letter Breath is abnormal.For example, the length of the Crypted password in file is 10 digits, and the length of the clear crytpographic key of user input is 8 digits When, it can be determined that for decryption information exception.
Further, when the length of the clear crytpographic key that terminal is received is identical with the length of Crypted password in file, eventually Whether the clear crytpographic key is further compared at end identical with the Crypted password.When clear crytpographic key is different from Crypted password, terminal can To ask user to re-enter clear crytpographic key.When the clear crytpographic key that user is continuously input into several times is all different from Crypted password, this When it is also assumed that being other people in illegal decryption, it can be determined that for decryption information exception.For example, when user it is continuous 3 times it is defeated When the clear crytpographic key that enters is all incorrect, it can be determined that for decryption information exception.
In certain embodiments, the decryption information includes the first biological characteristic, and the encryption information includes the second biological characteristic. As shown in figure 3, the decryption information is compared with the encryption information in this document, with obtain comparative result can include it is following Step:
S122, first biological characteristic is matched with second biological characteristic, to obtain matching degree.
Judge whether the decryption information may comprise steps of extremely according to the comparative result:
S132, when the matching degree is less than predetermined threshold value, is judged as the decryption information exception.
Wherein, the first biological characteristic can include finger print information, iris information, user's face feature.Second biological characteristic Finger print information, iris information, user's face feature can be included.The information type phase of the first biological characteristic and the second biological characteristic Together.Predetermined threshold value can prestore a percentage in the terminal.For example, predetermined threshold value can be 60%.Terminal connects After receiving the first biological characteristic of user input, the second biological characteristic in first biological characteristic and this document is carried out Match somebody with somebody.In practical application, the second biological characteristic is that owner is arranged, namely second biological characteristic is the biology of owner Feature.When owner is input into the first biological characteristic, first biological characteristic and second biological characteristic are identicals, namely First biological characteristic is very high with the matching degree of second biological characteristic.And when other people are input into the first biological characteristic, this first Biological characteristic is very low with the matching degree of second biological characteristic.Therefore, when the matching result that terminal is obtained is the first biological characteristic When predetermined threshold value is less than with the matching degree of the second biological characteristic, now may be considered other people illegally cracking encryption information, because This is may determine that as the decryption information exception.For example, the finger print information for including with file when the finger print information of user input When matching degree is less than 60%, it can be determined that for decryption information exception.
If so, this document is then transferred to preset memory locations by S140.
Wherein, preset memory locations can be the storage location that user pre-sets.For example, preset memory locations can be Storage region on the webserver.When judging in S130 that decryption information is abnormal, this document is transmitted by terminal by network To preset memory locations, and delete this document being stored in terminal memory.For example, this document can be transferred to use by terminal In the Dropbox that family is specified, and delete this document being stored in terminal memory.If desired pass through terminal during network transmission file Not connected network, now terminal can be connected automatically to network, complete file transmission after disconnect network connection again.
Referring to figs. 2 and 3, in certain embodiments, the decryption information is compared with the encryption information in this document, Before the step of to obtain comparative result, this document guard method can also be comprised the following steps:
S150, judges whether this document is default file;
If so, then the decryption information is compared with the encryption information in this document, to obtain comparative result.
In practical application, default file can be certain that the file that user pre-sets, or user pre-set The file of type.For example, the default file can be the communication that the preassigned photo of user, or user are arranged The file of the types such as record, note, can also be the file of the photo type that user is arranged.When terminal detects file and is run, Judge whether this document is default file.For example, file of the default file for photo type, when user opens certain photo, Terminal may determine that the photo that user opens is default file.When it is default file to be judged as this document, terminal will be used The decryption information of family input is compared with the encryption information in this document, to obtain comparative result.
In certain embodiments, this document is transferred to after preset memory locations, this document guard method can also include Following steps:
S160, obtains default communications identification;
S170, to the default communications identification, corresponding user sends announcement information.
Wherein, default communications identification can be that user pre-sets and is stored in the communications identification in terminal memory.In advance If communications identification can include telephone number, email address and bitcom account etc..This document is transferred to default by terminal After storage location, acquisition is stored in default communications identification in terminal memory, and to the default communications identification, corresponding user sends out Send announcement information.The announcement information is used to make the user know this document failover events.The content of the announcement information can include This document transfer after storage location, transfer this document time and transfer this document the reason for etc..
When being embodied as, the present invention is not limited by the execution sequence of each described step, is not producing conflict In the case of, some steps can also be sequentially carried out or while be carried out using other.
From the foregoing, it will be observed that document protection method provided in an embodiment of the present invention, when detecting file and being run, receive user The decryption information of input;The decryption information is compared with the encryption information in this document, to obtain comparative result;According to this Comparative result judges whether the decryption information is abnormal;If so, this document is transferred to into preset memory locations then.The program is in user It is after input decryption information, whether different to judge the decryption information with the comparative result of encryption information in file by the decryption information Often, when decryption information is abnormal, this document is shifted, can be at other people to encrypting transfer text when file is illegally cracked Part, it is to avoid the private file of user is illegally obtained so as to cause user privacy information to reveal by other people, such that it is able to improve terminal Information Security.
The embodiment of the present invention also provides a kind of file protection device, the device can with it is integrated in the terminal, the terminal can be with It is the equipment such as smart mobile phone, panel computer.
As shown in figure 4, file protection device 200 can include:Receiver module 201, comparison module 202, first judge mould Block 203, shift module 204.
The receiver module 201, for when detecting file and being run, the decryption information of receiving user's input.
In practical application, when user by application program to open file when, terminal can detect the text that user selectes Part is run.This document can be any type of file.For example, this document can be document files, and this document can also be Photo files.This document includes the encryption information being encrypted to this document.Now, terminal can ask user input to be decrypted Information, the decryption information of 201 receiving user's input of receiver module.The decryption information is for being decrypted to this document.Work as decryption When being verified, this document normally can be run;When decryption verification is obstructed out-of-date, this document normally cannot be run, or fortune File content cannot be normally shown after row.The type of the decryption information is identical with the type of the encryption information.The decryption information bag Include but be not limited to encrypted message, finger print information, iris information, user's face feature etc..Receiver module 201 can be pressed by physics The encrypted message of key or touch-screen receiving user's input, can pass through the finger print information of fingerprint sensor receiving user's input, also Iris information or user's face feature of user etc. can be gathered by camera.
The comparison module 202, for the decryption information is compared with the encryption information in this document, to be compared As a result.
In practical application, after receiver module 201 receives the decryption information of user input, terminal can be transferred in this document Encryption information, the decryption information is compared by comparison module 202 with the encryption information, to obtain comparative result.This compares As a result can be the decryption information whether identical with the message length of the encryption information, or the decryption information and the encryption The similarity of information, namely the matching degree of the decryption information and the encryption information.
First judge module 203, for judging whether the decryption information is abnormal according to the comparative result.
In practical application, after comparison module 202 obtains the comparative result of decryption information and encryption information, the first judge module According to the comparative result, 203 judge whether the decryption information is abnormal.Generally, the encryption information in file is the encryption that owner is arranged Information.Owner is that clearly, and other people contents to the encryption information are unclear to the content of encryption information in file 's.Therefore, there is very big difference in the decryption information of owner's input and other people decryption informations of input.When other people are input into During decryption information, now it is considered that the decryption information is abnormal.
In certain embodiments, the encryption information includes Crypted password, and the decryption information includes clear crytpographic key.This compares mould Block 202 is used for:
Length of the length of clear crytpographic key with Crypted password is compared, to obtain comparative result.
First judge module 203 is used for:
When the length that the comparative result is the clear crytpographic key is different from the length of the Crypted password, it is judged as the solution secret letter Breath is abnormal.
Wherein, Password Length can be the digit of password.For example, Crypted password can be 10 bit digitals, or 10 Bit digital and alphabetical combination, now Password Length is all 10 digits.Receiver module 201 receives the clear crytpographic key of user input Afterwards, the clear crytpographic key is compared by comparison module 202 with the Crypted password in this document.When the length and text of the clear crytpographic key When the length of Crypted password is different in part, other people are now may be considered in illegal decryption, now the first judge module 203 May determine that as the decryption information exception.For example, the length of the Crypted password in file is 10 digits, and the decryption of user input When the length of password is 8 digit, it can be determined that for decryption information exception.
Further, when the clear crytpographic key that receiver module 201 is received length and Crypted password in file length phase Meanwhile, whether comparison module 202 further compares the clear crytpographic key identical with the Crypted password.When clear crytpographic key and Crypted password When different, terminal can ask user to re-enter clear crytpographic key.The clear crytpographic key being continuously input into several times as user all with encryption When password is different, now it is also assumed that be other people in illegal decryption, the first judge module 203 is may determine that to solve secret letter Breath is abnormal.For example, when the clear crytpographic key of continuous 3 inputs of user is all incorrect, it can be determined that for decryption information exception.
In certain embodiments, the decryption information includes the first biological characteristic, and the encryption information includes the second biological characteristic. The comparison module 202 is used for:
First biological characteristic is matched with second biological characteristic, to obtain matching degree.
First judge module 203 is used for:
When the matching degree is less than predetermined threshold value, it is judged as the decryption information exception.
Wherein, the first biological characteristic can include finger print information, iris information, user's face feature.Second biological characteristic Finger print information, iris information, user's face feature can be included.The information type phase of the first biological characteristic and the second biological characteristic Together.Predetermined threshold value can prestore a percentage in the terminal.For example, predetermined threshold value can be 60%.Receive mould After block 201 receives the first biological characteristic of user input, comparison module 202 is by the in first biological characteristic and this document Two biological characteristics are matched.When the matching result that comparison module 202 is obtained is the first biological characteristic and the second biological characteristic When matching degree is less than predetermined threshold value, other people are now may be considered illegally cracking encryption information, the first judge module 203 can be with It is judged as the decryption information exception.For example, the matching degree of the finger print information for including with file when the finger print information of user input During less than 60%, it can be determined that for decryption information exception.
The shift module 204, for when the judge module 203 is judged as YES, this document being transferred to default storage position Put.
Wherein, preset memory locations can be the storage location that user pre-sets.For example, preset memory locations can be Storage region on the webserver.When the first judge module 203 judges that decryption information is abnormal, shift module 204 passes through This document is transferred to preset memory locations by network, and deletes this document being stored in terminal memory.For example, shift module 204 can be transferred to this document in the Dropbox that user specifies, and delete this document being stored in terminal memory.If desired Network is not connected with by terminal during network transmission file, now terminal can be connected automatically to network, is completed after file is transmitted again Disconnect network connection.
In certain embodiments, as shown in figure 5, file protection device 200 can also include:Second judge module 205.
Second judge module 205, for judging whether this document is default file;
The comparison module 202, for when second judge module 205 is judged as YES, by the decryption information and this document In encryption information be compared, to obtain comparative result.
In practical application, default file can be certain that the file that user pre-sets, or user pre-set The file of type.For example, the default file can be the communication that the preassigned photo of user, or user are arranged The file of the types such as record, note, can also be the file of the photo type that user is arranged.When terminal detects file and is run, Second judge module 205 judges whether this document is default file.For example, default file is the file of photo type, works as user When opening certain photo, the second judge module 205 may determine that the photo that user opens is default file.When the second judgement Module 205 is judged as this document when being default file, comparison module 202 by the decryption information of user input and this document plus Confidential information is compared, to obtain comparative result.
In certain embodiments, as shown in fig. 6, this document protection device 200 also includes:Acquisition module 206, sending module 207。
The acquisition module 206, for obtaining default communications identification;
The sending module 207, for sending announcement information to the corresponding user of the default communications identification.
Wherein, default communications identification can be that user pre-sets and is stored in the communications identification in terminal memory.In advance If communications identification can include telephone number, email address and bitcom account etc..This document is shifted by shift module 204 To after preset memory locations, acquisition module 206 obtains the default communications identification being stored in terminal memory, sending module 207 To the default communications identification, corresponding user sends announcement information.The announcement information is used to make the user know this document transfer thing Part.The content of the announcement information can include that the storage location after this document transfer, the time of transfer this document and transfer should The reason for file etc..
When being embodied as, above modules can be realized as independent entity, it is also possible to be combined, and made Realize for same or several entities.
From the foregoing, it will be observed that file protection device provided in an embodiment of the present invention, when terminal detects file and is run, passes through The decryption information of 201 receiving user's input of receiver module;Comparison module 202 is by the encryption information in the decryption information and this document It is compared, to obtain comparative result;According to the comparative result, first judge module 203 judges whether the decryption information is abnormal; This document is transferred to preset memory locations when the judged result of first judge module 203 is to be by shift module 204.Should Scheme judges the decryption by the comparative result of encryption information in the decryption information and file after user input decryption information Whether information is abnormal, when decryption information is abnormal, this document is shifted, and can illegally be broken to encrypting file at other people The staged files during solution, it is to avoid the private file of user is illegally obtained so as to cause user privacy information to reveal by other people, so as to can To improve the Information Security of terminal.
The embodiment of the present invention also provides a kind of terminal, and the terminal can be the equipment such as smart mobile phone, panel computer.
As shown in fig. 7, terminal 300 can include:Receiver module 301, comparison module 302, the first judge module 303, turn Shifting formwork block 304.
The receiver module 301, for when detecting file and being run, the decryption information of receiving user's input;
The comparison module 302, for the decryption information is compared with the encryption information in this document, to be compared As a result;
First judge module 303, for judging whether the decryption information is abnormal according to the comparative result;
The shift module 304, for when the judge module is judged as YES, this document being transferred to preset memory locations.
In certain embodiments, the decryption information includes clear crytpographic key, and the encryption information includes Crypted password, and this compares mould Block 302 is used for:
Length of the length of the clear crytpographic key with the Crypted password is compared, to obtain comparative result;
First judge module 303 is used for:
When the length that the comparative result is the clear crytpographic key is different from the length of the Crypted password, it is judged as the solution secret letter Breath is abnormal.
In certain embodiments, the decryption information includes the first biological characteristic, and the encryption information includes the second biological characteristic, The comparison module 302 is used for:
First biological characteristic is matched with second biological characteristic, to obtain matching degree;
First judge module 303 is used for:
When the matching degree is less than predetermined threshold value, it is judged as the decryption information exception.
In certain embodiments, terminal 300 also includes:Second judge module.
Second judge module, for judging whether this document is default file;
The comparison module 302, for when second judge module is judged as YES, by the decryption information and this document Encryption information is compared, to obtain comparative result.
In certain embodiments, terminal 300 also includes:Acquisition module, sending module.
The acquisition module, for obtaining default communications identification;
The sending module, for sending announcement information to the corresponding user of the default communications identification.
The embodiment of the present invention also provides another kind of terminal, as shown in figure 8, the terminal 400 can include radio frequency (RF, Radio Frequency) circuit 401, include the memory 402, input block of one or more computer-readable recording mediums 403rd, display unit 404, sensor 405, voicefrequency circuit 406, Wireless Fidelity (WiFi, Wireless Fidelity) module 407th, processor 408, and the part such as power supply 409 of one or more than one processing core are included.People in the art Member it is appreciated that in Fig. 8 the terminal structure that illustrates not structure paired terminal restriction, can include more more or less of than illustrating Part, or some parts are combined, or different part arrangements.
Radio circuit 401 can be communicated with the network equipment or other electronic equipments by radio communication, complete to set with network Information transmit-receive between standby or other electronic equipments.
Memory 402 can be used to store application program and data.Include and can hold in the application program of the storage of memory 402 Line program code.Application program can constitute various functions module.Processor 408 is stored in answering for memory 402 by operation With program, so as to perform various function application and data processing.
Input block 403 can be used for numeral, character information or the user's characteristic information (such as fingerprint) of receives input, and Produce the keyboard relevant with user's setting and function control, mouse, action bars, optics or trace ball signal input.Wherein, Input block 403 can include fingerprint recognition module.In certain embodiments, input block 403 can also include Touch sensitive surface. Touch sensitive surface, also referred to as touch-screen or Trackpad, can collect user thereon or neighbouring touch operation (such as user's use Any suitable object such as finger, stylus or operation of the annex on Touch sensitive surface or near Touch sensitive surface), and according to advance The formula of setting drives corresponding attachment means.
Display unit 404 can be used for show by user input information or be supplied to user information and terminal it is various Graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its any combination.
Terminal may also include at least one sensor 405, such as optical sensor, motion sensor and other sensors.
Voicefrequency circuit 406 can pass through loudspeaker, microphone and provide the COBBAIF between user and terminal.Voicefrequency circuit The voice data for receiving can be converted into electric signal by 406, be transferred to loudspeaker, be converted to voice signal output by loudspeaker. On the other hand, the voice signal of collection is converted to electric signal by microphone, and audio frequency number is converted to after being received by voicefrequency circuit 406 According to, then voice data output is processed to processor 408.
Wireless Fidelity (WiFi) belongs to short range wireless transmission technology, and terminal can be with which by wireless fidelity module 407 His terminal or server are communicated.
Processor 408 is the control centre of terminal, using various interfaces and the various pieces of the whole terminal of connection, is led to Cross operation or perform the application program being stored in memory 402, and call the data being stored in memory 402, perform The various functions and processing data of terminal, so as to carry out integral monitoring to terminal.
Terminal also includes the power supply 409 (such as battery) powered to all parts.In certain embodiments, power supply can lead to Cross power-supply management system logically contiguous with processor 408, so as to by power-supply management system realize management charge, electric discharge, and The functions such as power managed.
Although not shown in Fig. 8, terminal can also include camera, bluetooth module etc., will not be described here.
In the present embodiment, the processor 408 in terminal can be according to following instruction, by one or more application The corresponding executable program code of process of program is loaded in memory 402, and is stored in storage to run by processor 408 Application program in device 402, so as to realize various functions:
When detecting file and being run, the decryption information of receiving user's input;
The decryption information is compared with the encryption information in this document, to obtain comparative result;
Judge whether the decryption information is abnormal according to the comparative result;
If so, this document is transferred to into preset memory locations then.
In certain embodiments, the encryption information includes Crypted password, and the decryption information includes clear crytpographic key, processor The decryption information is compared by 408 with the encryption information in this document, to obtain during comparative result, for by the clear crytpographic key Length be compared with the length of the Crypted password, to obtain comparative result.The decryption information is judged according to the comparative result When whether abnormal, for when the length that the comparative result is the clear crytpographic key is different from the length of the Crypted password, being judged as The decryption information exception.
In certain embodiments, the decryption information includes the first biological characteristic, and the encryption information includes the second biological characteristic, The decryption information is compared by processor 408 with the encryption information in this document, to obtain during comparative result, for by this One biological characteristic is matched with second biological characteristic, to obtain matching degree.The decryption information is judged according to the comparative result When whether abnormal, for when the matching degree is less than predetermined threshold value, being judged as the decryption information exception.
In certain embodiments, the decryption information is compared with the encryption information in this document, to obtain comparing knot Before fruit, processor 408 is additionally operable to judge whether this document is default file, if so, then by the decryption information and this document Encryption information is compared, to obtain comparative result.
In certain embodiments, this document is transferred to after preset memory locations, processor 408 is additionally operable to obtain default logical News mark, to the default communications identification, corresponding user sends announcement information.
In above-described embodiment, the description to each embodiment all emphasizes particularly on different fields, and is not described in some embodiments Part, may refer to before detailed description to document protection method, will not be described here.
From the foregoing, it will be observed that embodiments provide a kind of terminal, when detecting file and being run, receiving user's input Decryption information;The decryption information is compared with the encryption information in this document, to obtain comparative result;Compared according to this As a result judge whether the decryption information is abnormal;If so, this document is transferred to into preset memory locations then.The program is in user input It is after decryption information, whether abnormal to judge the decryption information with the comparative result of encryption information in file by the decryption information, When decryption information is abnormal, this document is shifted, can at other people to encrypting the staged files when file is illegally cracked, The private file of user is avoided illegally to be obtained so as to cause user privacy information to reveal by other people, such that it is able to improve the letter of terminal Breath security.
It should be noted that one of ordinary skill in the art will appreciate that whole in the various methods of above-described embodiment or Part steps can be by program to instruct the hardware of correlation to complete, and the program can be stored in computer-readable storage medium In matter, storage medium can include:Read-only storage (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), disk or CD etc..
A kind of document protection method, device and the terminal for being provided to the embodiment of the present invention above is described in detail, Specific case used herein is set forth to the principle and embodiment of the present invention, and the explanation of above example is simply used The method of the present invention and its core concept are understood in help;Simultaneously for those skilled in the art, according to the think of of the present invention Think, will change in specific embodiments and applications, in sum, it is right that this specification content should not be construed as The restriction of the present invention.

Claims (11)

1. a kind of document protection method, it is characterised in that include:
When detecting file and being run, the decryption information of receiving user's input;
The decryption information is compared with the encryption information in the file, to obtain comparative result;
Judge whether the decryption information is abnormal according to the comparative result;
If so, the file is transferred to into preset memory locations then.
2. document protection method according to claim 1, it is characterised in that the decryption information includes clear crytpographic key, institute Stating encryption information includes Crypted password, described that the decryption information is compared with the encryption information in the file, with The step of to comparative result, includes:
Length of the length of the clear crytpographic key with the Crypted password is compared, to obtain comparative result;
It is described to judge whether abnormal step includes the decryption information according to the comparative result:
When the length that the comparative result is the clear crytpographic key is different from the length of the Crypted password, it is judged as the solution Confidential information exception.
3. document protection method according to claim 1, it is characterised in that the decryption information includes that first is biological special Levy, the encryption information includes the second biological characteristic, described that the decryption information is carried out with the encryption information in the file Relatively, to obtain comparative result the step of, includes:
First biological characteristic is matched with second biological characteristic, to obtain matching degree;
It is described to judge whether abnormal step includes the decryption information according to the comparative result:
When the matching degree is less than predetermined threshold value, it is judged as the decryption information exception.
4. document protection method according to claim 1, it is characterised in that described by the decryption information and the file In encryption information be compared, the step of to obtain comparative result before, the document protection method also includes:
Judge whether the file is default file;
If so, then perform and the decryption information is compared with the encryption information in the file, to obtain comparative result Step.
5. document protection method according to claim 1, it is characterised in that described that the file is transferred to into default storage After the step of position, the document protection method also includes:
Obtain default communications identification;
To the default communications identification, corresponding user sends announcement information.
6. a kind of file protection device, it is characterised in that include:
Receiver module, for when detecting file and being run, the decryption information of receiving user's input;
Comparison module, for the decryption information is compared with the encryption information in the file, to obtain comparative result;
First judge module, for judging whether the decryption information is abnormal according to the comparative result;
Shift module, for when the judge module is judged as YES, the file being transferred to preset memory locations.
7. file protection device according to claim 6, it is characterised in that the decryption information includes clear crytpographic key, institute Stating encryption information includes Crypted password, and the comparison module is used for:
Length of the length of the clear crytpographic key with the Crypted password is compared, to obtain comparative result;
First judge module is used for:
When the length that the comparative result is the clear crytpographic key is different from the length of the Crypted password, it is judged as the solution Confidential information exception.
8. file protection device according to claim 6, it is characterised in that the decryption information includes that first is biological special Levy, the encryption information includes the second biological characteristic, the comparison module is used for:
First biological characteristic is matched with second biological characteristic, to obtain matching degree;
First judge module is used for:
When the matching degree is less than predetermined threshold value, it is judged as the decryption information exception.
9. file protection device according to claim 6, it is characterised in that the file protection device also includes:
Second judge module, for judging whether the file is default file;
The comparison module, for when second judge module is judged as YES, by the decryption information and the file Encryption information be compared, to obtain comparative result.
10. file protection device according to claim 6, it is characterised in that the file protection device also includes:
Acquisition module, for obtaining default communications identification;
Sending module, for sending announcement information to the corresponding user of the default communications identification.
11. a kind of terminals, it is characterised in that include:
Touch-screen, for the touch operation of receive user;
Be stored with the memory of executable program code;
The processor coupled with the memory;
The executable program code that the processor is stored in calling the memory, performs as appointed in claim 1 to 5 Document protection method described in one.
CN201611085034.0A 2016-11-30 2016-11-30 File protection method and device, and terminal Pending CN106529319A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611085034.0A CN106529319A (en) 2016-11-30 2016-11-30 File protection method and device, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611085034.0A CN106529319A (en) 2016-11-30 2016-11-30 File protection method and device, and terminal

Publications (1)

Publication Number Publication Date
CN106529319A true CN106529319A (en) 2017-03-22

Family

ID=58353794

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611085034.0A Pending CN106529319A (en) 2016-11-30 2016-11-30 File protection method and device, and terminal

Country Status (1)

Country Link
CN (1) CN106529319A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018176176A1 (en) * 2017-04-01 2018-10-04 福建福昕软件开发股份有限公司 Method for automatically giving alarm after encrypted document is leaked
CN111767529A (en) * 2020-05-18 2020-10-13 广州视源电子科技股份有限公司 File encryption method, file decryption method, storage medium and electronic device
CN115118751A (en) * 2022-07-15 2022-09-27 广东浪潮智慧计算技术有限公司 Block chain-based supervision system, method, equipment and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252703A (en) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
CN101610500A (en) * 2009-07-23 2009-12-23 中兴通讯股份有限公司 Mobile phone data retrieving method, mobile phone and mobile phone data retrieving system
CN103024158A (en) * 2012-11-28 2013-04-03 广东欧珀移动通信有限公司 Mobile phone with fingerprint identification function
CN103455737A (en) * 2012-05-28 2013-12-18 百度在线网络技术(北京)有限公司 User information protection method and device
CN104239805A (en) * 2014-08-29 2014-12-24 广东欧珀移动通信有限公司 Mobile phone antitheft method and device
CN105809013A (en) * 2014-12-31 2016-07-27 富泰华工业(深圳)有限公司 Information security protection device and method
CN106022160A (en) * 2016-05-13 2016-10-12 北京小米移动软件有限公司 Method and apparatuses for deleting user data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252703A (en) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
CN101610500A (en) * 2009-07-23 2009-12-23 中兴通讯股份有限公司 Mobile phone data retrieving method, mobile phone and mobile phone data retrieving system
CN103455737A (en) * 2012-05-28 2013-12-18 百度在线网络技术(北京)有限公司 User information protection method and device
CN103024158A (en) * 2012-11-28 2013-04-03 广东欧珀移动通信有限公司 Mobile phone with fingerprint identification function
CN104239805A (en) * 2014-08-29 2014-12-24 广东欧珀移动通信有限公司 Mobile phone antitheft method and device
CN105809013A (en) * 2014-12-31 2016-07-27 富泰华工业(深圳)有限公司 Information security protection device and method
CN106022160A (en) * 2016-05-13 2016-10-12 北京小米移动软件有限公司 Method and apparatuses for deleting user data

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018176176A1 (en) * 2017-04-01 2018-10-04 福建福昕软件开发股份有限公司 Method for automatically giving alarm after encrypted document is leaked
CN111767529A (en) * 2020-05-18 2020-10-13 广州视源电子科技股份有限公司 File encryption method, file decryption method, storage medium and electronic device
CN115118751A (en) * 2022-07-15 2022-09-27 广东浪潮智慧计算技术有限公司 Block chain-based supervision system, method, equipment and medium
CN115118751B (en) * 2022-07-15 2024-04-19 广东浪潮智慧计算技术有限公司 Blockchain-based supervision system, method, equipment and medium

Similar Documents

Publication Publication Date Title
JP6649411B2 (en) Method and apparatus for enabling a touch screen display of a mobile device
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
US20150089666A1 (en) Apparatus and method for protecting privacy in terminal
CN105513179A (en) Unlocking method and device, as well as intelligent lock
CN104992092A (en) Method, device and system for fingerprint information verification
CN106095220B (en) Notification message reminding method and device
JP2007179343A (en) Information processor with security function and program
CN108369618A (en) A kind of fingerprint identification method and terminal device
JP2019510303A (en) Icon processing method and apparatus for application
CN106778295A (en) File storage, display methods, device and terminal
CN104298902B (en) A kind of display methods of application program, device and equipment
CN106951757A (en) A kind of method and apparatus for operating application program
CN107045604A (en) Information processing method and device
CN106529319A (en) File protection method and device, and terminal
CN102402651B (en) Information protection device and method and portable terminal
CN105681365B (en) Method and apparatus for file transmission
TW201826158A (en) Method, Device and Terminal for Displaying Data
CN106845199A (en) Object authentication method and device
CN105912922A (en) Information management method and device, and terminal
WO2019090702A1 (en) Terminal security protection method and device
CN105069344A (en) Mobile terminal locking method and apparatus
TW201833759A (en) Contact information display method and device, and information display method and device
CN105430090A (en) Information push method and device
JP2004229240A (en) Portable telephone
CN106357413A (en) Method for encrypting numbers with fingerprint and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170322

RJ01 Rejection of invention patent application after publication