CN106548083B - A kind of note encryption method and terminal - Google Patents

A kind of note encryption method and terminal Download PDF

Info

Publication number
CN106548083B
CN106548083B CN201611055770.1A CN201611055770A CN106548083B CN 106548083 B CN106548083 B CN 106548083B CN 201611055770 A CN201611055770 A CN 201611055770A CN 106548083 B CN106548083 B CN 106548083B
Authority
CN
China
Prior art keywords
note
information
newly
built
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611055770.1A
Other languages
Chinese (zh)
Other versions
CN106548083A (en
Inventor
李少赓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201611055770.1A priority Critical patent/CN106548083B/en
Publication of CN106548083A publication Critical patent/CN106548083A/en
Application granted granted Critical
Publication of CN106548083B publication Critical patent/CN106548083B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of note encryption method and terminal, solve the problems, such as that existing note application cannot encrypt automatically note.Note encryption method of the invention includes: to obtain the note information of newly-built note;Judge whether the note information of the newly-built note matches with target encryption information, the target encryption information be reach preset quantity in the terminal encrypted note information common to note;If the note information of the newly-built note is matched with the target encryption information, the newly-built note is encrypted.The note encryption method of the embodiment of the present invention has encrypted note information common to note by identification, note content or type of encryption note needed for statistics available user out etc., so as to which subsequent newly-built note is encrypted according to the note information identified, realize the purpose encrypted automatically to the note that user wants to be encrypted, reduce user's operation, the user experience is improved.

Description

A kind of note encryption method and terminal
Technical field
The present invention relates to the technical fields of note encryption, particularly relate to a kind of note encryption method and terminal.
Background technique
With the rapid development of network, user greatly improves working efficiency by network, but simultaneously network there is Various security risks, various internet security Frequent Accidents in recent years, various security risks will be faced by being connected into internet, Such as leakage of information, information is distorted, resource stealing etc..In addition, with the development of electronic industry, mobile device such as smart phone is put down Plate, notebook etc. enter huge numbers of families, and also along with disadvantage easy to be lost while mobile device is easy to carry, it is set after loss Standby upper information is arbitrarily checked by other people, will cause the leakage of various important informations.The presence of these risks hinders network Using and development, under networking, the irreversible situation of the process of IT application, ensure information safety most important.
Therefore, for note application, the encryption function for many types that have been born, the note for establishing oneself is not by other people Arbitrarily check.But existing note encryption needs user to encrypt manually to note, cumbersome, cannot want to carry out to user The note of encryption encrypts automatically.
Summary of the invention
The purpose of the present invention is to provide a kind of note encryption method and terminals, it is intended to which solving existing note application cannot be right The problem of note is encrypted automatically.
To achieve the goals above, the present invention provides a kind of note encryption methods, are applied to terminal, comprising:
Obtain the note information of newly-built note;
Judge whether the note information of the newly-built note matches with target encryption information, the target encryption information is institute State reach preset quantity in terminal encrypted note information common to note;
If the note information of the newly-built note is matched with the target encryption information, the newly-built note is added Close processing.
To achieve the goals above, the present invention also provides a kind of terminals, comprising:
First obtains module, for obtaining the note information of newly-built note;
First judgment module, for judging whether the note information of the newly-built note matches with target encryption information, institute State target encryption information be reach preset quantity in the terminal encrypted note information common to note;
Encrypting module, if the note information for the newly-built note is matched with the target encryption information, to described Newly-built note is encrypted.
The embodiment of the present invention has the advantages that
The above-mentioned technical proposal of the embodiment of the present invention obtains the note information of newly-built note;Judge the newly-built note Whether note information matches with target encryption information, and the target encryption information is to reach having added for preset quantity in the terminal Note information common to close note;If the note information of the newly-built note is matched with the target encryption information, to institute Newly-built note is stated to be encrypted.The note encryption method of the embodiment of the present invention has been encrypted common to note just by identification Information, the note content or type of encryption note needed for statistics available user out etc. are signed, so as to believe according to the note identified Subsequent newly-built note is encrypted in breath, realizes the purpose encrypted automatically to the note that user wants to be encrypted, reduces User's operation, the user experience is improved.
Detailed description of the invention
Fig. 1 is a work flow diagram of note of embodiment of the present invention encryption method;
Fig. 2 is the another work flow diagram of note of embodiment of the present invention encryption method;
Fig. 3 is a structural block diagram of the terminal of the embodiment of the present invention;
Fig. 4 is the another structural block diagram of the terminal of the embodiment of the present invention;
Fig. 5 is another structural block diagram of the terminal of the embodiment of the present invention.
Specific embodiment
To keep the technical problem to be solved in the present invention, technical solution and advantage clearer, below in conjunction with specific implementation Example and attached drawing are described in detail.
The embodiment of the present invention is aiming at the problem that existing note application cannot encrypt automatically note, the embodiment of the present invention Provide a kind of note encryption method and terminal, note information common to note encrypted by identification, it is statistics available go out user Note content or type of required encryption note etc., so as to be carried out according to the note information identified to subsequent newly-built note Encryption realizes the purpose encrypted automatically to the note that user wants to be encrypted, reduces user's operation, improve user Experience.
First embodiment
As shown in Figure 1, being applied to terminal the embodiment provides a kind of note encryption method, comprising:
Step 101: obtaining the note information of newly-built note.
Here note information can be specially note type or note content.
In a specific embodiment of the present invention, if user opens automatic encryption function, after user creates note, The note information of the newly-built note will be obtained, newly-built note is carried out certainly according to the note information for creating note so as to subsequent Dynamic encryption.
Step 102: judging whether the note information of above-mentioned newly-built note matches with target encryption information, target encryption letter Breath be reach preset quantity in terminal encrypted note information common to note.
Here, above-mentioned note information may include keyword or note type.Having encrypted note can be specially that user adds manually Close obtained note then counts the note of the preset quantity when having encrypted the quantity of note in the terminal and reaching preset quantity Common note information will if all or most all has same note information in the note of above-mentioned preset quantity The note information is as above-mentioned target encryption information.Note information common to note has been encrypted by identification, it may be appreciated that user The note information of encryption is wished, so that convenient encrypt newly-built note automatically.
Further, above-mentioned target encryption information is target keyword, and above-mentioned note information is note content;
Above-mentioned steps 102 may particularly include: determine in the note content of newly-built note whether include target keyword;If new It builds in the note content of note comprising target keyword, it is determined that the note information of newly-built note is matched with target encryption information.
Further, above-mentioned target encryption information includes target encryption type, and above-mentioned note information is note type;
Above-mentioned steps 102 may particularly include: determine in target encryption type whether include the note type for creating note;If It is, it is determined that the note information of newly-built note is matched with target encryption information.
Step 103: if the note information of newly-built note is matched with above-mentioned target encryption information, to above-mentioned newly-built note into Row encryption.
If the note information of newly-built note is matched with above-mentioned target encryption information, illustrate that the newly-built note is that user wishes The note encrypted is encrypted automatically so as to create note to this, is manually operated without user, is brought for user very big Convenience.
Certainly, in the embodiment of the present invention, above-mentioned target encryption information can also for user according to set by self-demand just Sign information.
Further, in the embodiment of the present invention, if the note information of above-mentioned newly-built note and above-mentioned target encryption information After the step of matching, then above-mentioned newly-built note being encrypted, further includes:
Generate a prompt information for prompting the above-mentioned newly-built note of user to encrypt.
Here, it generates above-mentioned prompt information and shows, user is facilitated to understand the encryption information of the newly-built note in time.
The note encryption method of the embodiment of the present invention obtains the note information of newly-built note;Judge the newly-built note Whether note information matches with target encryption information, and the target encryption information is to reach having added for preset quantity in the terminal Note information common to close note;If the note information of the newly-built note is matched with the target encryption information, to institute Newly-built note is stated to be encrypted.The note encryption method of the embodiment of the present invention has been encrypted common to note just by identification Information, the note content or type of encryption note needed for statistics available user out etc. are signed, so as to believe according to the note identified Subsequent newly-built note is encrypted in breath, realizes the purpose encrypted automatically to the note that user wants to be encrypted, reduces User's operation, the user experience is improved.
Second embodiment
As shown in Fig. 2, being applied to terminal the embodiment provides a kind of note encryption method, comprising:
Step 201: obtaining the note information of newly-built note.
The step is identical as the step 101 in above-mentioned first embodiment, and details are not described herein again.
Step 202: obtaining the note information that note has been encrypted in terminal.
Here note information may include note type and note content.
Step 203: whether the note quantity for judging that terminal has encrypted in note with identical note information reaches present count Amount.
Step 204: if reaching above-mentioned preset quantity, that extracts the preset quantity has encrypted the letter of note common to note Breath is used as above-mentioned target encryption information.
When the quantity of note information having the same is more than or equal to preset quantity, show that the note information is to have added The common information of close note, user wish to encrypt the note for carrying the common information.
Step 205: judging whether the note information of newly-built note matches with target encryption information, which is Reach preset quantity in the terminal has encrypted note information common to note.
Further, above-mentioned target encryption information is target keyword, and above-mentioned note information is note content;
Above-mentioned steps 205 may particularly include: determine in the note content of newly-built note whether include target keyword;If new It builds in the note content of note comprising target keyword, it is determined that the note information of newly-built note is matched with target encryption information.
Further, above-mentioned target encryption information includes target encryption type, and above-mentioned note information is note type;
Above-mentioned steps 205 may particularly include: determine in target encryption type whether include the note type for creating note;If It is, it is determined that the note information of newly-built note is matched with target encryption information.
Step 206: if the note information of newly-built note is matched with above-mentioned target encryption information, to above-mentioned newly-built note into Row encryption.
Here, when the note information of newly-built note is matched with above-mentioned target encryption information, newly-built note is carried out automatically Encryption can effectively prevent user to forget that the note encrypted to needs encrypts.
The note encryption method of the embodiment of the present invention has encrypted note information common to note by identification, statistics available The note content or type etc. of encryption note needed for user out, so as to be created just according to the note information identified to subsequent Label are encrypted, and realize the purpose encrypted automatically to the note that user wants to be encrypted, reduce user's operation, are promoted User experience.
In addition, the encryption method of the embodiment of the present invention, is equally applicable to the encryption of application program in terminal, such as pass through statistics Encrypt the type of application program or according to predetermined keyword, to determine application program that user wants to be encrypted, thus Automatically newly-built application program is encrypted.
3rd embodiment
As shown in figure 3, the embodiments of the present invention also provide a kind of terminals, comprising:
First obtains module 301, for obtaining the note information of newly-built note;
First judgment module 302, for judging whether the note information of the newly-built note matches with target encryption information, The target encryption information be reach preset quantity in the terminal encrypted note information common to note;
Encrypting module 303, if the note information for the newly-built note is matched with the target encryption information, to institute Newly-built note is stated to be encrypted.
The terminal of the embodiment of the present invention, further includes:
Second obtains module 304, for obtaining the note information for having encrypted note in terminal;
Second judgment module 305, for judging that the terminal has encrypted the note number in note with identical note information Whether amount reaches the preset quantity;
Extraction module 306, if the note of encryption for extracting the preset quantity is total to for reaching the preset quantity Some note information is as the target encryption information.
The terminal of the embodiment of the present invention, the target encryption information are target keyword, and the note information is in note Hold;
The first judgment module 302 includes:
Whether first determines submodule 3021, close comprising the target in the note content for determining the newly-built note Keyword;
Second determines submodule 3022, if for including the target keyword in the note content of the newly-built note, Then determine that the note information of the newly-built note is matched with the target encryption information.
The terminal of the embodiment of the present invention, the target encryption information are target encryption type, and the note information is note Type;
The first judgment module 302 includes:
Third determines submodule 3023, for determine in the target encryption type whether comprising the newly-built note just Sign type;
4th determines submodule 3024, includes if determining that submodule determines in the target encryption type for the third The note type of the newly-built note, it is determined that the note information of the newly-built note is matched with the target encryption information.
The terminal of the embodiment of the present invention, further includes:
Generation module 307, for generating one for prompting the prompt information that newly-built note has encrypted described in user.
The terminal of the embodiment of the present invention obtains the note information of newly-built note;Judge the note information of the newly-built note Whether matched with target encryption information, the target encryption information is the note of the encryption institute that reaches preset quantity in the terminal Shared note information;If the note information of the newly-built note is matched with the target encryption information, created just to described Label are encrypted.The note encryption method of the embodiment of the present invention has encrypted note information common to note by identification, It is statistics available go out user needed for encryption note note content or type etc., so as to according to the note information identified to subsequent Newly-built note is encrypted, and realizes the purpose encrypted automatically to the note that user wants to be encrypted, reduces user behaviour Make, the user experience is improved.
Fourth embodiment
As shown in figure 4, being the another structural block diagram of the terminal of that embodiment of the invention, terminal 400 shown in Fig. 4 includes: at least One processor 401, memory 402, at least one network interface 404 and user interface 403.Various components in terminal 400 It is coupled by bus system 405.It is understood that bus system 405 is for realizing the connection communication between these components.Always Linear system system 405 further includes power bus, control bus and status signal bus in addition in addition to including data/address bus.But in order to clear For the sake of Chu's explanation, various buses are all designated as bus system 405 in Fig. 4.
Wherein, user interface 403 may include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 402 in the embodiment of the present invention can be volatile memory or nonvolatile memory, It or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as external high Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The memory 402 of system and method described herein is intended to include but is not limited to these and arbitrarily its It is suitble to the memory of type.
In some embodiments, memory 402 stores following element, executable modules or data structures, or Their subset of person or their superset: operating system 4021 and application program 4022.
Wherein, operating system 4021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and the hardware based task of processing.Application program 4022 includes various application programs, such as media Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 4022.
In one embodiment of this invention, by the program or instruction of calling memory 402 to store, the specific can be that The program or instruction stored in application program 4022, processor 401 are used to obtain the note information of newly-built note;Judge described new Whether the note information for building note matches with target encryption information, and the target encryption information is to reach present count in the terminal Amount has encrypted note information common to note;If the note information of the newly-built note and the target encryption information Match, then the newly-built note is encrypted.
Optionally, processor 401 is also used to: obtaining the note information that note has been encrypted in terminal;Judge the terminal Whether the note quantity with identical note information reaches the preset quantity in encryption note;If reaching the preset quantity, That then extracts the preset quantity has encrypted note information common to note as the target encryption information.
Optionally, the target encryption information is target keyword, and the note information is note content;Processor 401 It is also used to: whether determining in the note content of the newly-built note comprising the target keyword;If the newly-built note is just Signing includes the target keyword in content, it is determined that the note information of the newly-built note and the target encryption information Match.
Optionally, the target encryption information is target encryption type, and the note information is note type;Processor 401 are also used to: determine in the target encryption type whether include the newly-built note note type;If so, determining institute The note information for stating newly-built note is matched with the target encryption information.
Optionally, processor 401 is also used to: generating a prompt letter for prompting newly-built note described in user to encrypt Breath.
The terminal 400 of the embodiment of the present invention, processor 401 are used to obtain the note information of newly-built note;Judge described new Whether the note information for building note matches with target encryption information, and the target encryption information is to reach present count in the terminal Amount has encrypted note information common to note;If the note information of the newly-built note and the target encryption information Match, then the newly-built note is encrypted.The note encryption method of the embodiment of the present invention has encrypted note by identification Common note information, it is statistics available go out user needed for encryption note note content or type etc., so as to according to being known Subsequent newly-built note is encrypted in other note information, what realization encrypted the note that user wants to be encrypted automatically Purpose reduces user's operation, and the user experience is improved.
Terminal of the invention such as can be mobile phone, tablet computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle-mounted computer etc. terminal.
Terminal 400 can be realized each process that terminal is realized in previous embodiment, no longer superfluous here to avoid repeating It states.
The method that the embodiments of the present invention disclose can be applied in processor 401, or real by processor 401 It is existing.Processor 401 may be a kind of IC chip, the processing capacity with signal.During realization, the above method Each step can be completed by the integrated logic circuit of the hardware in processor 401 or the instruction of software form.Above-mentioned place Reason device 401 can be general processor, digital signal processor (Digital Signal Processor, DSP), dedicated integrated Circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at The step of memory 402, processor 401 reads the information in memory 402, completes the above method in conjunction with its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combination is to realize.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, In controller, microcontroller, microprocessor, other electronic units for executing herein described function or combinations thereof.
For software implementations, it can be realized herein by executing the module (such as process, function etc.) of function described herein The technology.Software code is storable in memory and is executed by processor.Memory can in the processor or It is realized outside processor.
5th embodiment:
As shown in figure 5, another structural block diagram of the terminal for the embodiment of the present invention.Terminal 500 shown in fig. 5 includes radio frequency (Radio Frequency, RF) circuit 510, memory 520, input unit 530, display unit 540, processor 560, audio Circuit 570, WiFi (Wireless Fidelity) module 580 and power supply 590.
Wherein, input unit 530 can be used for receiving the number or character information of user's input, and generate and terminal 500 User setting and function control related signal input.Specifically, in the embodiment of the present invention, which can be with Including touch panel 531.Touch panel 531, also referred to as touch screen collect the touch operation (ratio of user on it or nearby Such as user uses the operation of finger, stylus any suitable object or attachment on touch panel 531), and according to setting in advance Fixed formula drives corresponding attachment device.Optionally, touch panel 531 may include touch detecting apparatus and touch controller two A part.Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected, signal is passed Give touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then The processor 560 is given, and order that processor 560 is sent can be received and executed.Furthermore, it is possible to using resistance-type, electricity The multiple types such as appearance formula, infrared ray and surface acoustic wave realize touch panel 531.In addition to touch panel 531, input unit 530 Can also include other input equipments 532, other input equipments 532 can include but is not limited to physical keyboard, function key (such as Volume control button, switch key etc.), trace ball, mouse, one of operating stick etc. or a variety of.
Wherein, display unit 540 can be used for showing information input by user or be supplied to the information and terminal of user 500 various menu interfaces.Display unit 540 may include display panel 541, optionally, can use LCD or organic light emission two The forms such as pole pipe (Organic Light-Emitting Diode, OLED) configure display panel 541.
It should be noted that touch panel 531 can cover display panel 541, touch display screen is formed, when the touch display screen is examined After measuring touch operation on it or nearby, processor 560 is sent to determine the type of touch event, is followed by subsequent processing device 560 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface elements such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example, Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
Wherein processor 560 is the control centre of terminal 500, utilizes each of various interfaces and connection whole mobile phone Part by running or execute the software program and/or module that are stored in first memory 521, and calls and is stored in the Data in two memories 522 execute the various functions and processing data of terminal 500, to carry out whole prison to terminal 500 Control.Optionally, processor 560 may include one or more processing units.
In one embodiment of this invention, by calling the software program and/or module that store in the first memory 521 And/or the data in the second memory 522, processor 560 are used to obtain the note information of newly-built note;Judge described newly-built Whether the note information of note matches with target encryption information, and the target encryption information is to reach preset quantity in the terminal Encrypted note information common to note;If the note information of the newly-built note is matched with the target encryption information, Then the newly-built note is encrypted.
Optionally, processor 560 is also used to: obtaining the note information that note has been encrypted in terminal;Judge the terminal Whether the note quantity with identical note information reaches the preset quantity in encryption note;If reaching the preset quantity, That then extracts the preset quantity has encrypted note information common to note as the target encryption information.
Optionally, the target encryption information is target keyword, and the note information is note content;Processor 560 It is also used to: whether determining in the note content of the newly-built note comprising the target keyword;If the newly-built note is just Signing includes the target keyword in content, it is determined that the note information of the newly-built note and the target encryption information Match.
Optionally, the target encryption information is target encryption type, and the note information is note type;Processor 560 are also used to: determine in the target encryption type whether include the newly-built note note type;If so, determining institute The note information for stating newly-built note is matched with the target encryption information.
Optionally, processor 560 is also used to: generating a prompt letter for prompting newly-built note described in user to encrypt Breath.
The terminal 500 of the embodiment of the present invention, processor 560 obtain the note information of newly-built note;Judge described create just Whether the note information of label matches with target encryption information, and the target encryption information is to reach preset quantity in the terminal Note information common to note is encrypted;If the note information of the newly-built note is matched with the target encryption information, The newly-built note is encrypted.The note encryption method of the embodiment of the present invention has been encrypted common to note by identification Note information, it is statistics available go out user needed for encryption note note content or type etc., so as to according to being identified just Subsequent newly-built note is encrypted in label information, realizes the purpose encrypted automatically to the note that user wants to be encrypted, Reduce user's operation, the user experience is improved.
Terminal of the invention such as can be mobile phone, tablet computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle-mounted computer etc. terminal.
Terminal 500 can be realized each process that terminal is realized in previous embodiment, no longer superfluous here to avoid repeating It states.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program code Medium.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is controlled by computer program to complete, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Within mind and principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (8)

1. a kind of note encryption method is applied to terminal characterized by comprising
Obtain the note information of newly-built note;
Judge whether the note information of the newly-built note matches with target encryption information, the target encryption information is the end Reach preset quantity in end has encrypted note information common to note;
If the note information of the newly-built note is matched with the target encryption information, the newly-built note is carried out at encryption Reason;
Before judging the step of whether the note information of the newly-built note matches with target encryption information, the note encryption side Method further include:
Obtain the note information that note has been encrypted in terminal;
Whether the note quantity for judging that the terminal has encrypted in note with identical note information reaches the preset quantity;
If reaching the preset quantity, extract the preset quantity encrypted note information common to note be used as described in Target encryption information.
2. note encryption method according to claim 1, which is characterized in that the target encryption information is target critical Word, the note information are note content;
The step of whether the note information for judging the newly-built note matches with target encryption information include:
It whether determines in the note content of the newly-built note comprising the target keyword;
If in the note content of the newly-built note including the target keyword, it is determined that the note information of the newly-built note It is matched with the target encryption information.
3. note encryption method according to claim 1, which is characterized in that the target encryption information is that target encrypts class Type, the note information are note type;
The step of whether the note information for judging the newly-built note matches with target encryption information include:
Determine in the target encryption type whether include the newly-built note note type;
If so, determining that the note information of the newly-built note is matched with the target encryption information.
4. note encryption method according to claim 1, which is characterized in that if the note information of the newly-built note After the step of matching, then the newly-built note being encrypted with the target encryption information, the note encryption side Method further include:
One is generated for prompting the prompt information that newly-built note has encrypted described in user.
5. a kind of terminal characterized by comprising
First obtains module, for obtaining the note information of newly-built note;
First judgment module, for judging whether the note information of the newly-built note matches with target encryption information, the mesh Mark encryption information be reach preset quantity in the terminal encrypted note information common to note;
Encrypting module, if the note information for the newly-built note is matched with the target encryption information, to described newly-built Note is encrypted;
The terminal further include:
Second obtains module, for obtaining the note information for having encrypted note in terminal;
Whether the second judgment module, the note quantity for judging that the terminal has encrypted in note with identical note information reach To the preset quantity;
Extraction module, if extracting having encrypted common to note just for the preset quantity for reaching the preset quantity Information is signed as the target encryption information.
6. terminal according to claim 5, which is characterized in that the target encryption information be target keyword, it is described just Label information is note content;
The first judgment module includes:
Whether first determines submodule, include the target keyword in the note content for determining the newly-built note;
Second determines submodule, if for including the target keyword in the note content of the newly-built note, it is determined that institute The note information for stating newly-built note is matched with the target encryption information.
7. terminal according to claim 5, which is characterized in that the target encryption information is target encryption type, described Note information is note type;
The first judgment module includes:
Third determines submodule, for determine in the target encryption type whether include the newly-built note note type;
4th determines submodule, if determining that submodule determines in the target encryption type comprising described newly-built for the third The note type of note, it is determined that the note information of the newly-built note is matched with the target encryption information.
8. terminal according to claim 5, which is characterized in that further include:
Generation module, for generating one for prompting the prompt information that newly-built note has encrypted described in user.
CN201611055770.1A 2016-11-25 2016-11-25 A kind of note encryption method and terminal Active CN106548083B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611055770.1A CN106548083B (en) 2016-11-25 2016-11-25 A kind of note encryption method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611055770.1A CN106548083B (en) 2016-11-25 2016-11-25 A kind of note encryption method and terminal

Publications (2)

Publication Number Publication Date
CN106548083A CN106548083A (en) 2017-03-29
CN106548083B true CN106548083B (en) 2019-10-15

Family

ID=58395177

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611055770.1A Active CN106548083B (en) 2016-11-25 2016-11-25 A kind of note encryption method and terminal

Country Status (1)

Country Link
CN (1) CN106548083B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107332973B (en) * 2017-05-19 2020-09-25 北京安云世纪科技有限公司 Text data processing method and device and mobile terminal

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1924866A (en) * 2006-09-28 2007-03-07 北京理工大学 Static feature based web page malicious scenarios detection method
CN101401061A (en) * 2005-05-09 2009-04-01 普罗维拉公司 Cascading security architecture
CN102201048A (en) * 2010-03-24 2011-09-28 日电(中国)有限公司 Method and system for performing topic-level privacy protection on document set
CN103150499A (en) * 2012-12-27 2013-06-12 中华电信股份有限公司 Protection method for preventing file from being leaked in encrypted form
CN103679012A (en) * 2012-09-03 2014-03-26 腾讯科技(深圳)有限公司 Clustering method and device of portable execute (PE) files
CN104317976A (en) * 2014-11-21 2015-01-28 四川智诚天逸科技有限公司 Method for storing information
CN105069358A (en) * 2015-07-13 2015-11-18 西安理工大学 Keyword searchable encryption method based on Bloom filter with storage structure
CN105468694A (en) * 2015-11-17 2016-04-06 小米科技有限责任公司 Information template mining method and apparatus

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8458179B2 (en) * 2007-11-29 2013-06-04 Palo Alto Research Center Incorporated Augmenting privacy policies with inference detection

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101401061A (en) * 2005-05-09 2009-04-01 普罗维拉公司 Cascading security architecture
CN1924866A (en) * 2006-09-28 2007-03-07 北京理工大学 Static feature based web page malicious scenarios detection method
CN102201048A (en) * 2010-03-24 2011-09-28 日电(中国)有限公司 Method and system for performing topic-level privacy protection on document set
CN103679012A (en) * 2012-09-03 2014-03-26 腾讯科技(深圳)有限公司 Clustering method and device of portable execute (PE) files
CN103150499A (en) * 2012-12-27 2013-06-12 中华电信股份有限公司 Protection method for preventing file from being leaked in encrypted form
CN104317976A (en) * 2014-11-21 2015-01-28 四川智诚天逸科技有限公司 Method for storing information
CN105069358A (en) * 2015-07-13 2015-11-18 西安理工大学 Keyword searchable encryption method based on Bloom filter with storage structure
CN105468694A (en) * 2015-11-17 2016-04-06 小米科技有限责任公司 Information template mining method and apparatus

Also Published As

Publication number Publication date
CN106548083A (en) 2017-03-29

Similar Documents

Publication Publication Date Title
CN106681623B (en) A kind of sharing method and mobile terminal of screenshotss image
CN106126077B (en) Display control method of application program icons and mobile terminal
CN106844067B (en) A kind of processing method and mobile terminal of content
CN106127076B (en) A kind of inspection method and mobile terminal of photograph album photo
CN106570372B (en) A kind of the starting method and mobile terminal of application program
CN105956431B (en) A kind of application protection processing method and mobile terminal
CN106445392A (en) Operating method of status bar icon and mobile terminal
CN106325753B (en) A kind of display methods and mobile terminal of payment interface
CN105827816B (en) A kind of the split screen method and mobile terminal of terminal screen
CN107678644A (en) A kind of image processing method and mobile terminal
CN107506111A (en) The encryption and decryption method and terminal of a kind of terminal applies
CN106250757B (en) A kind of control method and mobile terminal of application program
CN106228085B (en) The method for secret protection and mobile terminal of application program
CN106557259B (en) A kind of operating method and mobile terminal of mobile terminal
CN103268197B (en) A kind of method of lock-screen, device and terminal device
CN107390991B (en) A kind of processing method and mobile terminal of screenshot
CN105867830B (en) A kind of processing method and mobile terminal based on fingerprint recognition
CN106485166A (en) Screenshotss method and apparatus for electric terminal
CN106446614B (en) A kind of right management method and mobile terminal of application program
CN106874046A (en) The operating method and mobile terminal of a kind of application program
CN106484301A (en) A kind of method of hiden application and terminal
CN106503507A (en) Method and mobile terminal that a kind of password shows
CN106156600A (en) The unlocking method of a kind of application program and mobile terminal
CN106709320A (en) Identity authentication method and mobile terminal
CN106383713A (en) Application control method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant