CN107220552A - A kind of encryption and decryption approaches and mobile terminal - Google Patents

A kind of encryption and decryption approaches and mobile terminal Download PDF

Info

Publication number
CN107220552A
CN107220552A CN201710377339.7A CN201710377339A CN107220552A CN 107220552 A CN107220552 A CN 107220552A CN 201710377339 A CN201710377339 A CN 201710377339A CN 107220552 A CN107220552 A CN 107220552A
Authority
CN
China
Prior art keywords
destination
destination folder
arrangement state
state
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710377339.7A
Other languages
Chinese (zh)
Other versions
CN107220552B (en
Inventor
彭兰华
康新龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201710377339.7A priority Critical patent/CN107220552B/en
Publication of CN107220552A publication Critical patent/CN107220552A/en
Application granted granted Critical
Publication of CN107220552B publication Critical patent/CN107220552B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of encryption and decryption approaches and mobile terminal, and wherein method includes:Whether the arrangement state of object changes in detection destination folder;If the arrangement state for detecting object in the destination folder is changed, the arrangement state of object in the destination folder after change is compared with default decryption arrangement state;If the arrangement state of object matches with the decryption arrangement state in the destination folder, the destination object in encrypted state in the destination folder is set to decrypted state.The embodiment of the present invention can realize the privacy protection to destination object;Multiple destination objects can be uniformly controlled by destination folder, improve control efficiency of the mobile terminal to destination object;The arrangement state of object is not only directly perceived, simple to operation for a user as encryption and decryption means using in destination folder, and is difficult to discover for other people, improves the security of destination object encryption.

Description

A kind of encryption and decryption approaches and mobile terminal
Technical field
The present invention relates to communication technical field, more particularly to a kind of encryption and decryption approaches and mobile terminal.
Background technology
As mobile terminal intelligence degree is increasingly improved, the purposes of mobile terminal is more and more extensive.In mobile terminal Various objects (such as application program, file) bring facility for the life of user.With pay class application program (APP, Application exemplified by), this class object almost turns into indispensable object of most of user installation in mobile terminal.Generally this Include individual privacy information or property safety information in a little objects, these current objects lack privacy protection, and anyone is Arbitrarily it can check or use, individual privacy information may be caused to expose, or property loss.It can be seen that, in existing mobile terminal Object lack privacy protection.
The content of the invention
The embodiment of the present invention provides a kind of encryption and decryption approaches and mobile terminal, to solve pair in existing mobile terminal The problem of as lacking privacy protection.
In a first aspect, the embodiments of the invention provide a kind of encryption and decryption approaches, applied to mobile terminal, including:
Whether the arrangement state of object changes in detection destination folder;
If the arrangement state for detecting object in the destination folder is changed, by the file destination after change The arrangement state of object is compared with default decryption arrangement state in folder;
If the arrangement state of object matches with the decryption arrangement state in the destination folder, by the target The destination object in encrypted state is set to decrypted state in file;
Wherein, the startup authority and/or operating right of the destination object in encrypted state are closed mode;It is described Arrangement state includes:In the number of object in the destination folder, the putting in order of object, the spread geometry of object at least One.
Second aspect, the embodiment of the present invention also provides a kind of mobile terminal, including:
First detection module, for detecting whether the arrangement state of object in destination folder changes;
Comparing module, if being changed for the arrangement state for detecting object in the destination folder, after changing The destination folder in object arrangement state with it is default decryption arrangement state be compared;
First setup module, if arrangement state and the decryption arrangement state phase for object in the destination folder Matching, then be set to decrypted state by the destination object in encrypted state in the destination folder;
Wherein, the startup authority and/or operating right of the destination object in encrypted state are closed mode;It is described Arrangement state includes:In the number of object in the destination folder, the putting in order of object, the spread geometry of object at least One.
The third aspect, the embodiment of the present invention also provides another mobile terminal, including processor, memory, is stored in institute State the encryption and decryption process program that can be run on memory and on the processor, the encryption and decryption process program quilt The step of above-mentioned encryption and decryption approaches being realized during the computing device.
Fourth aspect, the embodiment of the present invention also provides a kind of computer-readable recording medium, the computer-readable storage The encryption and decryption process that is stored with medium program, the encryption and decryption process program realizes above-mentioned add when being executed by processor The step of close and decryption method.
So, in the embodiment of the present invention, by detecting whether the arrangement state of object in destination folder changes;If inspection The arrangement state for measuring object in the destination folder is changed, then by the row of object in the destination folder after change Cloth state is compared with default decryption arrangement state;If the arrangement state of object and the decryption in the destination folder Arrangement state matches, then the destination object in encrypted state in the destination folder is set into decrypted state.This hair Bright embodiment can realize the privacy protection to destination object;Multiple destination objects can be united by destination folder One control, is respectively controlled compared to single target object, improves control efficiency of the mobile terminal to destination object;With The arrangement state of object is not only directly perceived, simple to operation for a user as encryption and decryption means in destination folder, and And be difficult to discover for other people, improve the security of destination object encryption.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed for description of the embodiment of the present invention The accompanying drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, For those of ordinary skill in the art, without having to pay creative labor, it can also be obtained according to these accompanying drawings Take other accompanying drawings.
Fig. 1 is one of flow chart of encryption and decryption approaches provided in an embodiment of the present invention;
Fig. 2 is the two of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention;
Fig. 2-1 is the schematic diagram that destination folder provided in an embodiment of the present invention shows encryption identification;
Fig. 2-2 is the schematic diagram that destination folder provided in an embodiment of the present invention shows operation button;
Fig. 3 is the three of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention;
Fig. 4 is the four of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention;
Fig. 5 is one of structure chart of mobile terminal provided in an embodiment of the present invention;
Fig. 6 is the two of the structure chart of mobile terminal provided in an embodiment of the present invention;
Fig. 7 is the three of the structure chart of mobile terminal provided in an embodiment of the present invention;
Fig. 8 is the four of the structure chart of mobile terminal provided in an embodiment of the present invention;
Fig. 9 is the five of the structure chart of mobile terminal provided in an embodiment of the present invention;
Figure 10 is the six of the structure chart of mobile terminal provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than whole embodiments.Based on this hair Embodiment in bright, those of ordinary skill in the art's every other implementation acquired under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
Referring to Fig. 1, Fig. 1 is one of flow chart of encryption and decryption approaches provided in an embodiment of the present invention, as shown in figure 1, This method is applied to mobile terminal, comprises the following steps:
Whether the arrangement state of object changes in step 101, detection destination folder.
The embodiment of the present invention is adapted to any object in mobile terminal, the i.e. embodiment of the present invention can be to mobile whole Control is encrypted and decrypted in any object in end.For example, the object can be stored in the application program in mobile terminal APP (such as social class APP, pay class APP, media player or browser) or it is stored in mobile terminal Miscellaneous Documents (such as picture, audio, video or document).
The embodiment of the present invention is real by way of the arrangement state for setting object in destination folder and destination folder The purpose that now destination object in destination folder is encrypted or decrypted.
Here, destination object is different from the object of common meaning, the object of common meaning can arbitrarily be checked or by Use, destination object can be checked or used only under decrypted state, and can not then be checked in encrypted state or Person is used.
Likewise, the arrangement state that destination folder is different from object in the file of common meaning, destination folder is determined Fixed destination object therein is to be in encrypted state or decrypted state.
In mobile terminal the quantity of destination folder can be at least one, the number of destination object in each destination folder Amount can also be at least one.Destination folder can be any file in mobile terminal, for example, for consolidation picture Photograph album file, for the file of consolidation document, being arranged on mobile terminal desktop is used for consolidation APP desktop folder, Etc..
Wherein, the arrangement state of object can be including at least one of following in destination folder:Object in destination folder Title;The number of object in destination folder;Object puts in order in destination folder;The row of object in destination folder Row shape.User can be according to encryption requirements, the arrangement state for setting complexity to differ.
The embodiment of the present invention lays particular emphasis on the method that the destination object in encrypted state is decrypted, individually below from step Rapid 101 are specifically described to step 103.
In the step, mobile terminal can detect whether the arrangement state of object in destination folder changes.It can manage Destination object is in encrypted state in Xie Wei, current goal file.If detecting the arrangement shape of object in destination folder State is changed, then continues executing with step 102;If the arrangement state for being not detected by object in destination folder is changed, tie The beam flow.
If step 102, the arrangement state for detecting object in the destination folder are changed, described in after change The arrangement state of object is compared with default decryption arrangement state in destination folder.
In a step 101, if the arrangement state that mobile terminal detects object in destination folder is changed, at this In step, mobile terminal can obtain the arrangement state of object in the destination folder after change, and the target after change is literary The arrangement state of object is compared with decryption arrangement state in part folder.
Wherein, decryption arrangement state can user pre-set, after setting, decryption arrangement state becomes Decrypt the password of destination object in destination folder.At any time, user can arrange state to the decryption that sets before It is modified.
If the arrangement state of object matches with the decryption arrangement state in step 103, the destination folder, will The destination object in encrypted state is set to decrypted state in the destination folder.
In a step 102, if the arrangement state of object matches with decryption arrangement state in destination folder, at this In step, the destination object in encrypted state in destination folder can be set to decrypted state by mobile terminal.It can manage Xie Wei, the startup authority and/or operating right of the destination object in encrypted state are closed mode.
So far, the destination object decryption in destination folder is completed, and user can check or using in destination folder Destination object.
It can be seen that, user can by adjusting the arrangement state of object in the destination folder, make mobile terminal will in plus The destination object of close state is decrypted.It is readily appreciated that, user's (or mobile terminal) can also be by adjusting the destination folder The arrangement state of middle object, makes mobile terminal that the destination object in decrypted state to be encrypted, it is thus possible to realize to mesh Mark the privacy protection of object;Multiple destination objects can be uniformly controlled by destination folder, compared to single Destination object is respectively controlled, and improves control efficiency of the mobile terminal to destination object;With object in destination folder Arrangement state is not only directly perceived, simple to operation for a user as encryption and decryption means, and is difficult to discover for other people, Improve the security of destination object encryption.
In the embodiment of the present invention, above-mentioned mobile terminal can be any equipment that function is set with file, for example:Meter Calculation machine (Computer), mobile phone, tablet personal computer (Tablet Personal Computer), laptop computer (Laptop Computer), personal digital assistant (personal digital assistant, abbreviation PDA), mobile Internet access electronic equipment (Mobile Internet Device, MID), wearable device (Wearable Device) etc..
Whether the arrangement state of object has change in the encryption and decryption approaches of the embodiment of the present invention, detection destination folder Change;If the arrangement state for detecting object in the destination folder is changed, by the destination folder after change The arrangement state of object is compared with default decryption arrangement state;If in the destination folder arrangement state of object with The decryption arrangement state matches, then is set to decrypt shape by the destination object in encrypted state in the destination folder State.So, the embodiment of the present invention is by pre-setting the decryption arrangement state for decrypting destination object, in destination folder When the arrangement state of object matches with decryption arrangement state, destination object is decrypted, it is on the contrary then destination object is entered Row encryption.It can be seen that, the embodiment of the present invention can realize the privacy protection to destination object;Can be by destination folder to many Individual destination object is uniformly controlled, and is respectively controlled compared to single target object, improves mobile terminal to target The control efficiency of object;Using in destination folder the arrangement state of object as encryption and decryption means, for a user not It is only directly perceived, simple to operation, and be difficult to discover for other people, improve the security of destination object encryption.
Referring to Fig. 2, Fig. 2 is the two of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention, as shown in Fig. 2 This method is applied to mobile terminal, comprises the following steps:
Step 201, the encryption information to destination folder for receiving user's input.
Wherein, encryption information includes:At least one corresponding destination object of destination folder, the corresponding solution of destination folder Solid matter cloth state, and at least one corresponding encryption arrangement state of destination folder.
In the embodiment of the present invention, user can set corresponding encryption information, the encryption information for destination folder in advance At least one corresponding destination object of destination folder, and the corresponding decryption arrangement state of destination folder can be included.With Family according to the demand of user, can set the number of the object included in destination folder during encryption information is pre-set Specifically comprising information such as which destination objects in amount, destination folder.At any time, user can be to adding for setting before Confidential information is modified, to realize the renewal of encryption information.
In the embodiment of the present invention, encryption information is set for destination folder by user in advance, user can be according to itself Custom and demand, encryption information is flexibly set.
The embodiment of the present invention is adapted to any object in mobile terminal, the i.e. embodiment of the present invention can be to mobile whole Control is encrypted and decrypted in any object in end.For example, the object can be stored in the application program in mobile terminal APP (such as social class APP, pay class APP, media player or browser) or it is stored in mobile terminal Miscellaneous Documents (such as picture, audio, video or document).
For example, user can set at least one corresponding destination object of destination folder to be:Short message APP, wechat APP, Phone APP and photograph album APP, user can set the corresponding decryption arrangement state of the destination folder to be that the destination folder is only wrapped Include aforementioned four APP and put in order and do not limit, user can set at least one corresponding encryption arrangement shape of the destination folder State includes:Any one APP in aforementioned four APP is removed into the destination folder and added in the destination folder to Few other APP.
Step 202, detection are to the object moving operation of the destination folder.
The embodiment of the present invention is real by way of the arrangement state for setting object in destination folder and destination folder The purpose that now destination object in destination folder is encrypted or decrypted.
Wherein, the arrangement state of object can be including at least one of following in destination folder:Object in destination folder Title;The number of object in destination folder;Object puts in order in destination folder;The row of object in destination folder Row shape.User can be according to encryption requirements, the arrangement state for setting complexity to differ.
The embodiment of the present invention lays particular emphasis on the method that the destination object in encrypted state is decrypted, individually below from step Rapid 202 are specifically described to step 204.
In the step, mobile terminal can detect the object moving operation to destination folder, it can be understood as, current mesh Mark destination object in file and be in encrypted state.If detecting the object moving operation to destination folder, show mesh The arrangement state of object is changed in mark file, then continues executing with step 203;If being not detected by pair to destination folder As moving operation, then show that the arrangement state of object in destination folder does not change, then terminate the flow.
Optionally, the object moving operation in step 202 includes at least one of following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
In embodiment of the present invention, the object moving operation to destination folder can move at least one object to be somebody's turn to do Operation in destination folder or at least one object is removed into the operation in the destination folder, can also be shifting The operation of position of at least one object in the destination folder in the destination folder is moved, two kinds of any of the above is can also be Or the combination of a variety of operations.Above object moving operation is workable, not only simple but also quick during operation.
For example, user is set after the encryption information of destination folder in step 201, the encryption for receiving user's input refers to Order, encrypted state is set to by the destination object of the destination folder.For example, it may be including short message APP, wechat APP, electricity One game APP of increase in APP and photograph album APP file destination is talked about, and phone APP is removed into the destination folder.
After user's input encrypted instruction, user can not be opened short message APP, wechat APP, phone APP and photograph album APP Dynamic and/or operation.
If desired user starts and/or operates the destination object in encrypted state, then needs in the destination folder Arrangement state be adjusted to decrypt arrangement state.That is, in step 202., user can be to pair in destination folder As moving, for example, the game APP in the destination folder can be removed the destination folder, and by phone APP again Move into the destination folder.
If step 203, the object moving operation is detected, by the destination folder after the object moving operation The arrangement state of middle object is compared with default decryption arrangement state.
In step 202., if mobile terminal detects the object moving operation to destination folder, in the step In, mobile terminal can be obtained after the object moving operation, the arrangement state of object in destination folder, and being somebody's turn to do acquisition Arrangement state is compared with decryption arrangement state.
Wherein, decryption arrangement state can user pre-set, after setting, decryption arrangement state becomes Decrypt the password of destination object in destination folder.At any time, user can arrange state to the decryption that sets before It is modified.
For example, user is moved after operation to object in destination folder in step 202, mobile terminal can be by movement Arrangement state after operation is compared with the decryption arrangement state set in step 201.
If the game APP in the destination folder is removed the destination folder by user, and phone APP is moved into again The destination folder, then the arrangement state after moving operation with set in step 201 decryption arrangement state match.It is no Then, then mismatch.
If the arrangement state of object matches with the decryption arrangement state in step 204, the destination folder, will The destination object in encrypted state is set to decrypted state in the destination folder.
In step 203, if the arrangement state of object matches with decryption arrangement state in destination folder, at this In step, the destination object in encrypted state in destination folder can be set to decrypted state, thus energy by mobile terminal Enough realize is protected the privacy of destination object;Multiple destination objects can be uniformly controlled by destination folder, phase Than being respectively controlled in single target object, control efficiency of the mobile terminal to destination object is improved;With file destination In folder the arrangement state of object as encryption and decryption means, it is not only directly perceived, simple to operation for a user, and be difficult for Other people discover, and improve the security of destination object encryption.
For example, the game APP in the destination folder is removed the destination folder by user, and phone APP is moved again The arrangement state and decryption arrangement state for entering object in the destination folder, destination folder match, in destination folder This four APP of short message APP, wechat APP, phone APP and photograph album APP are changed to decrypted state by encrypted state, and user can be with Any of which APP is started and/or operated.
So far, the destination object decryption in destination folder is completed, and user can check or using in destination folder Destination object.
It can be seen that, user can be by the object moving operation to destination folder, to adjust object in the destination folder Arrangement state, make mobile terminal that the destination object in encrypted state to be decrypted.It is readily appreciated that, user (or it is mobile whole End), to adjust the arrangement state of object in the destination folder, it can also be made by the object moving operation to destination folder Destination object in decrypted state is encrypted mobile terminal.
In the embodiment of the present invention, in addition to step 201 to step 203, remaining step can be with the invention shown in Fig. 1 Embodiment is identical, and to avoid repeating, same section is not repeated.
As a kind of preferably encryption and decryption approaches, one or several destination objects can be gathered as one, when And if only if when containing all corresponding destination objects in destination folder, user could open the mesh in destination folder Object is marked, that is, decrypts arrangement state to include the arrangement state of all corresponding destination objects in destination folder.
Wherein some destination object or certain several destination object can be removed file destination by user or mobile terminal Folder, either toward one or several plain objects of immigration or the order by destination object in destination folder in destination folder It is adjusted, or one or several other destination folders pair for being different from the destination folder is moved into toward destination folder is interior Destination object answered, etc., to reach the purpose of encryption.
When user need decrypt destination folder in destination object when, can by inverse operations, for example, by removal certain One destination object or certain several destination object move into destination folder again, or the plain objects that will move into remove target text Part press from both sides, either by the order of destination object in destination folder adjust to correct order or will move into be different from the target The corresponding destination object of other destination folders of file removes the destination folder, etc..
Optionally, the destination folder shows encryption identification.
In embodiment of the present invention, encryption identification can be shown on destination folder by mobile terminal, such as Fig. 2-1 institutes Show, the upper left corner of destination folder shows an encryption identification 211, is easy to user area partial objectives for file and normal folder.
In addition, encryption identification can change and change with the cryptographic attributes of file, when the encryption function of file is opened When, encryption identification can be shown on destination folder;When the encryption function of file is closed, the encryption identification of this document folder It can disappear.
It should be noted that the form that is particularly shown of encryption identification is not limited to form shown in Fig. 2-1.
Embodiment of the present invention can also be with reference to shown in Fig. 1 embodiment implemented, for avoid repeat, this is not done superfluous State.
Optionally, operation button is shown in the destination folder, the operation button includes configuration button, moves into and press Button removes button or moves in and out at least one of button.
In embodiment of the present invention, mobile terminal can show operation button in destination folder, as shown in Fig. 2-2, So, user can accordingly be operated by operation button.Wherein, operation button can be configured in button, such as Fig. 2-2 Upper left side in destination folder shows a configuration button 221, and the configuration button 221 can be for configuring to destination folder Encryption information.Operation button can also be immigration button 222, and moving into button 222 can help user to move object into target text Part is pressed from both sides;Move into button 222 and can also be removal button, user can be helped to move the object out destination folder;Move into button 222 It can also be and move in and out button, user can be helped to move object into or remove destination folder.User can also directly by Any one object in destination folder removes destination folder with drag operation, can also be by any one outside destination folder Object moves into file by drag operation.
It should be noted that the form that is particularly shown of operation button is not limited to form shown in Fig. 2-2.
Embodiment of the present invention can also be with reference to shown in Fig. 1 embodiment implemented, for avoid repeat, this is not done superfluous State.
The encryption and decryption approaches of the embodiment of the present invention, detect the object moving operation to the destination folder;If inspection The object moving operation is measured, then by the arrangement state of object and institute in the destination folder after the object moving operation Decryption arrangement state is stated to be compared;If the arrangement state of object and the decryption arrangement state phase in the destination folder Match somebody with somebody, then the destination object in encrypted state in the destination folder is set to decrypted state.So, the embodiment of the present invention By pre-setting the decryption arrangement state for decrypting destination object, the arrangement state of object and the solution in destination folder When solid matter cloth state matches, destination object is decrypted, it is on the contrary then destination object is encrypted.It can be seen that, the present invention is real The privacy protection to destination object can be realized by applying example;Unified control can be carried out to multiple destination objects by destination folder System, is respectively controlled compared to single target object, improves control efficiency of the mobile terminal to destination object;With target The arrangement state of object is not only directly perceived, simple to operation for a user as encryption and decryption means in file, and not Easily discover for other people, improve the security of destination object encryption.
Referring to Fig. 3, Fig. 3 is the three of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention, as shown in figure 3, This method is applied to mobile terminal, comprises the following steps:
Whether the arrangement state of object changes in step 301, detection destination folder.
In the embodiment of the present invention, the arrangement state of object can include at least one of following in destination folder:
The title of object in destination folder;
The number of object in destination folder;
Object puts in order in destination folder;
The spread geometry of object in destination folder.
User can be according to encryption requirements, the arrangement state for setting complexity to differ.
The embodiment of the present invention is laid particular emphasis on, and the destination object in encrypted state is decrypted, and will be in decrypted state The method that is encrypted of destination object, be specifically described individually below from step 301 to step 306.
In the step, mobile terminal can detect whether the arrangement state of object in destination folder changes.It can manage Destination object is in encrypted state in Xie Wei, current goal file.If detecting the arrangement shape of object in destination folder State is changed, then continues executing with step 302;If the arrangement state for being not detected by object in destination folder is changed, tie The beam flow.
If step 302, the arrangement state for detecting object in the destination folder are changed, described in after change The arrangement state of object is compared with default decryption arrangement state in destination folder.
In step 301, if the arrangement state that mobile terminal detects object in destination folder is changed, at this In step, mobile terminal can obtain the arrangement state of object in the destination folder after change, and the target after change is literary The arrangement state of object is compared with decryption arrangement state in part folder.
If the arrangement state of object matches with the decryption arrangement state in step 303, the destination folder, will The destination object in encrypted state is set to decrypted state in the destination folder.
In step 302, if the arrangement state of object matches with decryption arrangement state in destination folder, at this In step, the destination object in encrypted state in destination folder can be set to decrypted state by mobile terminal.
Step 304, detection triggering command.
In this step, mobile terminal can be detected to triggering command.Wherein, the triggering command is pre-set For triggering the instruction that destination object is encrypted.
Here, triggering command can be that mobile terminal puts out the corresponding instruction of screen or mobile terminal screen locking is corresponding Corresponding instruction is restarted in instruction or mobile terminal shutdown, can also be that mobile terminal receives some user operation The instruction of (such as clicking operation, gesture graph to trigger button etc.).
If step 305, detecting the triggering command, the target pair of decrypted state will be in the destination folder As being set to encrypted state.
In step 304, if mobile terminal detects triggering command, in this step, mobile terminal can be responded The triggering command, encrypted state is set to by the destination object in decrypted state in destination folder.Now, destination folder In destination object encrypted state is transformed into by decrypted state, user cannot check or using the target in destination folder Object.It is to be understood that the startup authority and/or operating right of the destination object in decrypted state are opening.
Step 306, by the arrangement state of object in the destination folder be adjusted to it is default first encryption arrangement state.
Because the embodiment of the present invention is the arrangement state by setting object in destination folder and destination folder Mode, realizes the purpose that the destination object in destination folder is encrypted or decrypted.In step 305, destination folder In destination object encrypted state is transformed into by decrypted state, correspondingly, in this step, mobile terminal is needed target The arrangement state of object is adjusted in file, you can added so that the arrangement state of object in destination folder is adjusted into first Solid matter cloth state.
It should be noted that the sequencing that step 305 is performed with step 306 in the embodiment of the present invention is not construed as limiting, can To perform step 306 again after step 305 is performed, step 305, Huo Zhetong can also be performed again after step 306 is performed Shi Zhihang steps 305 and step 306.Fig. 3 is illustrated that while situation about performing.
Wherein, the first encryption arrangement state can user or mobile terminal pre-set, each destination folder can To set at least one first encryption arrangement state.When the corresponding first encryption arrangement state of a destination folder be two or During two or more, mobile terminal can randomly choose the encryption arrangement state of any of which first.Set for each destination folder Multiple first encryption arrangement states, are conducive to improving level of encryption.
In the embodiment of the present invention, in addition to step 303 to step 306, remaining step can with shown in Fig. 1 or Fig. 2 Inventive embodiments it is identical, to avoid repeating, same section do not repeat.
Optionally, the step of whether the arrangement state of object changes in the detection destination folder, including:
Detect the object moving operation to the destination folder;
If the arrangement state of object is changed in the destination folder, by the destination folder after change The step of arrangement state of middle object is compared with default decryption arrangement state, including:
If detecting the object moving operation, by object in the destination folder after the object moving operation Arrangement state is compared with the decryption arrangement state.
In embodiment of the present invention, the arrangement shape of object in destination folder can be adjusted by object moving operation State, reference can be made to illustrating in inventive embodiments shown in Fig. 2, to avoid repeating, does not repeat this.
Optionally, the object moving operation includes at least one of following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
In embodiment of the present invention, the object moving operation to destination folder can move at least one object to be somebody's turn to do Operation in destination folder or at least one object is removed into the operation in the destination folder, can also be shifting The operation of position of at least one object in the destination folder in the destination folder is moved, two kinds of any of the above is can also be Or the combination of a variety of operations.
Optionally, it is described before the step of whether the arrangement state of object changes in the detection destination folder Method also includes:
Receive the encryption information to the destination folder of user's input;
In embodiment of the present invention, corresponding encryption information can be set for destination folder in advance, specifically, mobile whole End can receive encryption information of user's input to destination folder.
Wherein, the encryption information can include:At least one corresponding destination object of destination folder, destination folder pair The decryption arrangement state answered, and at least one corresponding first encryption arrangement state of destination folder.
Embodiment of the present invention by user in advance for destination folder set encryption information, user can according to itself Custom and demand, are flexibly set to encryption information.
The embodiment that embodiment of the present invention can be combined with shown in Fig. 1 carries out embodiment, and to avoid repeating, this is not made Repeat.
As a kind of preferably encryption and decryption approaches, one or several destination objects can be gathered as one, when And if only if when containing all corresponding destination objects in destination folder, user could open the mesh in destination folder Object is marked, that is, decrypts arrangement state to include the arrangement state of all corresponding destination objects in destination folder.
Wherein some destination object or certain several destination object can be removed file destination by user or mobile terminal Folder, either toward one or several plain objects of immigration or the order by destination object in destination folder in destination folder It is adjusted, or one or several other destination folders pair for being different from the destination folder is moved into toward destination folder is interior Destination object answered, etc., to reach the purpose of encryption.
When user need decrypt destination folder in destination object when, can by inverse operations, for example, by removal certain One destination object or certain several destination object move into destination folder again, or the plain objects that will move into remove target text Part press from both sides, either by the order of destination object in destination folder adjust to correct order or will move into be different from the target The corresponding destination object of other destination folders of file removes the destination folder, etc..
Optionally, the destination folder shows encryption identification.
In embodiment of the present invention, encryption identification can be shown on destination folder by mobile terminal, destination folder The upper left corner show an encryption identification.Embodiment of the present invention can be in order to user area partial objectives for file and ordinary file Folder.
In addition, encryption identification can change and change with the cryptographic attributes of file, when the encryption function of file is opened When, encryption identification can be shown on destination folder;When the encryption function of file is closed, the encryption identification of this document folder It can disappear.
Optionally, operation button is shown in the destination folder, the operation button includes configuration button, moves into and press Button removes button or moves in and out at least one of button.
In embodiment of the present invention, mobile terminal can show operation button in destination folder, so, and user can be with Operated accordingly by operation button.Wherein, operation button can be configuration button, and the configuration button can be for mesh Mark file configuration encryption information.Operation button can also be immigration button, and moving into button can help user to move object into Destination folder;Operation button can also be removal button, and removing button can help user to move the object out destination folder; Operation button, which can also be, moves in and out button, and this, which moves in and out button, can help user to move object into or remove target File.
In the embodiment of the present invention, by setting triggering command so that mobile terminal can be when detecting triggering command, certainly It is dynamic that destination object in destination folder is changed to encrypted state by decrypted state, changed manually without user.On the one hand, carry The high intelligence degree of mobile terminal, reduces the operation of user;On the other hand, it is possible to reduce because user neglect fail and When the risk protected destination object.
Whether the arrangement state of object has change in the encryption and decryption approaches of the embodiment of the present invention, detection destination folder Change;If the arrangement state for detecting object in the destination folder is changed, by the destination folder after change The arrangement state of object is compared with default decryption arrangement state;If in the destination folder arrangement state of object with The decryption arrangement state matches, then is set to decrypt shape by the destination object in encrypted state in the destination folder State;Detect triggering command;If detecting the triggering command, the destination object in the destination folder is set to encryption State;The arrangement state of object in the destination folder is adjusted to default first encryption arrangement state.So, it is of the invention Embodiment is by pre-setting the decryption arrangement state for decrypting destination object, the arrangement state of object in destination folder When matching with decryption arrangement state, destination object is decrypted, it is on the contrary then destination object is encrypted.It can be seen that, this Inventive embodiments can realize the privacy protection to destination object;Multiple destination objects can be carried out by destination folder It is uniformly controlled, is respectively controlled compared to single target object, improves control efficiency of the mobile terminal to destination object; The arrangement state of object is not only directly perceived, simple to operation for a user as encryption and decryption means using in destination folder, And be difficult to discover for other people, improve the security of destination object encryption.
Referring to Fig. 4, Fig. 4 is the four of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention, as shown in figure 4, This method is applied to mobile terminal, comprises the following steps:
Whether the arrangement state of object changes in step 401, detection destination folder.
In the embodiment of the present invention, the arrangement state of object can include at least one of following in destination folder:
The title of object in destination folder;
The number of object in destination folder;
Object puts in order in destination folder;
The spread geometry of object in destination folder.
User can be according to encryption requirements, the arrangement state for setting complexity to differ.
The embodiment of the present invention is laid particular emphasis on, and the destination object in encrypted state is decrypted, and will be in decrypted state The method that is encrypted of destination object, be specifically described individually below from step 401 to step 404.
In the step, mobile terminal can detect whether the arrangement state of object in destination folder changes.It can manage Destination object is in encrypted state in Xie Wei, current goal file.If detecting the arrangement shape of object in destination folder State is changed, then continues executing with step 402;If the arrangement state for being not detected by object in destination folder is changed, tie The beam flow.
If step 402, the arrangement state for detecting object in the destination folder are changed, described in after change The arrangement state of object is compared with default decryption arrangement state in destination folder.
In step 401, if the arrangement state that mobile terminal detects object in destination folder is changed, at this In step, mobile terminal can obtain the arrangement state of object in the destination folder after change, and the target after change is literary The arrangement state of object is compared with decryption arrangement state in part folder.
If the arrangement state of object matches with the decryption arrangement state in step 403, the destination folder, will The destination object in encrypted state is set to decrypted state in the destination folder.
In step 402, if the arrangement state of object matches with decryption arrangement state in destination folder, at this In step, the destination object in encrypted state in destination folder can be set to decrypted state by mobile terminal.
If step 404, detecting the arrangement state of object in the destination folder and being arranged state change by the decryption For the default second encryption arrangement state, then the destination object in decrypted state in the destination folder is set to encryption State.
In the embodiment of the present invention, user, can under the scene for needing that the destination object in destination folder is encrypted To realize the purpose of encryption by adjusting the arrangement state of object in destination folder.In the step, if mobile terminal is detected Into destination folder, the arrangement state of object is the second encryption arrangement state by decryption arrangement state change, then mobile terminal can So that the destination object in decrypted state in destination folder is set into encrypted state.
Wherein, second encryption arrangement state can be it is that user pre-sets and with decrypt arrangement state arrangement state Different any arrangement states.
For example, user need by mobile terminal borrow give other people in use, or it is other need encrypt scene under, Yong Huke So that the arrangement state of object in the destination folder to be adjusted, make its arrangement state different from decryption arrangement state.
The difference of the embodiment of the present invention and the inventive embodiments shown in Fig. 3 is that the embodiment of the present invention is that user adjusts manually The arrangement state of object in whole destination folder, the inventive embodiments shown in Fig. 3 are detecting triggering command certainly for mobile terminal The arrangement state of object in dynamic adjustment destination folder.No matter which kind of mode more than, can be realized to destination folder The purpose of middle destination object encryption.
In the embodiment of the present invention, in addition to step 404, remaining step can be implemented with the invention shown in Fig. 1 or Fig. 2 Example is identical, and to avoid repeating, same section is not repeated.
Optionally, the step of whether the arrangement state of object changes in the detection destination folder, including:
Detect the object moving operation to the destination folder;
If the arrangement state of object is changed in the destination folder, by the destination folder after change The step of arrangement state of middle object is compared with default decryption arrangement state, including:
If detecting the object moving operation, by object in the destination folder after the object moving operation Arrangement state is compared with the decryption arrangement state.
In embodiment of the present invention, the arrangement shape of object in destination folder can be adjusted by object moving operation State, reference can be made to illustrating in inventive embodiments shown in Fig. 2, to avoid repeating, does not repeat this.
Optionally, the object moving operation includes at least one of following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
In embodiment of the present invention, the object moving operation to destination folder can move at least one object to be somebody's turn to do Operation in destination folder or at least one object is removed into the operation in the destination folder, can also be shifting The operation of position of at least one object in the destination folder in the destination folder is moved, two kinds of any of the above is can also be Or the combination of a variety of operations.
Above object moving operation is workable, not only simple but also quick during operation.
Optionally, it is described before the step of whether the arrangement state of object changes in the detection destination folder Method also includes:
Receive the encryption information to the destination folder of user's input;
In embodiment of the present invention, corresponding encryption information can be set for destination folder in advance, specifically, mobile whole End can receive encryption information of user's input to destination folder.
Wherein, the encryption information can include:At least one corresponding destination object of destination folder, destination folder pair The decryption arrangement state answered, and at least one corresponding second encryption arrangement state of destination folder.
Embodiment of the present invention by user in advance for destination folder set encryption information, user can according to itself Custom and demand, are flexibly set to encryption information.
As a kind of preferably encryption and decryption approaches, one or several destination objects can be gathered as one, when And if only if when containing all corresponding destination objects in destination folder, user could open the mesh in destination folder Object is marked, that is, decrypts arrangement state to include the arrangement state of all corresponding destination objects in destination folder.
Wherein some destination object or certain several destination object can be removed file destination by user or mobile terminal Folder, either toward one or several plain objects of immigration or the order by destination object in destination folder in destination folder It is adjusted, or one or several other destination folders pair for being different from the destination folder is moved into toward destination folder is interior Destination object answered, etc., to reach the purpose of encryption.
When user need decrypt destination folder in destination object when, can by inverse operations, for example, by removal certain One destination object or certain several destination object move into destination folder again, or the plain objects that will move into remove target text Part press from both sides, either by the order of destination object in destination folder adjust to correct order or will move into be different from the target The corresponding destination object of other destination folders of file removes the destination folder, etc..
Optionally, the destination folder shows encryption identification.
In embodiment of the present invention, encryption identification can be shown on destination folder by mobile terminal, destination folder The upper left corner show an encryption identification.Embodiment of the present invention can be in order to user area partial objectives for file and ordinary file Folder.
In addition, encryption identification can change and change with the cryptographic attributes of file, when the encryption function of file is opened When, encryption identification can be shown on destination folder;When the encryption function of file is closed, the encryption identification of this document folder It can disappear.
Optionally, operation button is shown in the destination folder, the operation button includes configuration button, moves into and press Button removes button or moves in and out at least one of button.
In embodiment of the present invention, mobile terminal can show operation button in destination folder, so, and user can be with Operated accordingly by operation button.Wherein, operation button can be configuration button, and the configuration button can be for mesh Mark file configuration encryption information.Operation button can also be immigration button, and moving into button can help user to move object into Destination folder;Operation button can also be removal button, and removing button can help user to move the object out destination folder; Operation button, which can also be, moves in and out button, and this, which moves in and out button, can help user to move object into or remove target File.
Whether the arrangement state of object has change in the encryption and decryption approaches of the embodiment of the present invention, detection destination folder Change;If the arrangement state for detecting object in the destination folder is changed, by the destination folder after change The arrangement state of object is compared with default decryption arrangement state;If in the destination folder arrangement state of object with The decryption arrangement state matches, then is set to decrypt shape by the destination object in encrypted state in the destination folder State;If the arrangement state for detecting object in the destination folder is added by the decryption arrangement state change for default second Solid matter cloth state, then be set to encrypted state by the destination object in decrypted state in the destination folder.So, this hair Bright embodiment is by pre-setting the decryption arrangement state for decrypting destination object, the arrangement shape of object in destination folder When state and the decryption arrangement state match, destination object is decrypted, it is on the contrary then destination object is encrypted.It can be seen that, The embodiment of the present invention can realize the privacy protection to destination object;Multiple destination objects can be entered by destination folder Row is uniformly controlled, and is respectively controlled compared to single target object, is improved control of the mobile terminal to destination object and is imitated Rate;The arrangement state of object is used as encryption and decryption means, for a user not only directly perceived, operation letter using in destination folder Victory, and be difficult to discover for other people, improve the security of destination object encryption.
Referring to Fig. 5, Fig. 5 is one of structure chart of mobile terminal provided in an embodiment of the present invention, as shown in figure 5, mobile whole End 500, including first detection module 501, the setup module 503 of comparing module 502 and first, wherein, first detection module 501 with Comparing module 502 is connected, and comparing module 502 is connected with the first setup module 503.
First detection module 501, for detecting whether the arrangement state of object in destination folder changes;
Comparing module 502, will change if being changed for the arrangement state for detecting object in the destination folder The arrangement state of object is compared with default decryption arrangement state in the destination folder afterwards;
First setup module 503, if arrangement state and the decryption arrangement shape for object in the destination folder State matches, then the destination object in encrypted state in the destination folder is set into decrypted state;
Wherein, the startup authority and/or operating right of the destination object in encrypted state are closed mode;It is described Arrangement state includes:In the number of object in the destination folder, the putting in order of object, the spread geometry of object at least One.
Optionally, first detection module 501 specifically for:Detect the object moving operation to the destination folder;
Comparing module 502 specifically for:If detecting the object moving operation, by institute after the object moving operation The arrangement state and the decryption arrangement state for stating object in destination folder are compared.
Optionally, the object moving operation includes at least one of following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
Optionally, as shown in fig. 6, mobile terminal 500 also includes:
Second detection module 504, for detecting triggering command, the triggering command is to pre-set for triggering to institute State the instruction that destination object is encrypted;
Second setup module 505, if for detecting the triggering command, decryption will be in the destination folder The destination object of state is set to encrypted state;
Adjusting module 506, for the arrangement state of object in the destination folder to be adjusted into default first encryption Arrangement state;
Wherein, the startup authority and/or operating right of the destination object in decrypted state are opening.
Optionally, as shown in fig. 7, mobile terminal 500 also includes:
3rd setup module 507, if for detecting the arrangement state of object in the destination folder by the decryption State change of arranging is the default second encryption arrangement state, then the target pair of decrypted state will be in the destination folder As being set to encrypted state;
Wherein, the second encryption arrangement state is different from the arrangement state of the decryption arrangement state.
Optionally, as shown in figure 8, mobile terminal 500 also includes:
Receiving module 508, the encryption information to the destination folder for receiving user's input;
Wherein, the encryption information includes:At least one corresponding destination object of the destination folder, the target text The corresponding decryption arrangement state of part folder, and at least one corresponding encryption arrangement state of the destination folder.
Optionally, the object includes application program or file.
Mobile terminal 500 can realize each process that mobile terminal is realized in Fig. 1 to Fig. 4 embodiment of the method, to keep away Exempt to repeat, repeat no more here.
Whether the arrangement state of object changes in the mobile terminal 500 of the embodiment of the present invention, detection destination folder;If The arrangement state for detecting object in the destination folder is changed, then by object in the destination folder after change Arrangement state is compared with default decryption arrangement state;If the arrangement state of object and the solution in the destination folder Solid matter cloth state matches, then the destination object in encrypted state in the destination folder is set into decrypted state.This Sample, the embodiment of the present invention is by pre-setting the decryption arrangement state for decrypting destination object, the object in destination folder Arrangement state and decryption arrangement state when matching, destination object is decrypted, it is on the contrary then destination object is added It is close.It can be seen that, the embodiment of the present invention can carry out private protection to destination object.
The embodiment of the present invention also provides a kind of mobile terminal, including processor, memory, is stored on the memory simultaneously The encryption and decryption process program that can be run on the processor, the encryption and decryption process program is held by the processor Each process of above-mentioned encryption and decryption approaches embodiment is realized during row, and identical technique effect can be reached, to avoid repeating, Here repeat no more.
The embodiment of the present invention, which also provides to be stored with a kind of computer-readable recording medium, computer-readable recording medium, to be added Close and decryption processing routine, the encryption and decryption process program realizes that above-mentioned encryption and decryption approaches are real when being executed by processor Each process of example is applied, and identical technique effect can be reached, to avoid repeating, is repeated no more here.Wherein, described calculating Machine readable storage medium storing program for executing, such as read-only storage (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic disc or CD etc..
Referring to Fig. 9, Fig. 9 is the five of the structure chart that the present invention implements the mobile terminal provided, as shown in figure 9, mobile terminal 900 include:At least one processor 901, memory 902, at least one network interface 904 and user interface 903.Mobile terminal Each component in 900 is coupled by bus system 905.It is understood that bus system 905 be used for realize these components it Between connection communication.Bus system 905 is in addition to including data/address bus, in addition to power bus, controlling bus and status signal Bus.But for the sake of clear explanation, various buses are all designated as bus system 905 in fig .9.
Wherein, user interface 903 can include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch-screen etc..
It is appreciated that the memory 902 in the embodiment of the present invention can be volatile memory or nonvolatile memory, Or may include both volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read-only storage (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), Electrically Erasable Read Only Memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), and it is used as outside high Speed caching.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).Memory 902 described herein is intended to including but not limited to these and any other suitable type Memory.
In some embodiments, memory 902 stores following element, can perform module or data structure, or Their subset of person, or their superset:Operating system 9021 and application program 9022.
Wherein, operating system 9021, comprising various system programs, such as ccf layer, core library layer, driving layer, are used for Realize various basic businesses and handle hardware based task.Application program 9022, includes various application programs, such as media Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 9022.
In embodiments of the present invention, mobile terminal 900 also includes:It is stored on memory 902 and can be on processor 901 The encryption and decryption process program of operation, can be the encryption and decryption process program in application program 9022 specifically, encryption Following steps are realized when being performed with decryption processing routine by processor 901:The arrangement state of object is in detection destination folder It is no to change;If the arrangement state for detecting object in the destination folder is changed, by the target text after change The arrangement state of object is compared with default decryption arrangement state in part folder;If the arrangement of object in the destination folder State matches with the decryption arrangement state, then is set to the destination object in encrypted state in the destination folder Decrypted state;Wherein, the startup authority and/or operating right of the destination object in encrypted state are closed mode;Institute Stating arrangement state includes:In the number of object in the destination folder, the putting in order of object, the spread geometry of object extremely One item missing.
The method that the embodiments of the present invention are disclosed can apply in processor 901, or be realized by processor 901. Processor 901 is probably a kind of IC chip, the disposal ability with signal.In implementation process, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 901 or the instruction of software form.Above-mentioned processing Device 901 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic, Discrete hardware components.It can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor can also be any conventional processor etc..With reference to institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and perform completion, or with the hardware in decoding processor And software module combination performs completion.Software module can be located at random access memory, and flash memory, read-only storage may be programmed read-only In the ripe computer-readable recording medium in this area such as memory or electrically erasable programmable memory, register.The meter Calculation machine readable storage medium storing program for executing is located at memory 902, and processor 901 reads the information in memory 902, is completed with reference to its hardware The step of stating method.Specifically, be stored with encryption and decryption process program on the computer-readable recording medium, encryption and decryption Each step such as above-mentioned encryption and decryption approaches embodiment is realized when processing routine is performed by processor 801.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combine to realize.Realized for hardware, processing unit can be realized in one or more application specific integrated circuit (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, In controller, microcontroller, microprocessor, other electronic units for performing herein described function or its combination.
Realize, can be realized by performing the module (such as process, function) of function described herein herein for software Described technology.Software code is storable in memory and by computing device.Memory can within a processor or Realized outside processor.
Optionally, following steps can be also realized when encryption and decryption process program is performed by processor 901:Detection is to described The object moving operation of destination folder;, will be described after the object moving operation if detecting the object moving operation The arrangement state of object is compared with the decryption arrangement state in destination folder.
Optionally, the object moving operation includes at least one of following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
Optionally, following steps can be also realized when encryption and decryption process program is performed by processor 901:Detection triggering refers to Order, the triggering command is the instruction that the destination object is encrypted for triggering that is used for pre-set;If detecting described Triggering command, then be set to encrypted state by the destination object in decrypted state in the destination folder;By the target The arrangement state of object is adjusted to default first encryption arrangement state in file;Wherein, the mesh in decrypted state The startup authority and/or operating right for marking object are opening.
Optionally, following steps can be also realized when encryption and decryption process program is performed by processor 901:If detecting institute The arrangement state for stating object in destination folder encrypts arrangement state by the decryption arrangement state change for default second, then Destination object in decrypted state in the destination folder is set to encrypted state;Wherein, the second encryption arrangement State is different from the arrangement state of the decryption arrangement state.
Optionally, following steps can be also realized when encryption and decryption process program is performed by processor 901:Receive user defeated The encryption information to the destination folder entered;
Wherein, the encryption information includes:At least one corresponding destination object of the destination folder, the target text The corresponding decryption arrangement state of part folder, and at least one corresponding encryption arrangement state of the destination folder.
Optionally, the object includes application program or file.
Mobile terminal 900 can realize each process that mobile terminal is realized in previous embodiment, to avoid repeating, here Repeat no more.
Whether the arrangement state of object changes in the mobile terminal 900 of the embodiment of the present invention, detection destination folder;If The arrangement state for detecting object in the destination folder is changed, then by object in the destination folder after change Arrangement state is compared with default decryption arrangement state;If the arrangement state of object and the solution in the destination folder Solid matter cloth state matches, then the destination object in encrypted state in the destination folder is set into decrypted state.This Sample, the embodiment of the present invention is by pre-setting the decryption arrangement state for decrypting destination object, the object in destination folder Arrangement state and decryption arrangement state when matching, destination object is decrypted, it is on the contrary then destination object is added It is close.It can be seen that, it is seen then that the embodiment of the present invention can realize the privacy protection to destination object;Destination folder pair can be passed through Multiple destination objects are uniformly controlled, and are respectively controlled compared to single target object, improve mobile terminal to mesh Mark the control efficiency of object;Using in destination folder the arrangement state of object as encryption and decryption means, for a user It is not only directly perceived, simple to operation, and be difficult to discover for other people, improve the security of destination object encryption.
Referring to Fig. 10, Figure 10 is the six of the structure chart that the present invention implements the mobile terminal provided, it is as shown in Figure 10, mobile Terminal 1000 includes radio frequency (Radio Frequency, RF) circuit 1010, memory 1020, input block 1030, display unit 1040th, processor 1050, voicefrequency circuit 1060, communication module 1070, power supply 1080.
Wherein, input block 1030 can be used for the numeral or character information of reception user's input, and produce and mobile whole The signal input that the user at end 1000 is set and function control is relevant.Specifically, in the embodiment of the present invention, the input block 1030 can include contact panel 1031.Contact panel 1031, also referred to as touch-screen, collect user's touching on or near it Operation (such as user uses the operations of any suitable object or annex on contact panel 1031 such as finger, stylus) is touched, and Corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 1031 may include touch detecting apparatus and Two parts of touch controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects the letter that touch operation is brought Number, transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into Contact coordinate, then give the processor 1050, and the order sent of reception processing device 1050 and can be performed.Furthermore, it is possible to Contact panel 1031 is realized using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel 1031, input block 1030 can also include other input equipments 1032, and other input equipments 1032 can include but is not limited to One kind or many in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. Kind.
Wherein, display unit 1040 can be used for information and the movement for showing the information inputted by user or being supplied to user The various menu interfaces of terminal 1000.Display unit 1040 may include display panel 1041, optionally, using LCD or can have The forms such as machine light emitting diode (Organic Light-Emitting Diode, OLED) configure display panel 1041.
It should be noted that contact panel 1031 can cover display panel 1041, touch display screen is formed, when the touch display screen Detect after the touch operation on or near it, processor 1050 is sent to determine the type of touch event, with post processing Device 1050 provides corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.The Application Program Interface viewing area And arrangement mode of the conventional control viewing area is not limited, can be arranged above and below, left-right situs etc. can distinguish two and show Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface element such as the icon comprising at least one application program and/or widget desktop controls.The Application Program Interface viewing area It can also be the empty interface not comprising any content.The conventional control viewing area is used to show the higher control of utilization rate, for example, Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..
Wherein processor 1050 is the control centre of mobile terminal 1 000, utilizes various interfaces and connection whole mobile phone Various pieces, by operation or perform and be stored in software program and/or module in first memory 1021, and call and deposit The data in second memory 1022 are stored up, the various functions and processing data of mobile terminal 1 000 are performed, so as to mobile whole End 1000 carries out integral monitoring.Optionally, processor 1050 may include one or more processing units.
In embodiments of the present invention, mobile terminal 1 000 also includes:It is stored on memory 1021 and can be in processor The encryption and decryption process program run on 1050, can be the encryption and decryption process program in application program specifically, plus Close and decryption processing routine realizes following steps when being performed by processor 1050:Detect the arrangement state of object in destination folder Whether change;If the arrangement state for detecting object in the destination folder is changed, by the target after change The arrangement state of object is compared with default decryption arrangement state in file;If the row of object in the destination folder Cloth state matches with the decryption arrangement state, then sets the destination object in encrypted state in the destination folder For decrypted state;Wherein, the startup authority and/or operating right of the destination object in encrypted state are closed mode; The arrangement state includes:In the number of object in the destination folder, the putting in order of object, the spread geometry of object At least one of.
Optionally, following steps can be also realized when encryption and decryption process program is performed by processor 1050:Detection is to institute State the object moving operation of destination folder;If detecting the object moving operation, by institute after the object moving operation The arrangement state and the decryption arrangement state for stating object in destination folder are compared.
Optionally, the object moving operation includes at least one of following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
Optionally, following steps can be also realized when encryption and decryption process program is performed by processor 1050:Detection triggering Instruction, the triggering command is the instruction that the destination object is encrypted for triggering that is used for pre-set;If detecting institute Triggering command is stated, then the destination object in decrypted state in the destination folder is set to encrypted state;By the mesh The arrangement state of object is adjusted to default first encryption arrangement state in mark file;Wherein, in described in decrypted state The startup authority and/or operating right of destination object are opening.
Optionally, following steps can be also realized when encryption and decryption process program is performed by processor 1050:If detecting The arrangement state of object is the default second encryption arrangement state by the decryption arrangement state change in the destination folder, The destination object in decrypted state in the destination folder is then set to encrypted state;Wherein, the second encryption row Cloth state is different from the arrangement state of the decryption arrangement state.
Optionally, following steps can be also realized when encryption and decryption process program is performed by processor 1050:Receive user The encryption information to the destination folder of input;
Wherein, the encryption information includes:At least one corresponding destination object of the destination folder, the target text The corresponding decryption arrangement state of part folder, and at least one corresponding encryption arrangement state of the destination folder.
Optionally, the object includes application program or file.
Mobile terminal 1 000 can realize each process that mobile terminal is realized in previous embodiment, to avoid repeating, this In repeat no more.
Whether the arrangement state of object changes in the mobile terminal 1 000 of the embodiment of the present invention, detection destination folder; If the arrangement state for detecting object in the destination folder is changed, by object in the destination folder after change Arrangement state with it is default decryption arrangement state be compared;If in the destination folder arrangement state of object with it is described Decryption arrangement state matches, then the destination object in encrypted state in the destination folder is set into decrypted state. So, the embodiment of the present invention is right in destination folder by pre-setting the decryption arrangement state for decrypting destination object When the arrangement state of elephant matches with decryption arrangement state, destination object is decrypted, it is on the contrary then to destination object progress Encryption.It can be seen that, it is seen then that the embodiment of the present invention can realize the privacy protection to destination object;Destination folder can be passed through Multiple destination objects are uniformly controlled, is respectively controlled compared to single target object, improves mobile terminal pair The control efficiency of destination object;The arrangement state of object is as encryption and decryption means using in destination folder, for user Speech is not only directly perceived, simple to operation, and is difficult to discover for other people, improves the security of destination object encryption.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually Performed with hardware or software mode, depending on the application-specific and design constraint of technical scheme.Professional and technical personnel Described function can be realized using distinct methods to each specific application, but this realization is it is not considered that exceed The scope of the present invention.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description, The specific work process of mobile terminal and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
, can be by it in embodiment provided herein, it should be understood that disclosed mobile terminal and method Its mode is realized.For example, mobile terminal embodiment described above is only schematical, for example, stroke of the unit Point, only a kind of division of logic function can have other dividing mode when actually realizing, such as multiple units or component can To combine or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, it is shown or beg for The coupling each other of opinion or direct-coupling or communication connection can be by some interfaces, mobile terminal or unit it is indirect Coupling is communicated to connect, and can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs Purpose.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.
If the function is realized using in the form of SFU software functional unit and is used as independent production marketing or in use, can be with It is stored in a computer read/write memory medium.Understood based on such, technical scheme is substantially in other words The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are to cause a computer equipment (can be individual People's computer, server, or network equipment etc.) perform all or part of step of each of the invention embodiment methods described. And foregoing storage medium includes:USB flash disk, mobile hard disk, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes Medium.
The encryption and decryption process that is stored with computer-readable recording medium program, the encryption and decryption process journey Realized when sequence is executed by processor:Whether the arrangement state of object changes in detection destination folder;If detecting the mesh The arrangement state of object is changed in mark file, then by the arrangement state of object in the destination folder after change and in advance If decryption arrangement state be compared;If the arrangement state of object and the decryption arrangement state phase in the destination folder Matching, then be set to decrypted state by the destination object in encrypted state in the destination folder;Wherein, in encryption shape The startup authority and/or operating right of the destination object of state are closed mode;The arrangement state includes:The target text At least one of in the number of object in part folder, the putting in order of object, the spread geometry of object.
Optionally, realized when the encryption and decryption process program is executed by processor:Detection is to the destination folder Object moving operation;If detecting the object moving operation, by the destination folder after the object moving operation The arrangement state of middle object is compared with the decryption arrangement state.
Optionally, the object moving operation includes at least one of following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
Optionally, realized when the encryption and decryption process program is executed by processor:Detect triggering command, the triggering Instruct to pre-set is used for the instruction that the destination object is encrypted for triggering;If detecting the triggering command, Destination object in decrypted state in the destination folder is set to encrypted state;By object in the destination folder Arrangement state be adjusted to it is default first encryption arrangement state;Wherein, the startup of the destination object in decrypted state Authority and/or operating right are opening.
Optionally, realized when the encryption and decryption process program is executed by processor:If detecting the file destination The arrangement state of object is the default second encryption arrangement state by the decryption arrangement state change in folder, then by the target The destination object in decrypted state is set to encrypted state in file;Wherein, it is described second encryption arrangement state with it is described The arrangement state for decrypting arrangement state is different.
Optionally, realized when the encryption and decryption process program is executed by processor:Receive user input to described The encryption information of destination folder;Wherein, the encryption information includes:At least one corresponding target pair of the destination folder As the destination folder is corresponding to decrypt arrangement state, and at least one corresponding encryption arrangement shape of the destination folder State.
Optionally, the object includes application program or file.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.

Claims (16)

1. a kind of encryption and decryption approaches, applied to mobile terminal, it is characterised in that including:
Whether the arrangement state of object changes in detection destination folder;
If the arrangement state for detecting object in the destination folder is changed, by the destination folder after change The arrangement state of object is compared with default decryption arrangement state;
If the arrangement state of object matches with the decryption arrangement state in the destination folder, by the file destination The destination object in encrypted state is set to decrypted state in folder;
Wherein, the startup authority and/or operating right of the destination object in encrypted state are closed mode;The arrangement State includes:The title of object in the destination folder, the number of object, the putting in order of object, the spread geometry of object At least one of in.
2. according to the method described in claim 1, it is characterised in that the arrangement state of object is in the detection destination folder It is not no the step of change, including:
Detect the object moving operation to the destination folder;
, will be right in the destination folder after change if the arrangement state of object is changed in the destination folder The step of arrangement state of elephant is compared with default decryption arrangement state, including:
If detecting the object moving operation, by the arrangement of object in the destination folder after the object moving operation State is compared with the decryption arrangement state.
3. method according to claim 2, it is characterised in that the object moving operation includes at least one of following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
4. according to the method described in claim 1, it is characterised in that encrypted state will be in the destination folder described Destination object the step of be set to decrypted state after, methods described also includes:
Triggering command is detected, the triggering command is the finger that the destination object is encrypted for triggering that is used for pre-set Order;
If detecting the triggering command, the destination object in decrypted state in the destination folder is set to encryption State;
The arrangement state of object in the destination folder is adjusted to default first encryption arrangement state;
Wherein, the startup authority and/or operating right of the destination object in decrypted state are opening.
5. according to the method described in claim 1, it is characterised in that encrypted state will be in the destination folder described Destination object the step of be set to decrypted state after, methods described also includes:
If it is default second to detect the arrangement state of object in the destination folder by decryption state change of arranging Arrangement state is encrypted, then the destination object in decrypted state in the destination folder is set to encrypted state;
Wherein, the second encryption arrangement state is different from the arrangement state of the decryption arrangement state.
6. according to the method described in claim 1, it is characterised in that the arrangement state of object in the detection destination folder Before the step of whether changing, methods described also includes:
Receive the encryption information to the destination folder of user's input;
Wherein, the encryption information includes:At least one corresponding destination object of the destination folder, the destination folder Corresponding decryption arrangement state, and at least one corresponding encryption arrangement state of the destination folder.
7. according to the method described in claim 1, it is characterised in that the object includes application program or file.
8. a kind of mobile terminal, it is characterised in that including:
First detection module, for detecting whether the arrangement state of object in destination folder changes;
Comparing module, if being changed for the arrangement state for detecting object in the destination folder, by the institute after change The arrangement state and default decryption arrangement state for stating object in destination folder are compared;
First setup module, if arrangement state and the decryption arrangement state phase for object in the destination folder Match somebody with somebody, then the destination object in encrypted state in the destination folder is set to decrypted state;
Wherein, the startup authority and/or operating right of the destination object in encrypted state are closed mode;The arrangement State includes:The title of object in the destination folder, the number of object, the putting in order of object, the spread geometry of object At least one of in.
9. mobile terminal according to claim 8, it is characterised in that the first detection module specifically for:Detection pair The object moving operation of the destination folder;
The comparing module specifically for:, will be described after the object moving operation if detecting the object moving operation The arrangement state of object is compared with the decryption arrangement state in destination folder.
10. mobile terminal according to claim 9, it is characterised in that the object moving operation includes following at least one :
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
11. mobile terminal according to claim 8, it is characterised in that the mobile terminal also includes:
Second detection module, for detecting triggering command, the triggering command is to pre-set for triggering to the target The instruction that object is encrypted;
Second setup module, if for detecting the triggering command, decrypted state will be in the destination folder Destination object is set to encrypted state;
Adjusting module, for the arrangement state of object in the destination folder to be adjusted into default first encryption arrangement shape State;
Wherein, the startup authority and/or operating right of the destination object in decrypted state are opening.
12. mobile terminal according to claim 8, it is characterised in that the mobile terminal also includes:
3rd setup module, if for detecting the arrangement state of object in the destination folder by the decryption arrangement state Change turns to default second encryption arrangement state, then is set to the destination object in decrypted state in the destination folder Encrypted state;
Wherein, the second encryption arrangement state is different from the arrangement state of the decryption arrangement state.
13. mobile terminal according to claim 8, it is characterised in that the mobile terminal also includes:
Receiving module, the encryption information to the destination folder for receiving user's input;
Wherein, the encryption information includes:At least one corresponding destination object of the destination folder, the destination folder Corresponding decryption arrangement state, and at least one corresponding encryption arrangement state of the destination folder.
14. mobile terminal according to claim 8, it is characterised in that the object includes application program or file.
15. a kind of mobile terminal, it is characterised in that including processor, memory is stored on the memory and can be described The encryption and decryption process program run on processor, is realized when the encryption and decryption process program is by the computing device The step of encryption and decryption approaches as any one of claim 1 to 8.
16. a kind of computer-readable recording medium, it is characterised in that be stored with the computer-readable recording medium encryption and Decryption processing program, is realized such as any one of claim 1 to 8 institute when the encryption and decryption process program is executed by processor The step of encryption and decryption approaches stated.
CN201710377339.7A 2017-05-25 2017-05-25 A kind of encryption and decryption approaches and mobile terminal Active CN107220552B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710377339.7A CN107220552B (en) 2017-05-25 2017-05-25 A kind of encryption and decryption approaches and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710377339.7A CN107220552B (en) 2017-05-25 2017-05-25 A kind of encryption and decryption approaches and mobile terminal

Publications (2)

Publication Number Publication Date
CN107220552A true CN107220552A (en) 2017-09-29
CN107220552B CN107220552B (en) 2019-11-05

Family

ID=59945390

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710377339.7A Active CN107220552B (en) 2017-05-25 2017-05-25 A kind of encryption and decryption approaches and mobile terminal

Country Status (1)

Country Link
CN (1) CN107220552B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090282248A1 (en) * 2008-05-09 2009-11-12 International Business Machines Corporation. Method and system for securing electronic mail
CN102737199A (en) * 2011-04-15 2012-10-17 富泰华工业(深圳)有限公司 Electronic device with use authority management function and method
CN103488918A (en) * 2013-09-18 2014-01-01 广东欧珀移动通信有限公司 Application encrypting method and device for intelligent terminal
CN104915601A (en) * 2014-03-12 2015-09-16 三星电子株式会社 System and method of encrypting folder in device
CN105868617A (en) * 2016-03-25 2016-08-17 维沃移动通信有限公司 Application encryption method and mobile terminal
CN105893854A (en) * 2016-03-30 2016-08-24 北京小米移动软件有限公司 Encryption and decryption method and device
CN106250754A (en) * 2016-07-27 2016-12-21 维沃移动通信有限公司 The control method of a kind of application program and mobile terminal
CN106599702A (en) * 2016-12-08 2017-04-26 武汉斗鱼网络科技有限公司 File encryption/decryption method and device
CN106599723A (en) * 2016-12-19 2017-04-26 武汉斗鱼网络科技有限公司 File encryption method and device, and file decryption method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090282248A1 (en) * 2008-05-09 2009-11-12 International Business Machines Corporation. Method and system for securing electronic mail
CN102737199A (en) * 2011-04-15 2012-10-17 富泰华工业(深圳)有限公司 Electronic device with use authority management function and method
CN103488918A (en) * 2013-09-18 2014-01-01 广东欧珀移动通信有限公司 Application encrypting method and device for intelligent terminal
CN104915601A (en) * 2014-03-12 2015-09-16 三星电子株式会社 System and method of encrypting folder in device
CN105868617A (en) * 2016-03-25 2016-08-17 维沃移动通信有限公司 Application encryption method and mobile terminal
CN105893854A (en) * 2016-03-30 2016-08-24 北京小米移动软件有限公司 Encryption and decryption method and device
CN106250754A (en) * 2016-07-27 2016-12-21 维沃移动通信有限公司 The control method of a kind of application program and mobile terminal
CN106599702A (en) * 2016-12-08 2017-04-26 武汉斗鱼网络科技有限公司 File encryption/decryption method and device
CN106599723A (en) * 2016-12-19 2017-04-26 武汉斗鱼网络科技有限公司 File encryption method and device, and file decryption method and device

Also Published As

Publication number Publication date
CN107220552B (en) 2019-11-05

Similar Documents

Publication Publication Date Title
CN106127076B (en) A kind of inspection method and mobile terminal of photograph album photo
CN104834449B (en) The icon management method and device of mobile terminal
EP2390812A1 (en) Method and apparatus for controlling objects of a user interface
CN104123164B (en) A kind of startup method and apparatus of application program
CN106203061B (en) Encryption method of application program and mobile terminal
CN104463004A (en) Method and device for protecting interface content
CN106485164A (en) A kind of image processing method and mobile terminal
CN107632870A (en) The startup method and terminal of a kind of application
CN106156600B (en) A kind of unlocking method and mobile terminal of application program
CN106228085B (en) The method for secret protection and mobile terminal of application program
CN106648382A (en) Picture browsing method and mobile terminal
CN107644170A (en) A kind of image processing method and mobile terminal
CN106708658A (en) Data backup method, mobile terminal and storage server
CN106355109A (en) File encryption method and mobile terminal
CN107229396A (en) A kind of hiding method of mobile terminal application icon and mobile terminal
CN105243331A (en) Encryption device and encryption method, and decryption device and decryption method
CN105809000A (en) Information processing method and electronic device
CN106027794A (en) Encryption method of photo and mobile terminal
CN107103224A (en) A kind of unlocking method and mobile terminal
CN106384060B (en) A kind of mobile terminal data encryption method and mobile terminal
CN106250757A (en) The control method of a kind of application program and mobile terminal
CN106407027A (en) An information display method for a mobile terminal and a mobile terminal
CN107506198A (en) The display methods and mobile terminal of a kind of mobile terminal
CN106778344B (en) A kind of data permission control method and terminal
CN106709320A (en) Identity authentication method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant