CN107220552B - A kind of encryption and decryption approaches and mobile terminal - Google Patents

A kind of encryption and decryption approaches and mobile terminal Download PDF

Info

Publication number
CN107220552B
CN107220552B CN201710377339.7A CN201710377339A CN107220552B CN 107220552 B CN107220552 B CN 107220552B CN 201710377339 A CN201710377339 A CN 201710377339A CN 107220552 B CN107220552 B CN 107220552B
Authority
CN
China
Prior art keywords
destination folder
arrangement state
state
decryption
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710377339.7A
Other languages
Chinese (zh)
Other versions
CN107220552A (en
Inventor
彭兰华
康新龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201710377339.7A priority Critical patent/CN107220552B/en
Publication of CN107220552A publication Critical patent/CN107220552A/en
Application granted granted Critical
Publication of CN107220552B publication Critical patent/CN107220552B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The present invention provides a kind of encryption and decryption approaches and mobile terminal, and wherein whether method includes: and detect the arrangement state of object in destination folder to change;If detecting, the arrangement state of object in the destination folder is changed, and the arrangement state of object in the destination folder after variation is compared with preset decryption arrangement state;If the arrangement state of object matches with the decryption arrangement state in the destination folder, decrypted state is set by the target object for being in encrypted state in the destination folder.The embodiment of the present invention can be realized the privacy protection to target object;Multiple target objects can be uniformly controlled by destination folder, improve mobile terminal to the control efficiency of target object;The arrangement state of object is not only intuitive, simple to operation for a user, but also be not easy to discover for other people as encryption and decryption means using in destination folder, improves the safety that target object encrypts.

Description

A kind of encryption and decryption approaches and mobile terminal
Technical field
The present invention relates to field of communication technology more particularly to a kind of encryption and decryption approaches and mobile terminals.
Background technique
As mobile terminal intelligence degree increasingly improves, the purposes of mobile terminal is more and more extensive.In mobile terminal Various objects (such as application program, file) are that the life of user brings convenience.With pay class application program (APP, Application for), this class object almost becomes indispensable object of most of user installation in mobile terminal.Usually this It include individual privacy information or property safety information in a little objects, these objects lack privacy protection at present, anyone is Arbitrarily it can check or use, may cause individual privacy information exposure or property loss.As it can be seen that in existing mobile terminal Object lack privacy protection.
Summary of the invention
The embodiment of the present invention provides a kind of encryption and decryption approaches and mobile terminal, to solve pair in existing mobile terminal The problem of as lacking privacy protection.
In a first aspect, being applied to mobile terminal the embodiment of the invention provides a kind of encryption and decryption approaches, comprising:
Whether the arrangement state of object changes in detection destination folder;
If detecting, the arrangement state of object in the destination folder is changed, by the file destination after variation The arrangement state of object is compared with preset decryption arrangement state in folder;
If the arrangement state of object matches with the decryption arrangement state in the destination folder, by the target Target object in file in encrypted state is set as decrypted state;
Wherein, the starting permission of the target object in encrypted state and/or operating right are in off state;It is described Arrangement state include: the number of object in the destination folder, the putting in order of object, in the spread geometry of object at least One.
Second aspect, the embodiment of the present invention also provide a kind of mobile terminal, comprising:
Whether first detection module, the arrangement state for detecting object in destination folder change;
Comparison module, if for detecting that the arrangement state of object in the destination folder changes, after changing The destination folder in the arrangement state of object be compared with preset decryption arrangement state;
First setup module, if arrangement state and the decryption arrangement state phase for object in the destination folder Matching then sets decrypted state for the target object for being in encrypted state in the destination folder;
Wherein, the starting permission of the target object in encrypted state and/or operating right are in off state;It is described Arrangement state include: the number of object in the destination folder, the putting in order of object, in the spread geometry of object at least One.
The third aspect, the embodiment of the present invention also provide another mobile terminal, including processor, memory, are stored in institute State the encryption and decryption process program that can be run on memory and on the processor, the encryption and decryption process program quilt The step of processor realizes above-mentioned encryption and decryption approaches when executing.
Fourth aspect, the embodiment of the present invention also provide a kind of computer readable storage medium, the computer-readable storage Encryption and decryption process program is stored on medium, the encryption and decryption process program realizes above-mentioned add when being executed by processor The step of close and decryption method.
In this way, whether being changed in the embodiment of the present invention by the arrangement state of object in detection destination folder;If inspection The arrangement state for measuring object in the destination folder changes, then by the row of object in the destination folder after variation Cloth state is compared with preset decryption arrangement state;If the arrangement state of object and the decryption in the destination folder Arrangement state matches, then sets decrypted state for the target object for being in encrypted state in the destination folder.This hair Bright embodiment can be realized the privacy protection to target object;It can be united by destination folder to multiple target objects One control, is respectively controlled compared to single target object, improves mobile terminal to the control efficiency of target object;With The arrangement state of object is used as encryption and decryption means in destination folder, not only intuitive, simple to operation for a user, and And be not easy to discover for other people, improve the safety of target object encryption.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention Attached drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, For those of ordinary skill in the art, without any creative labor, it can also obtain according to these attached drawings Take other attached drawings.
Fig. 1 is one of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention;
Fig. 2 is the two of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention;
Fig. 2-1 is the schematic diagram that destination folder provided in an embodiment of the present invention shows encryption identification;
Fig. 2-2 is the schematic diagram that destination folder provided in an embodiment of the present invention shows operation button;
Fig. 3 is the three of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention;
Fig. 4 is the four of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention;
Fig. 5 is one of the structure chart of mobile terminal provided in an embodiment of the present invention;
Fig. 6 is the two of the structure chart of mobile terminal provided in an embodiment of the present invention;
Fig. 7 is the three of the structure chart of mobile terminal provided in an embodiment of the present invention;
Fig. 8 is the four of the structure chart of mobile terminal provided in an embodiment of the present invention;
Fig. 9 is the five of the structure chart of mobile terminal provided in an embodiment of the present invention;
Figure 10 is the six of the structure chart of mobile terminal provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, those of ordinary skill in the art's acquired every other implementation without creative efforts Example, shall fall within the protection scope of the present invention.
It is one of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention referring to Fig. 1, Fig. 1, as shown in Figure 1, This method is applied to mobile terminal, comprising the following steps:
Whether the arrangement state of object changes in step 101, detection destination folder.
The embodiment of the present invention is adapted to any object in mobile terminal, i.e. the embodiment of the present invention can be to mobile whole Control is encrypted and decrypted in any object in end.For example, the object can be stored in the application program in mobile terminal APP (such as social category APP, payment class APP, media player or browser etc.), is also possible to be stored in mobile terminal Miscellaneous Documents (such as picture, audio, video or document etc.).
The embodiment of the present invention is real by way of the arrangement state of object in setting destination folder and destination folder The purpose that now target object in destination folder is encrypted or decrypted.
Here, target object is different from the object of common meaning, the object of common meaning can arbitrarily be checked or by Use, target object can be checked or be used only under decrypted state, and can not then be checked in encrypted state or Person is used.
Likewise, destination folder is different from the file of common meaning, the arrangement state of object is determined in destination folder Fixed target object therein is in encrypted state or decrypted state.
In mobile terminal the quantity of destination folder can be at least one, the number of target object in each destination folder Amount may be at least one.Destination folder can be any file in mobile terminal, for example, for consolidation picture Photograph album file is set to the desktop folder that consolidation APP is used on mobile terminal desktop for the file of consolidation document, Etc..
Wherein, the arrangement state of object may include at least one of following in destination folder: object in destination folder Title;The number of object in destination folder;Object puts in order in destination folder;The row of object in destination folder Column shape.The different arrangement state of complexity can be arranged according to encryption requirements in user.
The embodiment of the present invention lays particular emphasis on the method that the target object in encrypted state is decrypted, individually below from step Rapid 101 are specifically described to step 103.
In the step, whether the arrangement state that mobile terminal can detecte object in destination folder is changed.It can manage Xie Wei, target object is in encrypted state in current goal file.If detecting the arrangement shape of object in destination folder State changes, then continues to execute step 102;If the arrangement state that object in destination folder is not detected changes, tie The beam process.
If step 102 detects that the arrangement state of object in the destination folder changes, described in after variation The arrangement state of object is compared with preset decryption arrangement state in destination folder.
In a step 101, if mobile terminal detects that the arrangement state of object in destination folder changes, at this In step, the arrangement state of object in the destination folder after the available variation of mobile terminal, and the target after variation is literary The arrangement state of object is compared with decryption arrangement state in part folder.
Wherein, it is pre-set to can be user for decryption arrangement state, and after setting, decryption arrangement state is become Decrypt the password of target object in destination folder.At any time, user can be to the decryption arrangement state set before It is modified.
It, will if the arrangement state of object matches with the decryption arrangement state in step 103, the destination folder Target object in the destination folder in encrypted state is set as decrypted state.
In a step 102, if the arrangement state of object matches with decryption arrangement state in destination folder, at this In step, mobile terminal can set decrypted state for the target object for being in encrypted state in destination folder.It can manage Xie Wei, the starting permission and/or operating right of the target object in encrypted state are in off state.
So far, the target object in destination folder, which is decrypted, completes, and user can check or using in destination folder Target object.
As it can be seen that user can make mobile terminal that will be in and add by adjusting the arrangement state of object in the destination folder The target object of close state is decrypted.It is readily appreciated that, user's (or mobile terminal) can also be by adjusting the destination folder The arrangement state of middle object encrypts mobile terminal by the target object in decrypted state, it is thus possible to realize to mesh Mark the privacy protection of object;Multiple target objects can be uniformly controlled by destination folder, compared to single Target object is respectively controlled, and improves mobile terminal to the control efficiency of target object;With object in destination folder Arrangement state is used as encryption and decryption means, not only intuitive, simple to operation for a user, but also is not easy to discover for other people, Improve the safety of target object encryption
In the embodiment of the present invention, above-mentioned mobile terminal can be any equipment with file setting function, such as: meter Calculation machine (Computer), mobile phone, tablet computer (Tablet Personal Computer), laptop computer (Laptop Computer), personal digital assistant (personal digital assistant, abbreviation PDA), mobile Internet access electronic equipment (Mobile Internet Device, MID), wearable device (Wearable Device) etc..
Whether the encryption and decryption approaches of the embodiment of the present invention, the arrangement state for detecting object in destination folder have change Change;If detecting, the arrangement state of object in the destination folder is changed, will be in the destination folder after variation The arrangement state of object is compared with preset decryption arrangement state;If in the destination folder arrangement state of object with The decryption arrangement state matches, then sets decryption shape for the target object for being in encrypted state in the destination folder State.In this way, the embodiment of the present invention passes through the decryption arrangement state preset for decrypting target object, in destination folder When the arrangement state of object and decryption arrangement state match, target object is decrypted, it is on the contrary then to target object into Row encryption.As it can be seen that the embodiment of the present invention can be realized the privacy protection to target object;It can be by destination folder to more A target object is uniformly controlled, and is respectively controlled compared to single target object, improves mobile terminal to target The control efficiency of object;The arrangement state of object is as encryption and decryption means using in destination folder, for a user not It is only intuitive, simple to operation, and be not easy to discover for other people, improve the safety of target object encryption.
Referring to fig. 2, Fig. 2 is the two of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention, as shown in Fig. 2, This method is applied to mobile terminal, comprising the following steps:
Step 201, the encryption information to destination folder for receiving user's input.
Wherein, encryption information includes: at least one corresponding target object of destination folder, the corresponding solution of destination folder Solid matter cloth state and at least one corresponding encryption arrangement state of destination folder.
In the embodiment of the present invention, can corresponding encryption information, the encryption information be arranged for destination folder in advance in user It may include at least one corresponding target object of destination folder and the corresponding decryption arrangement state of destination folder.With During presetting encryption information the number for the object for including in destination folder can be arranged according to the demand of user in family Which measure, specifically comprising information such as target objects in destination folder.At any time, user can add to what is set before Confidential information is modified, to realize the update of encryption information.
It is in advance destination folder setting encryption information by user, user can be according to itself in the embodiment of the present invention Habit and demand, to encryption information carry out flexible setting.
The embodiment of the present invention is adapted to any object in mobile terminal, i.e. the embodiment of the present invention can be to mobile whole Control is encrypted and decrypted in any object in end.For example, the object can be stored in the application program in mobile terminal APP (such as social category APP, payment class APP, media player or browser etc.), is also possible to be stored in mobile terminal Miscellaneous Documents (such as picture, audio, video or document etc.).
For example, at least one corresponding target object of destination folder can be set in user are as follows: short message APP, wechat APP, Phone APP and photograph album APP, it is that the destination folder only wraps that the corresponding decryption arrangement state of the destination folder, which can be set, in user Include aforementioned four APP and put in order it is unlimited, user can be set the destination folder it is corresponding at least one encryption arrangement shape State include: any one of aforementioned four APP APP removed into the destination folder and be added in the destination folder to Few other APP.
Step 202, detection are to the object moving operation of the destination folder.
The embodiment of the present invention is real by way of the arrangement state of object in setting destination folder and destination folder The purpose that now target object in destination folder is encrypted or decrypted.
Wherein, the arrangement state of object may include at least one of following in destination folder: object in destination folder Title;The number of object in destination folder;Object puts in order in destination folder;The row of object in destination folder Column shape.The different arrangement state of complexity can be arranged according to encryption requirements in user.
The embodiment of the present invention lays particular emphasis on the method that the target object in encrypted state is decrypted, individually below from step Rapid 202 are specifically described to step 204.
In the step, mobile terminal can detecte the object moving operation to destination folder, it can be understood as, current mesh Target object is in encrypted state in mark file.If detected to the object moving operation of destination folder, show mesh The arrangement state of object changes in mark file, then continues to execute step 203;If pair to destination folder is not detected As moving operation, then shows that the arrangement state of object in destination folder does not change, then terminate the process.
Optionally, the object moving operation in step 202 includes at least one of the following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
In embodiment of the present invention, the object moving operation of destination folder can be to move at least one object and be somebody's turn to do Operation in destination folder is also possible to removing at least one object into the operation in the destination folder, can also be shifting The operation for moving position of at least one object in the destination folder in the destination folder can also be two kinds of any of the above Or the combination of a variety of operations.The above object moving operation strong operability is not only simple but also quick when operation.
For example, the encryption for receiving user's input refers in step 201 after the encryption information of the good destination folder of user setting It enables, sets encrypted state for the target object of the destination folder.For example, it may be including short message APP, wechat APP, electricity It talks about and increases a game APP in the file destination of APP and photograph album APP, and phone APP is removed into the destination folder.
After user inputs encrypted instruction, user can not open short message APP, wechat APP, phone APP and photograph album APP Dynamic and/or operation.
If desired user starts and/or operates the target object in encrypted state, then needing will be in the destination folder Arrangement state be adjusted to decryption arrangement state.That is, in step 202, user can be to pair in destination folder As being moved, for example, the game APP in the destination folder can be removed the destination folder, and again by phone APP Move into the destination folder.
If step 203 detects the object moving operation, by the destination folder after the object moving operation The arrangement state of middle object is compared with preset decryption arrangement state.
In step 202, if mobile terminal detects the object moving operation to destination folder, in the step In, after the available object moving operation of mobile terminal, the arrangement state of object in destination folder, and what be will acquire is somebody's turn to do Arrangement state is compared with decryption arrangement state.
Wherein, it is pre-set to can be user for decryption arrangement state, and after setting, decryption arrangement state is become Decrypt the password of target object in destination folder.At any time, user can be to the decryption arrangement state set before It is modified.
For example, mobile terminal can be by movement after user carries out moving operation to object in destination folder in step 202 Arrangement state after operation is compared with the decryption arrangement state being arranged in step 201.
If the game APP in the destination folder is removed the destination folder by user, and phone APP is moved into again The destination folder, then the arrangement state after moving operation matches with the decryption arrangement state being arranged in step 201.It is no Then, then it mismatches.
It, will if the arrangement state of object matches with the decryption arrangement state in step 204, the destination folder Target object in the destination folder in encrypted state is set as decrypted state.
In step 203, if the arrangement state of object matches with decryption arrangement state in destination folder, at this In step, mobile terminal can set decrypted state, thus energy for the target object for being in encrypted state in destination folder Enough realize protects the privacy of target object;Multiple target objects can be uniformly controlled by destination folder, phase Than being respectively controlled in single target object, mobile terminal is improved to the control efficiency of target object;With file destination In folder object arrangement state as encryption and decryption means, it is not only intuitive, simple to operation for a user, and be not easy for Other people discover, and improve the safety of target object encryption.
For example, the game APP in the destination folder is removed the destination folder by user, and phone APP is moved again Enter the destination folder, the arrangement state of object matches with decryption arrangement state in destination folder, in destination folder This four APP of short message APP, wechat APP, phone APP and photograph album APP are changed to decrypted state by encrypted state, and user can be with Any of them APP is started and/or operated.
So far, the target object in destination folder, which is decrypted, completes, and user can check or using in destination folder Target object.
As it can be seen that user can be by the object moving operation to destination folder, to adjust object in the destination folder Arrangement state, mobile terminal is decrypted will in the target object of encrypted state.It is readily appreciated that, user (or it is mobile whole End) it can also be made by the object moving operation to destination folder to adjust the arrangement state of object in the destination folder Mobile terminal encrypts the target object in decrypted state.
In the embodiment of the present invention, other than step 201 to step 203, remaining step can be with invention shown in FIG. 1 Embodiment is identical, and to avoid repeating, same section is not repeated.
As a kind of preferable encryption and decryption approaches, one or several target objects can be gathered as one, when And if only if user could open the mesh in destination folder when containing all corresponding target objects in destination folder Object is marked, i.e. decryption arrangement state is the arrangement state in destination folder comprising all corresponding target objects.
User or mobile terminal wherein some target object or certain several target object can will remove file destination Folder, perhaps toward one or several plain objects of immigration in destination folder or by the sequence of target object in destination folder It is adjusted, or moves into one or several other destination folders pair for being different from the destination folder in destination folder Target object answered, etc., to achieve the purpose that encryption.
When user needs to decrypt the target object in destination folder, can by inverse operations, for example, by removal certain One target object or certain several target object move into destination folder again, or the plain objects that will move into remove target text Part folder, the sequence of target object in destination folder is perhaps adjusted to correct sequence or what be will move into be different from the target The corresponding target object of other destination folders of file removes the destination folder, etc..
Optionally, the destination folder shows encryption identification.
In embodiment of the present invention, encryption identification can be shown on destination folder by mobile terminal, such as Fig. 2-1 institute Show, the upper left corner of destination folder shows an encryption identification 211, is convenient for user area partial objectives for file and normal folder.
In addition, encryption identification can change with the cryptographic attributes of file and be changed, when the encryption function of file is opened When, encryption identification can be shown on destination folder;When the encryption function of file is closed, the encryption identification of this document folder It can disappear.
It should be noted that the form that is particularly shown of encryption identification is not limited to form shown in Fig. 2-1.
Embodiment of the present invention can also embodiment as shown in connection with fig. 1 implemented, to avoid repeating, this is not done superfluous It states.
Optionally, operation button is shown in the destination folder, the operation button includes configuration button, moves into and press Button at least one of removes button or moves in and out button.
In embodiment of the present invention, mobile terminal can in destination folder display operation button, as shown in Fig. 2-2, In this way, user can carry out corresponding operation by operation button.Wherein, operation button can be configuration button, as in Fig. 2-2 Upper left side in destination folder shows a configuration button 221, which can be used to configure to destination folder Encryption information.Operation button, which can also be, moves into button 222, and moving into button 222 can help user to move object into target text Part folder;Moving into button 222 can also be removal button, user can be helped to move the object out destination folder;Move into button 222 It can also be and move in and out button, user can be helped to move object into or remove destination folder.User can also directly by Any one object in destination folder removes destination folder by drag operation, can also be by any outside destination folder A object moves into file by drag operation.
It should be noted that the form that is particularly shown of operation button is not limited to form shown in Fig. 2-2.
Embodiment of the present invention can also embodiment as shown in connection with fig. 1 implemented, to avoid repeating, this is not done superfluous It states.
The encryption and decryption approaches of the embodiment of the present invention detect the object moving operation to the destination folder;If inspection The object moving operation is measured, then by the arrangement state of object and institute in the destination folder after the object moving operation Decryption arrangement state is stated to be compared;If the arrangement state of object and the decryption arrangement state phase in the destination folder Match, then sets decrypted state for the target object for being in encrypted state in the destination folder.In this way, the embodiment of the present invention By presetting the decryption arrangement state for decrypting target object, the arrangement state Yu the solution of object in destination folder When solid matter cloth state matches, target object is decrypted, it is on the contrary then target object is encrypted.As it can be seen that the present invention is real Apply example can be realized to target object privacy protection;Unified control can be carried out to multiple target objects by destination folder System, is respectively controlled compared to single target object, improves mobile terminal to the control efficiency of target object;With target The arrangement state of object is used as encryption and decryption means in file, not only intuitive, simple to operation for a user, but also not Easily discover for other people, improves the safety of target object encryption.
It is the three of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention referring to Fig. 3, Fig. 3, as shown in figure 3, This method is applied to mobile terminal, comprising the following steps:
Whether the arrangement state of object changes in step 301, detection destination folder.
In the embodiment of the present invention, the arrangement state of object may include at least one of following in destination folder:
The title of object in destination folder;
The number of object in destination folder;
Object puts in order in destination folder;
The spread geometry of object in destination folder.
The different arrangement state of complexity can be arranged according to encryption requirements in user.
The embodiment of the present invention is laid particular emphasis on, and the target object in encrypted state is decrypted, and will be in decrypted state The method that is encrypted of target object, be specifically described individually below from step 301 to step 306.
In the step, whether the arrangement state that mobile terminal can detecte object in destination folder is changed.It can manage Xie Wei, target object is in encrypted state in current goal file.If detecting the arrangement shape of object in destination folder State changes, then continues to execute step 302;If the arrangement state that object in destination folder is not detected changes, tie The beam process.
If step 302 detects that the arrangement state of object in the destination folder changes, described in after variation The arrangement state of object is compared with preset decryption arrangement state in destination folder.
In step 301, if mobile terminal detects that the arrangement state of object in destination folder changes, at this In step, the arrangement state of object in the destination folder after the available variation of mobile terminal, and the target after variation is literary The arrangement state of object is compared with decryption arrangement state in part folder.
It, will if the arrangement state of object matches with the decryption arrangement state in step 303, the destination folder Target object in the destination folder in encrypted state is set as decrypted state.
In step 302, if the arrangement state of object matches with decryption arrangement state in destination folder, at this In step, mobile terminal can set decrypted state for the target object for being in encrypted state in destination folder.
Step 304, detection triggering command.
In this step, mobile terminal can detect triggering command.Wherein, which is pre-set For triggering the instruction encrypted to target object.
Here, triggering command, which can be mobile terminal and put out, shields corresponding instruction, and it is corresponding to be also possible to mobile terminal screen locking Instruction is also possible to mobile terminal shutdown or restarts corresponding instruction, can also be that mobile terminal receives some user's operation The instruction of (such as to clicking operation of trigger button, gesture graph etc.).
If step 305 detects the triggering command, the target pair of decrypted state will be in the destination folder As being set as encrypted state.
In step 304, if mobile terminal detects triggering command, in this step, mobile terminal can be responded The target object for being in decrypted state in destination folder is set encrypted state by the triggering command.At this point, destination folder In target object encrypted state is transformed by decrypted state, user cannot check or using the target in destination folder Object.It is to be understood that the starting permission and/or operating right of the target object in decrypted state are open state.
The arrangement state of object in the destination folder is adjusted to preset first encryption arrangement state by step 306.
Since the embodiment of the present invention is the arrangement state by object in setting destination folder and destination folder Mode realizes the purpose that the target object in destination folder is encrypted or decrypted.In step 305, destination folder In target object encrypted state is transformed by decrypted state, correspondingly, in this step, mobile terminal is needed target The arrangement state of object is adjusted in file, it can the arrangement state of object in destination folder is adjusted to first and is added Solid matter cloth state.
It should be noted that the sequencing that step 305 is executed with step 306 in the embodiment of the present invention is not construed as limiting, it can To execute step 306 again after executing step 305, step 305, Huo Zhetong can also be executed again after step 306 is performed Shi Zhihang step 305 and step 306.Fig. 3 shows the case where being performed simultaneously.
Wherein, the first encryption arrangement state can be user or mobile terminal is pre-set, and each destination folder can At least one first encryption arrangement state is arranged.When a destination folder it is corresponding first encryption arrangement state be two or When more than two, any first encryption arrangement state is can be randomly selected in mobile terminal.For the setting of each destination folder Multiple first encryption arrangement states, are conducive to improve level of encryption.
In the embodiment of the present invention, other than step 303 to step 306, remaining step can with shown in Fig. 1 or Fig. 2 Inventive embodiments it is identical, to avoid repeating, same section is not repeated.
Optionally, the step of whether the arrangement state of object changes in the detection destination folder, comprising:
Detect the object moving operation to the destination folder;
If the arrangement state of object changes in the destination folder, by the destination folder after variation The step of arrangement state of middle object is compared with preset decryption arrangement state, comprising:
If detecting the object moving operation, by object in the destination folder after the object moving operation Arrangement state is compared with the decryption arrangement state.
In embodiment of the present invention, the arrangement shape of object in destination folder can be adjusted by object moving operation State, reference can be made to illustrating in inventive embodiments shown in Fig. 2 does not repeat this to avoid repeating.
Optionally, the object moving operation includes at least one of the following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
In embodiment of the present invention, the object moving operation of destination folder can be to move at least one object and be somebody's turn to do Operation in destination folder is also possible to removing at least one object into the operation in the destination folder, can also be shifting The operation for moving position of at least one object in the destination folder in the destination folder can also be two kinds of any of the above Or the combination of a variety of operations.
Optionally, described before the step of whether the arrangement state of object changes in the detection destination folder Method further include:
Receive the encryption information to the destination folder of user's input;
In embodiment of the present invention, corresponding encryption information can be set for destination folder in advance, specifically, mobile whole End can receive user's input to the encryption information of destination folder.
Wherein, which may include: at least one corresponding target object of destination folder, destination folder pair At least one corresponding first encryption arrangement state of the decryption arrangement state and destination folder answered.
Embodiment of the present invention by user be in advance destination folder be arranged encryption information, user can according to itself Habit and demand carry out flexible setting to encryption information.
Embodiment of the present invention can be combined with embodiment progress embodiment shown in FIG. 1 and not make to avoid repeating to this It repeats.
As a kind of preferable encryption and decryption approaches, one or several target objects can be gathered as one, when And if only if user could open the mesh in destination folder when containing all corresponding target objects in destination folder Object is marked, i.e. decryption arrangement state is the arrangement state in destination folder comprising all corresponding target objects.
User or mobile terminal wherein some target object or certain several target object can will remove file destination Folder, perhaps toward one or several plain objects of immigration in destination folder or by the sequence of target object in destination folder It is adjusted, or moves into one or several other destination folders pair for being different from the destination folder in destination folder Target object answered, etc., to achieve the purpose that encryption.
When user needs to decrypt the target object in destination folder, can by inverse operations, for example, by removal certain One target object or certain several target object move into destination folder again, or the plain objects that will move into remove target text Part folder, the sequence of target object in destination folder is perhaps adjusted to correct sequence or what be will move into be different from the target The corresponding target object of other destination folders of file removes the destination folder, etc..
Optionally, the destination folder shows encryption identification.
In embodiment of the present invention, encryption identification can be shown on destination folder by mobile terminal, destination folder The upper left corner show an encryption identification.Embodiment of the present invention can be in order to user area partial objectives for file and ordinary file Folder.
In addition, encryption identification can change with the cryptographic attributes of file and be changed, when the encryption function of file is opened When, encryption identification can be shown on destination folder;When the encryption function of file is closed, the encryption identification of this document folder It can disappear.
Optionally, operation button is shown in the destination folder, the operation button includes configuration button, moves into and press Button at least one of removes button or moves in and out button.
In embodiment of the present invention, mobile terminal can in destination folder display operation button, in this way, user can be with Corresponding operation is carried out by operation button.Wherein, operation button can be configuration button, which can be used to mesh It marks file and configures encryption information.Operation button can also be immigration button, and moving into button can help user to move object into Destination folder;Operation button can also be removal button, and removing button can help user to move the object out destination folder; Operation button, which can also be, moves in and out button, this, which moves in and out button, can help user to move object into or remove target File.
In the embodiment of the present invention, by the way that triggering command is arranged, allow mobile terminal when detecting triggering command, certainly It is dynamic that target object in destination folder is changed to encrypted state by decrypted state, it is manually changed without user.On the one hand, it mentions The high intelligence degree of mobile terminal, reduces the operation of user;On the other hand, it is possible to reduce because user carelessness due to fail and When risk that target object is protected.
Whether the encryption and decryption approaches of the embodiment of the present invention, the arrangement state for detecting object in destination folder have change Change;If detecting, the arrangement state of object in the destination folder is changed, will be in the destination folder after variation The arrangement state of object is compared with preset decryption arrangement state;If in the destination folder arrangement state of object with The decryption arrangement state matches, then sets decryption shape for the target object for being in encrypted state in the destination folder State;Detect triggering command;If detecting the triggering command, the target object in the destination folder is set as encrypting State;The arrangement state of object in the destination folder is adjusted to preset first encryption arrangement state.In this way, of the invention Embodiment passes through the decryption arrangement state preset for decrypting target object, the arrangement state of object in destination folder When matching with decryption arrangement state, target object is decrypted, it is on the contrary then target object is encrypted.As it can be seen that this Inventive embodiments can be realized the privacy protection to target object;Multiple target objects can be carried out by destination folder It is uniformly controlled, is respectively controlled compared to single target object, improve mobile terminal to the control efficiency of target object; Using in destination folder the arrangement state of object as encryption and decryption means, it is not only intuitive, simple to operation for a user, And be not easy to discover for other people, improve the safety of target object encryption.
Referring to fig. 4, Fig. 4 is the four of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention, as shown in figure 4, This method is applied to mobile terminal, comprising the following steps:
Whether the arrangement state of object changes in step 401, detection destination folder.
In the embodiment of the present invention, the arrangement state of object may include at least one of following in destination folder:
The title of object in destination folder;
The number of object in destination folder;
Object puts in order in destination folder;
The spread geometry of object in destination folder.
The different arrangement state of complexity can be arranged according to encryption requirements in user.
The embodiment of the present invention is laid particular emphasis on, and the target object in encrypted state is decrypted, and will be in decrypted state The method that is encrypted of target object, be specifically described individually below from step 401 to step 404.
In the step, whether the arrangement state that mobile terminal can detecte object in destination folder is changed.It can manage Xie Wei, target object is in encrypted state in current goal file.If detecting the arrangement shape of object in destination folder State changes, then continues to execute step 402;If the arrangement state that object in destination folder is not detected changes, tie The beam process.
If step 402 detects that the arrangement state of object in the destination folder changes, described in after variation The arrangement state of object is compared with preset decryption arrangement state in destination folder.
In step 401, if mobile terminal detects that the arrangement state of object in destination folder changes, at this In step, the arrangement state of object in the destination folder after the available variation of mobile terminal, and the target after variation is literary The arrangement state of object is compared with decryption arrangement state in part folder.
It, will if the arrangement state of object matches with the decryption arrangement state in step 403, the destination folder Target object in the destination folder in encrypted state is set as decrypted state.
In step 402, if the arrangement state of object matches with decryption arrangement state in destination folder, at this In step, mobile terminal can set decrypted state for the target object for being in encrypted state in destination folder.
If step 404 detects the arrangement state of object in the destination folder by decryption arrangement state change For preset second encryption arrangement state, then the target object for being in decrypted state in the destination folder is set as encrypting State.
In the embodiment of the present invention, user, can under the scene for needing to encrypt the target object in destination folder The purpose of encryption is realized with the arrangement state by adjusting object in destination folder.In the step, if mobile terminal detects Into destination folder, the arrangement state of object is the second encryption arrangement state by decryption arrangement state change, then mobile terminal can To set encrypted state for the target object for being in decrypted state in destination folder.
Wherein, second encryption arrangement state can be user it is pre-set and with decryption arrangement state arrangement state Different any arrangement states.
For example, user need to borrow mobile terminal give other people in use, or it is other need the scene that encrypts under, Yong Huke The arrangement state of object in the destination folder to be adjusted, keep its arrangement state different from decryption arrangement state.
The difference of the embodiment of the present invention and inventive embodiments shown in Fig. 3 is that the embodiment of the present invention is that user adjusts manually The arrangement state of object in whole destination folder, inventive embodiments shown in Fig. 3 are that mobile terminal is detecting triggering command certainly The arrangement state of object in dynamic adjustment destination folder.No matter may be implemented using which kind of above mode to destination folder The purpose of middle target object encryption.
In the embodiment of the present invention, other than step 404, remaining step can be implemented with invention shown in fig. 1 or fig. 2 Example is identical, and to avoid repeating, same section is not repeated.
Optionally, the step of whether the arrangement state of object changes in the detection destination folder, comprising:
Detect the object moving operation to the destination folder;
If the arrangement state of object changes in the destination folder, by the destination folder after variation The step of arrangement state of middle object is compared with preset decryption arrangement state, comprising:
If detecting the object moving operation, by object in the destination folder after the object moving operation Arrangement state is compared with the decryption arrangement state.
In embodiment of the present invention, the arrangement shape of object in destination folder can be adjusted by object moving operation State, reference can be made to illustrating in inventive embodiments shown in Fig. 2 does not repeat this to avoid repeating.
Optionally, the object moving operation includes at least one of the following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
In embodiment of the present invention, the object moving operation of destination folder can be to move at least one object and be somebody's turn to do Operation in destination folder is also possible to removing at least one object into the operation in the destination folder, can also be shifting The operation for moving position of at least one object in the destination folder in the destination folder can also be two kinds of any of the above Or the combination of a variety of operations.
The above object moving operation strong operability is not only simple but also quick when operation.
Optionally, described before the step of whether the arrangement state of object changes in the detection destination folder Method further include:
Receive the encryption information to the destination folder of user's input;
In embodiment of the present invention, corresponding encryption information can be set for destination folder in advance, specifically, mobile whole End can receive user's input to the encryption information of destination folder.
Wherein, which may include: at least one corresponding target object of destination folder, destination folder pair At least one corresponding second encryption arrangement state of the decryption arrangement state and destination folder answered.
Embodiment of the present invention by user be in advance destination folder be arranged encryption information, user can according to itself Habit and demand carry out flexible setting to encryption information.
As a kind of preferable encryption and decryption approaches, one or several target objects can be gathered as one, when And if only if user could open the mesh in destination folder when containing all corresponding target objects in destination folder Object is marked, i.e. decryption arrangement state is the arrangement state in destination folder comprising all corresponding target objects.
User or mobile terminal wherein some target object or certain several target object can will remove file destination Folder, perhaps toward one or several plain objects of immigration in destination folder or by the sequence of target object in destination folder It is adjusted, or moves into one or several other destination folders pair for being different from the destination folder in destination folder Target object answered, etc., to achieve the purpose that encryption.
When user needs to decrypt the target object in destination folder, can by inverse operations, for example, by removal certain One target object or certain several target object move into destination folder again, or the plain objects that will move into remove target text Part folder, the sequence of target object in destination folder is perhaps adjusted to correct sequence or what be will move into be different from the target The corresponding target object of other destination folders of file removes the destination folder, etc..
Optionally, the destination folder shows encryption identification.
In embodiment of the present invention, encryption identification can be shown on destination folder by mobile terminal, destination folder The upper left corner show an encryption identification.Embodiment of the present invention can be in order to user area partial objectives for file and ordinary file Folder.
In addition, encryption identification can change with the cryptographic attributes of file and be changed, when the encryption function of file is opened When, encryption identification can be shown on destination folder;When the encryption function of file is closed, the encryption identification of this document folder It can disappear.
Optionally, operation button is shown in the destination folder, the operation button includes configuration button, moves into and press Button at least one of removes button or moves in and out button.
In embodiment of the present invention, mobile terminal can in destination folder display operation button, in this way, user can be with Corresponding operation is carried out by operation button.Wherein, operation button can be configuration button, which can be used to mesh It marks file and configures encryption information.Operation button can also be immigration button, and moving into button can help user to move object into Destination folder;Operation button can also be removal button, and removing button can help user to move the object out destination folder; Operation button, which can also be, moves in and out button, this, which moves in and out button, can help user to move object into or remove target File.
Whether the encryption and decryption approaches of the embodiment of the present invention, the arrangement state for detecting object in destination folder have change Change;If detecting, the arrangement state of object in the destination folder is changed, will be in the destination folder after variation The arrangement state of object is compared with preset decryption arrangement state;If in the destination folder arrangement state of object with The decryption arrangement state matches, then sets decryption shape for the target object for being in encrypted state in the destination folder State;If detecting, the arrangement state of object in the destination folder is added by decryption arrangement state change for preset second Solid matter cloth state then sets encrypted state for the target object for being in decrypted state in the destination folder.In this way, this hair Bright embodiment passes through the decryption arrangement state preset for decrypting target object, the arrangement shape of object in destination folder State and decryption arrangement state are decrypted target object when matching, on the contrary then encrypt to target object.As it can be seen that The embodiment of the present invention can be realized the privacy protection to target object;Can by destination folder to multiple target objects into Row is uniformly controlled, and is respectively controlled compared to single target object, is improved mobile terminal and is imitated to the control of target object Rate;The arrangement state of object is as encryption and decryption means using in destination folder, not only intuitive, operation letter for a user Victory, and be not easy to discover for other people, improve the safety of target object encryption.
It is one of the structure chart of mobile terminal provided in an embodiment of the present invention referring to Fig. 5, Fig. 5, as shown in figure 5, mobile whole End 500, including first detection module 501, comparison module 502 and the first setup module 503, wherein first detection module 501 with Comparison module 502 connects, and comparison module 502 is connect with the first setup module 503.
Whether first detection module 501, the arrangement state for detecting object in destination folder change;
Comparison module 502, if for detecting that the arrangement state of object in the destination folder changes, it will variation The arrangement state of object is compared with preset decryption arrangement state in the destination folder afterwards;
First setup module 503, if for the arrangement state of object in the destination folder and decryption arrangement shape State matches, then sets decrypted state for the target object for being in encrypted state in the destination folder;
Wherein, the starting permission of the target object in encrypted state and/or operating right are in off state;It is described Arrangement state include: the number of object in the destination folder, the putting in order of object, in the spread geometry of object at least One.
Optionally, first detection module 501 is specifically used for: detecting the object moving operation to the destination folder;
Comparison module 502 is specifically used for: if detecting the object moving operation, by institute after the object moving operation The arrangement state for stating object in destination folder is compared with the decryption arrangement state.
Optionally, the object moving operation includes at least one of the following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
Optionally, as shown in fig. 6, mobile terminal 500 further include:
Second detection module 504, for detecting triggering command, the triggering command is to be pre-set for triggering to institute State the instruction that target object is encrypted;
Second setup module 505, if decryption will be in the destination folder for detecting the triggering command The target object of state is set as encrypted state;
Module 506 is adjusted, for the arrangement state of object in the destination folder to be adjusted to preset first encryption Arrangement state;
Wherein, the starting permission of the target object in decrypted state and/or operating right are open state.
Optionally, as shown in fig. 7, mobile terminal 500 further include:
Third setup module 507, if for detecting the arrangement state of object in the destination folder by the decryption State change of arranging is preset second encryption arrangement state, then the target pair of decrypted state will be in the destination folder As being set as encrypted state;
Wherein, the second encryption arrangement state is different from the decryption arrangement state of arrangement state.
Optionally, as shown in figure 8, mobile terminal 500 further include:
Receiving module 508, for receiving the encryption information to the destination folder of user's input;
Wherein, the encryption information includes: at least one corresponding target object of the destination folder, the target text Part presss from both sides corresponding decryption arrangement state and at least one corresponding encryption arrangement state of the destination folder.
Optionally, the object includes application program or file.
Mobile terminal 500 can be realized each process that mobile terminal is realized in the embodiment of the method for Fig. 1 to Fig. 4, to keep away Exempt to repeat, which is not described herein again.
Whether the mobile terminal 500 of the embodiment of the present invention, the arrangement state for detecting object in destination folder change;If Detect that the arrangement state of object in the destination folder changes, then by object in the destination folder after variation Arrangement state is compared with preset decryption arrangement state;If the arrangement state Yu the solution of object in the destination folder Solid matter cloth state matches, then sets decrypted state for the target object for being in encrypted state in the destination folder.This Sample, the embodiment of the present invention pass through the decryption arrangement state preset for decrypting target object, the object in destination folder Arrangement state and decryption arrangement state when matching, target object is decrypted, it is on the contrary then target object is added It is close.As it can be seen that the embodiment of the present invention can carry out private protection to target object.
The embodiment of the present invention also provides a kind of mobile terminal, including processor, and memory is stored on the memory simultaneously The encryption and decryption process program that can be run on the processor, the encryption and decryption process program are held by the processor Each process of above-mentioned encryption and decryption approaches embodiment is realized when row, and can reach identical technical effect, to avoid repeating, Which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored with and adds on computer readable storage medium Close and decryption processing routine, the encryption and decryption process program realize that above-mentioned encryption and decryption approaches are real when being executed by processor Each process of example is applied, and identical technical effect can be reached, to avoid repeating, which is not described herein again.Wherein, the calculating Machine readable storage medium storing program for executing, such as read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
Referring to five that Fig. 9, Fig. 9 are the structure charts that the present invention implements the mobile terminal provided, as shown in figure 9, mobile terminal 900 include: at least one processor 901, memory 902, at least one network interface 904 and user interface 903.Mobile terminal Various components in 900 are coupled by bus system 905.It is understood that bus system 905 for realizing these components it Between connection communication.Bus system 905 further includes power bus, control bus and status signal in addition to including data/address bus Bus.But for the sake of clear explanation, various buses are all designated as bus system 905 in Fig. 9.
Wherein, user interface 903 may include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 902 in the embodiment of the present invention can be volatile memory or nonvolatile memory, It or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as external high Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).Memory 902 described herein is intended to include but is not limited to these and any other suitable type Memory.
In some embodiments, memory 902 stores following element, executable modules or data structures, or Their subset of person or their superset: operating system 9021 and application program 9022.
Wherein, operating system 9021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and the hardware based task of processing.Application program 9022 includes various application programs, such as media Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 9022.
In embodiments of the present invention, mobile terminal 900 further include: be stored on memory 902 and can be on processor 901 The encryption and decryption process program of operation specifically can be the encryption and decryption process program in application program 9022, encryption Following steps are realized when being executed with decryption processing routine by processor 901: the arrangement state of object is in detection destination folder It is no to change;If detecting, the arrangement state of object in the destination folder is changed, by the target text after variation The arrangement state of object is compared with preset decryption arrangement state in part folder;If the arrangement of object in the destination folder State matches with the decryption arrangement state, then sets the target object that encrypted state is in the destination folder to Decrypted state;Wherein, the starting permission of the target object in encrypted state and/or operating right are in off state;Institute State arrangement state include: the number of object in the destination folder, the putting in order of object, in the spread geometry of object extremely One item missing.
The method that the embodiments of the present invention disclose can be applied in processor 901, or be realized by processor 901. Processor 901 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 901 or the instruction of software form.Above-mentioned processing Device 901 can be general processor, digital signal processor (Digital Signal Processor, DSP), dedicated integrated electricity Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only In the computer readable storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The meter Calculation machine readable storage medium storing program for executing is located at memory 902, and processor 901 reads the information in memory 902, completes in conjunction with its hardware The step of stating method.Specifically, encryption and decryption process program, encryption and decryption are stored on the computer readable storage medium Each step such as above-mentioned encryption and decryption approaches embodiment is realized when processing routine is executed by processor 901.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combination is to realize.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, In controller, microcontroller, microprocessor, other electronic units for executing herein described function or combinations thereof.
For software implementations, it can be realized herein by executing the module (such as process, function etc.) of function described herein The technology.Software code is storable in memory and is executed by processor.Memory can in the processor or It is realized outside processor.
Optionally, can also be achieved following steps when encryption and decryption process program is executed by processor 901: detection is to described The object moving operation of destination folder;It, will be described after the object moving operation if detecting the object moving operation The arrangement state of object is compared with the decryption arrangement state in destination folder.
Optionally, the object moving operation includes at least one of the following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
Optionally, can also be achieved following steps when encryption and decryption process program is executed by processor 901: detection triggering refers to It enables, the triggering command is pre-set for triggering the instruction encrypted to the target object;If detecting described Triggering command then sets encrypted state for the target object for being in decrypted state in the destination folder;By the target The arrangement state of object is adjusted to preset first encryption arrangement state in file;Wherein, the mesh in decrypted state The starting permission and/or operating right for marking object are open state.
Optionally, following steps be can also be achieved when encryption and decryption process program is executed by processor 901: if detecting institute The arrangement state for stating object in destination folder encrypts arrangement state by decryption arrangement state change for preset second, then Encrypted state is set by the target object for being in decrypted state in the destination folder;Wherein, the second encryption arrangement State is different from the decryption arrangement state of arrangement state.
Optionally, following steps be can also be achieved when encryption and decryption process program is executed by processor 901: it is defeated to receive user The encryption information to the destination folder entered;
Wherein, the encryption information includes: at least one corresponding target object of the destination folder, the target text Part presss from both sides corresponding decryption arrangement state and at least one corresponding encryption arrangement state of the destination folder.
Optionally, the object includes application program or file.
Mobile terminal 900 can be realized each process that mobile terminal is realized in previous embodiment, to avoid repeating, here It repeats no more.
Whether the mobile terminal 900 of the embodiment of the present invention, the arrangement state for detecting object in destination folder change;If Detect that the arrangement state of object in the destination folder changes, then by object in the destination folder after variation Arrangement state is compared with preset decryption arrangement state;If the arrangement state Yu the solution of object in the destination folder Solid matter cloth state matches, then sets decrypted state for the target object for being in encrypted state in the destination folder.This Sample, the embodiment of the present invention pass through the decryption arrangement state preset for decrypting target object, the object in destination folder Arrangement state and decryption arrangement state when matching, target object is decrypted, it is on the contrary then target object is added It is close.It can be seen that, it is seen then that the embodiment of the present invention can be realized the privacy protection to target object;Destination folder pair can be passed through Multiple target objects are uniformly controlled, and are respectively controlled compared to single target object, improve mobile terminal to mesh Mark the control efficiency of object;The arrangement state of object is as encryption and decryption means using in destination folder, for a user It is not only intuitive, simple to operation, but also be not easy to discover for other people, improve the safety of target object encryption.
Referring to Fig. 10, Figure 10 is the six of the structure chart that the present invention implements the mobile terminal provided, it is as shown in Figure 10, mobile Terminal 1000 includes radio frequency (Radio Frequency, RF) circuit 1010, memory 1020, input unit 1030, display unit 1040, processor 1050, voicefrequency circuit 1060, communication module 1070, power supply 1080.
Wherein, input unit 1030 can be used for receiving the number or character information of user's input, and generate with movement eventually The related signal input of the user setting and function control at end 1000.Specifically, in the embodiment of the present invention, the input unit 1030 may include touch panel 1031.Touch panel 1031, also referred to as touch screen collect the touching of user on it or nearby It touches operation (for example user uses the operations of any suitable object or attachment on touch panel 1031 such as finger, stylus), and Corresponding attachment device is driven according to preset formula.Optionally, touch panel 1031 may include touch detecting apparatus and Two parts of touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation bring letter Number, transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into Contact coordinate, then give the processor 1050, and order that processor 1050 is sent can be received and executed.Furthermore, it is possible to Touch panel 1031 is realized using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 1031, input unit 1030 can also include other input equipments 1032, other input equipments 1032 can include but is not limited to One of physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are more Kind.
Wherein, display unit 1040 can be used for showing information input by user or be supplied to the information and movement of user The various menu interfaces of terminal 1000.Display unit 1040 may include display panel 1041, optionally, using LCD or can have The forms such as machine light emitting diode (Organic Light-Emitting Diode, OLED) configure display panel 1041.
It should be noted that touch panel 1031 can cover display panel 1041, touch display screen is formed, when the touch display screen After detecting touch operation on it or nearby, processor 1050 is sent to determine the type of touch event, is followed by subsequent processing Device 1050 provides corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface elements such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example, Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
Wherein processor 1050 is the control centre of mobile terminal 1000, utilizes various interfaces and connection whole mobile phone Various pieces, by running or execute the software program and/or module that are stored in first memory 1021, and call and deposit The data in second memory 1022 are stored up, the various functions and processing data of mobile terminal 1000 are executed, thus eventually to movement End 1000 carries out integral monitoring.Optionally, processor 1050 may include one or more processing units.
In embodiments of the present invention, mobile terminal 1000 further include: be stored on memory 1021 and can be in processor The encryption and decryption process program run on 1050 specifically can be the encryption and decryption process program in application program, add Close and decryption processing routine realizes following steps when being executed by processor 1050: the arrangement state of object in detection destination folder Whether change;If detecting, the arrangement state of object in the destination folder is changed, by the target after variation The arrangement state of object is compared with preset decryption arrangement state in file;If the row of object in the destination folder Cloth state matches with the decryption arrangement state, then the target object that encrypted state is in the destination folder is arranged For decrypted state;Wherein, the starting permission of the target object in encrypted state and/or operating right are in off state; The arrangement state includes: that the number of object in the destination folder, object put in order, in the spread geometry of object At least one of.
Optionally, can also be achieved following steps when encryption and decryption process program is executed by processor 1050: detection is to institute State the object moving operation of destination folder;If detecting the object moving operation, by institute after the object moving operation The arrangement state for stating object in destination folder is compared with the decryption arrangement state.
Optionally, the object moving operation includes at least one of the following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
Optionally, can also be achieved following steps when encryption and decryption process program is executed by processor 1050: detection triggers Instruction, the triggering command are pre-set for triggering the instruction encrypted to the target object;If detecting institute Triggering command is stated, then sets encrypted state for the target object for being in decrypted state in the destination folder;By the mesh The arrangement state of object is adjusted to preset first encryption arrangement state in mark file;Wherein, in described in decrypted state The starting permission and/or operating right of target object are open state.
Optionally, following steps be can also be achieved when encryption and decryption process program is executed by processor 1050: if detecting The arrangement state of object is preset second encryption arrangement state by decryption arrangement state change in the destination folder, Then encrypted state is set by the target object for being in decrypted state in the destination folder;Wherein, the second encryption row Cloth state is different from the decryption arrangement state of arrangement state.
Optionally, following steps be can also be achieved when encryption and decryption process program is executed by processor 1050: receiving user The encryption information to the destination folder of input;
Wherein, the encryption information includes: at least one corresponding target object of the destination folder, the target text Part presss from both sides corresponding decryption arrangement state and at least one corresponding encryption arrangement state of the destination folder.
Optionally, the object includes application program or file.
Mobile terminal 1000 can be realized each process that mobile terminal is realized in previous embodiment, to avoid repeating, this In repeat no more.
Whether the mobile terminal 1000 of the embodiment of the present invention, the arrangement state for detecting object in destination folder change; If detecting, the arrangement state of object in the destination folder is changed, by object in the destination folder after variation Arrangement state be compared with preset decryption arrangement state;If in the destination folder arrangement state of object with it is described Decryption arrangement state matches, then sets decrypted state for the target object for being in encrypted state in the destination folder. In this way, the embodiment of the present invention passes through the decryption arrangement state preset for decrypting target object, it is right in destination folder When the arrangement state of elephant and decryption arrangement state match, target object is decrypted, on the contrary it is then to target object progress Encryption.It can be seen that, it is seen then that the embodiment of the present invention can be realized the privacy protection to target object;Destination folder can be passed through Multiple target objects are uniformly controlled, is respectively controlled compared to single target object, improves mobile terminal pair The control efficiency of target object;The arrangement state of object is as encryption and decryption means using in destination folder, for user Speech is not only intuitive, simple to operation, but also is not easy to discover for other people, improves the safety of target object encryption.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of mobile terminal and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed mobile terminal and method can pass through it Its mode is realized.For example, mobile terminal embodiment described above is only schematical, for example, the unit is drawn Point, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can To combine or be desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or beg for The mutual coupling, direct-coupling or communication connection of opinion can be through some interfaces, mobile terminal or unit it is indirect Coupling or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.Some or all of unit therein can be selected to realize the embodiment of the present invention according to the actual needs Purpose.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program code Medium.
Encryption and decryption process program, the encryption and decryption process journey are stored on the computer readable storage medium Realization when sequence is executed by processor: whether the arrangement state of object changes in detection destination folder;If detecting the mesh The arrangement state of object changes in mark file, then by the arrangement state of object in the destination folder after variation and in advance If decryption arrangement state be compared;If the arrangement state of object and the decryption arrangement state phase in the destination folder Matching then sets decrypted state for the target object for being in encrypted state in the destination folder;Wherein, in encryption shape The starting permission and/or operating right of the target object of state are in off state;The arrangement state includes: the target text The number of object in part folder, the putting in order of object, in the spread geometry of object at least one of.
Optionally, realization when the encryption and decryption process program is executed by processor: detection is to the destination folder Object moving operation;If detecting the object moving operation, by the destination folder after the object moving operation The arrangement state of middle object is compared with the decryption arrangement state.
Optionally, the object moving operation includes at least one of the following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
Optionally, realization when the encryption and decryption process program is executed by processor: detection triggering command, the triggering Instruction is pre-set for triggering the instruction encrypted to the target object;If detecting the triggering command, Encrypted state is set by the target object for being in decrypted state in the destination folder;By object in the destination folder Arrangement state be adjusted to it is preset first encryption arrangement state;Wherein, the starting of the target object in decrypted state Permission and/or operating right are open state.
Optionally, realization when the encryption and decryption process program is executed by processor: if detecting the file destination The arrangement state of object is preset second encryption arrangement state by decryption arrangement state change in folder, then by the target Target object in file in decrypted state is set as encrypted state;Wherein, it is described second encryption arrangement state with it is described The arrangement state for decrypting arrangement state is different.
Optionally, realization when the encryption and decryption process program is executed by processor: receive user input to described The encryption information of destination folder;Wherein, the encryption information includes: at least one corresponding target pair of the destination folder As the corresponding decryption arrangement state of destination folder and at least one corresponding encryption arrangement shape of the destination folder State.
Optionally, the object includes application program or file.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (16)

1. a kind of encryption and decryption approaches are applied to mobile terminal characterized by comprising
Whether the arrangement state of object changes in detection destination folder;
If detecting, the arrangement state of object in the destination folder is changed, will be in the destination folder after variation The arrangement state of object is compared with preset decryption arrangement state;
If the arrangement state of object matches with the decryption arrangement state in the destination folder, by the file destination Target object in folder in encrypted state is set as decrypted state;
Wherein, the starting permission of the target object in encrypted state and/or operating right are in off state;The arrangement State includes: the title of object in the destination folder, the number of object, the putting in order of object, the spread geometry of object At least one of in.
2. the method according to claim 1, wherein the arrangement state of object is in the detection destination folder No the step of changing, comprising:
Detect the object moving operation to the destination folder;
It, will be right in the destination folder after variation if the arrangement state of object changes in the destination folder The step of arrangement state of elephant is compared with preset decryption arrangement state, comprising:
If detecting the object moving operation, by the arrangement of object in the destination folder after the object moving operation State is compared with the decryption arrangement state.
3. according to the method described in claim 2, it is characterized in that, the object moving operation includes at least one of the following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
4. the method according to claim 1, wherein encrypted state will be in the destination folder described Target object the step of being set as decrypted state after, the method also includes:
Triggering command is detected, the triggering command is pre-set for triggering the finger encrypted to the target object It enables;
If detecting the triggering command, the target object that decrypted state is in the destination folder is set as encrypting State;
The arrangement state of object in the destination folder is adjusted to preset first encryption arrangement state;
Wherein, the starting permission of the target object in decrypted state and/or operating right are open state.
5. the method according to claim 1, wherein encrypted state will be in the destination folder described Target object the step of being set as decrypted state after, the method also includes:
If detecting, the arrangement state of object in the destination folder by decryption arrangement state change is preset second Arrangement state is encrypted, then sets encrypted state for the target object for being in decrypted state in the destination folder;
Wherein, the second encryption arrangement state is different from the decryption arrangement state of arrangement state.
6. the method according to claim 1, wherein in the arrangement state for detecting object in destination folder Before the step of whether changing, the method also includes:
Receive the encryption information to the destination folder of user's input;
Wherein, the encryption information includes: at least one corresponding target object of the destination folder, the destination folder Corresponding decryption arrangement state and at least one corresponding encryption arrangement state of the destination folder.
7. the method according to claim 1, wherein the object includes application program or file.
8. a kind of mobile terminal characterized by comprising
Whether first detection module, the arrangement state for detecting object in destination folder change;
Comparison module, if for detecting that the arrangement state of object in the destination folder changes, by the institute after variation The arrangement state for stating object in destination folder is compared with preset decryption arrangement state;
First setup module, if arrangement state and the decryption arrangement state phase for object in the destination folder Match, then sets decrypted state for the target object for being in encrypted state in the destination folder;
Wherein, the starting permission of the target object in encrypted state and/or operating right are in off state;The arrangement State includes: the title of object in the destination folder, the number of object, the putting in order of object, the spread geometry of object At least one of in.
9. mobile terminal according to claim 8, which is characterized in that the first detection module is specifically used for: detection pair The object moving operation of the destination folder;
The comparison module is specifically used for:, will be described after the object moving operation if detecting the object moving operation The arrangement state of object is compared with the decryption arrangement state in destination folder.
10. mobile terminal according to claim 9, which is characterized in that the object moving operation includes following at least one :
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
11. mobile terminal according to claim 8, which is characterized in that the mobile terminal further include:
Second detection module, for detecting triggering command, the triggering command is pre-set for triggering to the target The instruction that object is encrypted;
Second setup module, if decrypted state will be in the destination folder for detecting the triggering command Target object is set as encrypted state;
Module is adjusted, for the arrangement state of object in the destination folder to be adjusted to preset first encryption arrangement shape State;
Wherein, the starting permission of the target object in decrypted state and/or operating right are open state.
12. mobile terminal according to claim 8, which is characterized in that the mobile terminal further include:
Third setup module, if for detecting the arrangement state of object in the destination folder by the decryption arrangement state Variation is preset second encryption arrangement state, then sets the target object that decrypted state is in the destination folder to Encrypted state;
Wherein, the second encryption arrangement state is different from the decryption arrangement state of arrangement state.
13. mobile terminal according to claim 8, which is characterized in that the mobile terminal further include:
Receiving module, for receiving the encryption information to the destination folder of user's input;
Wherein, the encryption information includes: at least one corresponding target object of the destination folder, the destination folder Corresponding decryption arrangement state and at least one corresponding encryption arrangement state of the destination folder.
14. mobile terminal according to claim 8, which is characterized in that the object includes application program or file.
15. a kind of mobile terminal, which is characterized in that including processor, memory is stored on the memory and can be described The encryption and decryption process program run on processor, the encryption and decryption process program are realized when being executed by the processor The step of encryption and decryption approaches as described in any one of claims 1 to 7.
16. a kind of computer readable storage medium, which is characterized in that be stored on the computer readable storage medium encryption and Decryption processing program is realized when the encryption and decryption process program is executed by processor such as any one of claims 1 to 7 institute The step of encryption and decryption approaches stated.
CN201710377339.7A 2017-05-25 2017-05-25 A kind of encryption and decryption approaches and mobile terminal Active CN107220552B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710377339.7A CN107220552B (en) 2017-05-25 2017-05-25 A kind of encryption and decryption approaches and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710377339.7A CN107220552B (en) 2017-05-25 2017-05-25 A kind of encryption and decryption approaches and mobile terminal

Publications (2)

Publication Number Publication Date
CN107220552A CN107220552A (en) 2017-09-29
CN107220552B true CN107220552B (en) 2019-11-05

Family

ID=59945390

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710377339.7A Active CN107220552B (en) 2017-05-25 2017-05-25 A kind of encryption and decryption approaches and mobile terminal

Country Status (1)

Country Link
CN (1) CN107220552B (en)

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090282248A1 (en) * 2008-05-09 2009-11-12 International Business Machines Corporation. Method and system for securing electronic mail
CN102737199B (en) * 2011-04-15 2017-01-25 富泰华工业(深圳)有限公司 Electronic device with use authority management function and method
CN103488918B (en) * 2013-09-18 2016-09-14 广东欧珀移动通信有限公司 Intelligent terminal applies encryption method and device
KR102356549B1 (en) * 2014-03-12 2022-01-28 삼성전자주식회사 System and method for encrypting folder in device
CN105868617B (en) * 2016-03-25 2020-02-04 维沃移动通信有限公司 Application program encryption method and mobile terminal
CN105893854B (en) * 2016-03-30 2019-04-12 北京小米移动软件有限公司 Encryption and decryption method and device
CN106250754B (en) * 2016-07-27 2018-11-30 维沃移动通信有限公司 A kind of control method and mobile terminal of application program
CN106599702B (en) * 2016-12-08 2020-02-07 武汉斗鱼网络科技有限公司 File encryption and decryption method and device
CN106599723B (en) * 2016-12-19 2020-03-17 武汉斗鱼网络科技有限公司 File encryption method and device and file decryption method and device

Also Published As

Publication number Publication date
CN107220552A (en) 2017-09-29

Similar Documents

Publication Publication Date Title
CN106127076B (en) A kind of inspection method and mobile terminal of photograph album photo
CN106022196B (en) A kind of method and intelligent terminal of information sharing
EP2390812B1 (en) Method and apparatus for controlling objects of a user interface
CN107644170B (en) A kind of image processing method and mobile terminal
CN106648382B (en) A kind of picture browsing method and mobile terminal
CN106127003B (en) A kind of fingerprint recognition unlocking method and mobile terminal
CN106203061B (en) Encryption method of application program and mobile terminal
CN107390991B (en) A kind of processing method and mobile terminal of screenshot
CN106156600B (en) A kind of unlocking method and mobile terminal of application program
CN106027794B (en) A kind of encryption method and mobile terminal of photo
CN106228085B (en) The method for secret protection and mobile terminal of application program
CN105827816B (en) A kind of the split screen method and mobile terminal of terminal screen
CN106250757B (en) A kind of control method and mobile terminal of application program
CN107632870A (en) The startup method and terminal of a kind of application
CN107229396A (en) A kind of hiding method of mobile terminal application icon and mobile terminal
CN105243331A (en) Encryption device and encryption method, and decryption device and decryption method
CN106384060B (en) A kind of mobile terminal data encryption method and mobile terminal
CN106709457A (en) Task execution method based on fingerprint, and mobile terminal
CN106791542B (en) A kind of panoramic picture image pickup method and mobile terminal
CN106355109A (en) File encryption method and mobile terminal
CN106778344B (en) A kind of data permission control method and terminal
CN106648370B (en) A kind of encryption method and mobile terminal of sectional drawing
CN106372492B (en) A kind of encryption method and mobile terminal
CN107220552B (en) A kind of encryption and decryption approaches and mobile terminal
WO2023160640A1 (en) Application identifier control method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant